From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Bruce Langos, COO of Teradata gave a spirited talk today in the atrium of Wright State University today on the nature of the data scientist. The talk was also...Franz Dill From The Eponymous Pickle | October 16, 2014 at 11:56 PM
In Technology Review: Fascinating idea. As 3D printing becomes cheaper, you can quickly create a 3D physical data representation. (You can add more 'Ds' with indicators...Franz Dill From The Eponymous Pickle | October 16, 2014 at 11:17 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
OK so the good news is that I am one of 15 finalists to win 15 Surface Pro's for my favorite school. The winners are chosen by community voting, so please votehttps...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 16, 2014 at 08:09 PM
With mid-term Congressional elections fast approaching, USACM released a statement to emphasize the importance of voting technology in elections. It echoes past...David Bruggeman From U.S. Public Policy Committee of the ACM | October 16, 2014 at 05:11 PM
What Human-Centered Design Means for Financial Inclusion Yanina Seltzer, Claudia McKay 16 October 2014, 126 pages Interactive publication Download pdf CGAP has...Experientia From Putting People First | October 16, 2014 at 03:51 PM
“Push, pull or nudge” was the title of a 2.5 hour workshop (video here) at the 5th European Conference on Public Communication held today in Brussels. The workshop...Experientia From Putting People First | October 16, 2014 at 02:56 PM
NP (nondeterministic polynomial time) and NEXP (nondeterministic exponential time) are provably different classes by the nondeterministic time hierarchy. No surprise...Lance Fortnow From Computational Complexity | October 16, 2014 at 12:34 PM
Experientia, the Turin-based User Experience Consultancy, is looking for a native English speaking Communications Officer to work in their Turin, Italy office....Experientia From Putting People First | October 16, 2014 at 10:14 AM
In Baseline: Becoming more true. It is now an expectation that we have access anytime and anywhere. With the right data to support our decisions.   " ...It's...Franz Dill From The Eponymous Pickle | October 16, 2014 at 09:46 AM
In CWorld: I thought this was being done generally, but this is a better way it seems." ... Instead of building a suite of separate productivity apps, a la Microsoft...Franz Dill From The Eponymous Pickle | October 16, 2014 at 09:14 AM
ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...Bruce Schneier From Schneier on Security | October 16, 2014 at 07:22 AM
As part of its work on the Cybersecurity Framework (Framework), the National Institute of Standards and Technology (NIST) sought comments from stakeholders on their...David Bruggeman From U.S. Public Policy Committee of the ACM | October 15, 2014 at 05:48 PM
Brought to my attention, a new book: Superintelligence: Paths, Dangers, Strategies by Nick BostromWill be reading. They write:" ... Superintelligence asks the...Franz Dill From The Eponymous Pickle | October 15, 2014 at 02:46 PM
When we first visited quantum computing we suggested that some AI applications, like image analysis, would be good candidates for the technique. Now this has come...Franz Dill From The Eponymous Pickle | October 15, 2014 at 02:27 PM
Periodically the Computing Community Consortium (CCC) will highlight former CI Fellows to showcase their current research. The following was submitted by Dr. Ioan...Helen Vasaly From The Computing Community Consortium Blog | October 15, 2014 at 02:22 PM
Storytelling is a recent topic. Normally a thing that people do. To what degree can it be automated with a cognitive system? The idea has been around for aSome...Franz Dill From The Eponymous Pickle | October 15, 2014 at 01:45 PM
And this can have tragic consequences. Like Ebola death tragic. Abigail Zuger, M.D., shares her own experience: “We do not really know whether dysfunctional software...Experientia From Putting People First | October 15, 2014 at 12:23 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
You’re at a great conference and you are hearing all sorts of great ideas. It’s exciting! You hear about tools and techniques that are working wonders in the presenter...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 15, 2014 at 10:23 AM
This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...Bruce Schneier From Schneier on Security | October 15, 2014 at 08:06 AM
A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...Bruce Schneier From Schneier on Security | October 15, 2014 at 07:29 AM