From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good short piece on the topic by Pearl Zhu.Cloudification is a journey to reinvent IT via modernization, classification, integration and optimization. ... More...Franz Dill From The Eponymous Pickle | November 26, 2014 at 09:27 AM
Brought to my attention via Founder and CEO: Sunnie Southern" .. Viable Synergy is a product and services innovation firm. We help individuals, organizations and...Franz Dill From The Eponymous Pickle | November 26, 2014 at 09:22 AM
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...Bruce Schneier From Schneier on Security | November 26, 2014 at 07:50 AM
Upcoming TalkThe OBAIS Department at the Lindner College of Business, University of Cincinnati, invites you to attend the following research seminar.DATE & TIME...Franz Dill From The Eponymous Pickle | November 25, 2014 at 06:50 PM
A capability always mentioned in our brainstorms for considering the Smart Home. The Smart Door Lock. The Verge looks at Smart Lock. Which includes one time...Franz Dill From The Eponymous Pickle | November 25, 2014 at 02:56 PM
The term Artificial Intelligence - AI is not used as much any more, probably to deal with controlling expectations. The considerable activity today tends to be...Franz Dill From The Eponymous Pickle | November 25, 2014 at 10:27 AM
In the Cisco Blog: IOT in manufacturing innovation. We used early forms of IOT as key aspects of retail applications. Look forward to see the forthcoming survey...Franz Dill From The Eponymous Pickle | November 25, 2014 at 09:48 AM
The following is a guest blog post from Craig E. Wills, Professor and Department Head of the Computer Science Department at Worcester Polytechnic Institute. The...Helen Vasaly From The Computing Community Consortium Blog | November 25, 2014 at 09:32 AM
Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...Bruce Schneier From Schneier on Security | November 25, 2014 at 07:57 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Did you see this on the CSTA mailing list? When the CSTA Board met recently we started talking about sharing what we were doing in our schools for Computer Science...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 25, 2014 at 06:13 AM
In DigitalStrategy: Don't know where the IP rests today, but here is Google also doing scene analysis on images. Again I can see some interesting applicationsrelated...Franz Dill From The Eponymous Pickle | November 24, 2014 at 05:00 PM
Nice article on some of the security assumptions we rely on in cryptographic algorithms....Bruce Schneier From Schneier on Security | November 24, 2014 at 03:45 PM
Last week the National Science Foundation (NSF), in partnership with the National Institutes of Health (NIH), U.S. Department of Agriculture and NASA announced...Helen Vasaly From The Computing Community Consortium Blog | November 24, 2014 at 03:41 PM
Computer science and brain science share deep intellectual roots. Today, understanding the structure and function of the human brain is one of the greatest scientific...Helen Vasaly From The Computing Community Consortium Blog | November 24, 2014 at 02:23 PM
Continuing the good news at Harvard, word has been given that Eddie Kohler has officially been offered tenure. So we hope/expect/are excited about keeping Eddie...Michael Mitzenmacher From My Biased Coin | November 24, 2014 at 01:50 PM
Don Tapscott on the continued need for a CIO in industry. Interesting thoughts, but by the same reasoning why do we need any executive leaders? A CIO should be...Franz Dill From The Eponymous Pickle | November 24, 2014 at 01:41 PM
The following is a Computing Research Policy Blog post by Peter Harsha, CRA Director of Government Affairs. As part of its mission to develop a next generation...Helen Vasaly From The Computing Community Consortium Blog | November 24, 2014 at 01:15 PM
In Retailwire: A favorite concept that we modeled in depth a number of times. It also merits further direct lab and online testing. Still believe there are opportunities...Franz Dill From The Eponymous Pickle | November 24, 2014 at 11:06 AM
In the New Yorker. How 3D Printing is revolutionizing medicine. Good non-technical article on the topic. Possibilities and limitations. Via Walter Riker" ....Franz Dill From The Eponymous Pickle | November 24, 2014 at 09:05 AM
Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....Bruce Schneier From Schneier on Security | November 24, 2014 at 07:54 AM