From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ordinary lenses produce cloaking. Fascinating application that at one level is very easy to understand. Everyday applications?Franz Dill From The Eponymous Pickle | September 27, 2014 at 08:29 AM
Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | September 26, 2014 at 05:28 PM
Cognitive requires learning. At very least an intelligent system needs to be updated as its context changes. There are many kinds of learning. Passive, active,...Franz Dill From The Eponymous Pickle | September 26, 2014 at 02:49 PM
In the CACM: A view of common computing languages. Interesting, but most likely for those that have used several. Non technical in that it deals with a view...Franz Dill From The Eponymous Pickle | September 26, 2014 at 02:48 PM
There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...Bruce Schneier From Schneier on Security | September 26, 2014 at 01:47 PM
In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe. Examples...Franz Dill From The Eponymous Pickle | September 26, 2014 at 12:42 PM
Steve Miller on 'Freak Data Science', where freak means roughly assumption-free, understandable and useful. Always like that approach, and he has much to say on...Franz Dill From The Eponymous Pickle | September 26, 2014 at 12:36 PM
What do two college professors, two high school teachers and a pre-service teacher have in common? CSTA membership!
I spent several enjoyable weeks this summer... From Computer Science Teachers Association | September 26, 2014 at 11:48 AM
Dr. James F. Kurose, Distinguished University Professor in the Department of Computer Science at the University of Massachusetts (UMass), was named the next Assistant...Helen Vasaly From The Computing Community Consortium Blog | September 26, 2014 at 09:50 AM
In the New Yorker, a non technical, very readable article about the 'right to be forgotten' on the Internet, which is being exercised now in Europe. Examples...Franz Dill From The Eponymous Pickle | September 26, 2014 at 12:32 AM
Of interest, on psych and design, in user experience:" ... UX Magazine is a central, one-stop resource for everything related to user experience. We provide a steady...Franz Dill From The Eponymous Pickle | September 26, 2014 at 12:24 AM
From MIT, with possible use to understand data use and valuation. " ... Researchers in the Decentralized Information Group (DIG) at MIT’s Computer Science and...Franz Dill From The Eponymous Pickle | September 25, 2014 at 11:40 PM
An example of the ability to make a classification of an image by subtle attributes. Images are a form of unstructured data increasingly being found in large databases...Franz Dill From The Eponymous Pickle | September 25, 2014 at 04:44 PM
The National Science Foundation (NSF) and Semiconductor Research Corporation (SRC) announced nine research awards to 10 universities totaling nearly $4 million...Helen Vasaly From The Computing Community Consortium Blog | September 25, 2014 at 04:11 PM
This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...Bruce Schneier From Schneier on Security | September 25, 2014 at 03:58 PM
A laboratory for teaching online security concepts in the form of a simulation game. We created similar simulation games for teaching and option evaluation for...Franz Dill From The Eponymous Pickle | September 25, 2014 at 12:57 PM
I've been trying something a little bit different for our CS2 class this semester. The course typically covers object-oriented programming in Java along with topics...Gail Carmichael From The Female Perspective of Computer Science | September 25, 2014 at 12:15 PM
It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...Bruce Schneier From Schneier on Security | September 25, 2014 at 11:55 AM
In FastCompany. I saw this direction proposed some time ago. At that time it was suggested that a wiki like structure would be set up, and any communication would...Franz Dill From The Eponymous Pickle | September 25, 2014 at 10:26 AM
Via the Service Innovation group, a video on Service design and journey mapping. Mulling how such systems differ from advisory applications. Is it a matter of...Franz Dill From The Eponymous Pickle | September 25, 2014 at 10:13 AM