From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Concept term I had not heard of: " .... The age-old problem of disconnection in the supply chain can be eased through the use of social media, argues Tony Martins...Franz Dill From The Eponymous Pickle | August 27, 2014 at 08:56 AM
Security researchers have finally gotten their hands on a Rapiscan backscatter full-body scanner. The results aren't very good. Website with paper and images. News...Bruce Schneier From Schneier on Security | August 27, 2014 at 08:44 AM
The toolkit for service design is an introduction to the methodology of service design. With a simple step-by-step plan it offers you a practical do-it-yourself...Experientia From Putting People First | August 27, 2014 at 06:17 AM
Heard this somewhat late, but a startup I am connected with will be featured on the Daily Show tonight:Full information." ... Someone in our Smartstones "earlyDavid...Franz Dill From The Eponymous Pickle | August 26, 2014 at 09:58 PM
Some algorithmic tricks were first invented in complexity theory Andrey Kolmogorov, Fred Hennie, Richard Stearns, and Walter Savitch are all famous separately;...rjlipton From Gödel's Lost Letter and P=NP | August 26, 2014 at 06:42 PM
We recently put on arxiv a new draft on "Theoretical Foundations of Equitability and the Maximal Information Coefficient". This is some follow-on work to a paper...Michael Mitzenmacher From My Biased Coin | August 26, 2014 at 06:41 PM
In the recent ACM Bulletin:Matthias Kaiserswerth is Director of IBM Research - Zurich. ....How would you expand on your statement in a recent blog post that data...Franz Dill From The Eponymous Pickle | August 26, 2014 at 11:49 AM
Piece on how Netflix uses big data analysis. To derive Golden Data. I like the term, but can it be effectively derived?" ... “It’s not as far away from the world...Franz Dill From The Eponymous Pickle | August 26, 2014 at 11:33 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the things I am working hard at this year is making things more clear to students. I want them to understand concepts and why they are important and useful...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 26, 2014 at 10:30 AM
The following is a special contribution to this blog by CCC Council Member Ran Libeskind-Hadas and CRA Board Member Susanne Hambrusch, Co-Chairs of CRA-E. The CRA...Ann Drobnis From The Computing Community Consortium Blog | August 26, 2014 at 09:32 AM
The White House is refusing to release details about the security of healthcare.gov because it might help hackers. What this really means is that the security details...Bruce Schneier From Schneier on Security | August 26, 2014 at 07:21 AM
The gyroscopes are sensitive enough to pick up acoustic vibrations. It's crude, but it works. Paper. Wired article. Hacker News thread....Bruce Schneier From Schneier on Security | August 26, 2014 at 06:56 AM
More by NASA on the use of swarms. Nice to see work of this type still coming out of the space agency. See the mention of the use of simulation methods to test...Franz Dill From The Eponymous Pickle | August 26, 2014 at 06:16 AM
Not very much detail, mention of Unilever connection to business process," ... In 2010, the company set itself the target of doubling its revenues in a decade or...Franz Dill From The Eponymous Pickle | August 26, 2014 at 05:18 AM
I was a very early user of the Tivo DVR system, used it until we were hit by lightning. I see they are now trying to pick up some of the legally nixed Aereo traffic...Franz Dill From The Eponymous Pickle | August 25, 2014 at 09:49 PM
Better algorithms can lead to better medicine and save lives. Just today Tim Gowers discusses Emmanuel Candès' ICM Plenary Lecture, which among other things describes...Lance Fortnow From Computational Complexity | August 25, 2014 at 07:50 PM
Matthew Green has a good post on what's wrong with PGP and what should be done about it....Bruce Schneier From Schneier on Security | August 25, 2014 at 01:36 PM
When we think about the first computers to produce useful information for mankind, our mind usually goes to the 1940s: the conceptual Turing machine, the ENIAC,... From Computer Science Teachers Association | August 25, 2014 at 01:30 PM
Clever idea, that I think has been tried before. Now from Cornell and elsewhere and supported by a number of big technology companies. Why not learn from theHey...Franz Dill From The Eponymous Pickle | August 25, 2014 at 12:47 PM
In the CACM: Good article on the state of digital medicine. Useful introduction to current technologies and implications. Reviewing.Franz Dill From The Eponymous Pickle | August 25, 2014 at 12:23 PM