From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Wired: Excellent non technical look at tracking the complexity of sports. Have followed this technically for a few years, this is a good non-tech view. Nice...Franz Dill From The Eponymous Pickle | October 28, 2014 at 04:57 PM
Today at the Insight meetings we saw a Watson cognitive App being built from a number of Bluemix services and prefabricated Java. Of particular interest was aGenesys...Franz Dill From The Eponymous Pickle | October 28, 2014 at 04:54 PM
Interesting data: Turning to the crime section of the Chapman Survey on American Fears, the team discovered findings that not only surprised them, but also those...Bruce Schneier From Schneier on Security | October 28, 2014 at 02:53 PM
The following is a guest blog post by CCC Council Member Shashi Shekhar, McKnight Distinguished University Professor Department of Computer Science College of Science...Helen Vasaly From The Computing Community Consortium Blog | October 28, 2014 at 02:31 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Interesting questions appear on Twitter all the time. Sometimes addressed to individuals and sometimes addressed to the Twitterverse as a whole. One earlier today...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 28, 2014 at 12:55 PM
On Sunday we had the Symposium on Theoretical Computer Science on the Occasion of Michael Sipser's 60th birthday to celebrate what Mike has brought to research...Lance Fortnow From Computational Complexity | October 28, 2014 at 12:21 PM
Like many (theoretical) computer scientists, I spent far, far too much time this weekend thinking about rankings. Well, really, it was more that I was being far...Michael Mitzenmacher From My Biased Coin | October 28, 2014 at 11:51 AM
Tim Askew, CEO of Corporate Rain International, explains how technology is increasingly isolating us from each other and stifling creativity and real experiences...Experientia From Putting People First | October 28, 2014 at 10:08 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I found this image on Facebook last week and it really rang true for me. I experienced both sides of this recently. On one hand I wrote a program on the spur...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 28, 2014 at 08:30 AM
The latest version of Apple's OS automatically syncs your files to iCloud Drive, even files you choose to store locally. Apple encrypts your data, both in transit...Bruce Schneier From Schneier on Security | October 28, 2014 at 07:59 AM
A problem I looked at for a startup a few years ago. Ultimately it was chosen to address it by using crowdsourcing. Here a Vimeo interview with Stephen Gould"...Franz Dill From The Eponymous Pickle | October 28, 2014 at 01:10 AM
Watson Analytics Have yet to get a beta loaner, but today I did get several more in depth demonstrations of the idea. In one case I was able to at least suggest...Franz Dill From The Eponymous Pickle | October 27, 2014 at 08:17 PM
Whole Foods Store of the future utilizes digital signage. They have been innovators in this space for some time. " .... Whole Foods has unveiled a new range...Franz Dill From The Eponymous Pickle | October 27, 2014 at 07:25 PM
The idea has been suggested for years, now finally the Feds have approved a test. Why not? " ... Federal authorities have given approval for the U.S. Postal...Franz Dill From The Eponymous Pickle | October 27, 2014 at 07:18 PM
There's a report that the FBI has identified a second leaker: The case in question involves an Aug. 5 story published by The Intercept, an investigative website...Bruce Schneier From Schneier on Security | October 27, 2014 at 05:32 PM
Why are highly successfully companies putting top-notch designers in key leadership roles, ask David Weber and Lisa Leslie Henderson. What are designers bringing...Experientia From Putting People First | October 27, 2014 at 05:20 PM
Mobile healthcare app development poses a set of challenges very different from mainstream apps. Not only is security an area that requires a considerable attention...Experientia From Putting People First | October 27, 2014 at 05:05 PM
How to beat the end of Moore’s Law Elie Track and Tom Conte were co-chairs of the recently-held Third IEEE workshop on Rebooting Computing. Tom is a computer architect...rjlipton From Gödel's Lost Letter and P=NP | October 27, 2014 at 04:27 PM
Here's a physical attack against a credit card verification system. Basically, the attack disrupts the communications between the retail terminal and the system...Bruce Schneier From Schneier on Security | October 27, 2014 at 03:50 PM
You might wonder why I am welcoming attorneys to the blog. Well, I happen to know that some attorneys read my blog. I know this because recently, as an expert...Michael Mitzenmacher From My Biased Coin | October 27, 2014 at 03:47 PM