From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
More on Beacons in retail. " ... Beacons are showing up everywhere. It's open season for retailers as more apps are developed to take advantage of beacon technology...Franz Dill From The Eponymous Pickle | August 14, 2014 at 02:14 PM
The National Science Foundation, Directorate for Computer & Information Science & Engineering (CISE) Core Program solicitations have been posted. There are no major...Helen Vasaly From The Computing Community Consortium Blog | August 14, 2014 at 11:14 AM
Inspired by the traditional Japanese art form of origami, researchers from Harvard University and Massachusetts Institute of Technology (MIT) have figured out how...Helen Vasaly From The Computing Community Consortium Blog | August 14, 2014 at 10:12 AM
In the HBR Blogs: Suggesting that e-commerce is not as divisive to physical as is assumed. May require some registration. The statistics are interesting" ......Franz Dill From The Eponymous Pickle | August 14, 2014 at 08:30 AM
There's a new article on Edward Snowden in Wired. It's written by longtime NSA watcher James Bamford, who interviewed Snowden is Moscow. There's lots of interesting...Bruce Schneier From Schneier on Security | August 14, 2014 at 03:00 AM
In the South China Morning Post: Another example of emotion detection by imaging and analysis:" ... Chinese scientists develop mini-camera to scan crowds for potential...Franz Dill From The Eponymous Pickle | August 14, 2014 at 12:32 AM
This is a smart and interesting blog post: I prefer to think of security as a class of interface guarantee. In particular, security guarantees are a kind of correctness...Bruce Schneier From Schneier on Security | August 13, 2014 at 03:14 PM
The three body problem, computer theory style Ellis Horowitz is one of the founders of the theory of algorithms. His thesis with George Collins in 1969 had the...rjlipton From Gödel's Lost Letter and P=NP | August 13, 2014 at 02:04 PM
Been some time since I have worked with Teradata, but I see they are supporting an Ovum white paper on connection analytics. Understand it as described, though...Franz Dill From The Eponymous Pickle | August 13, 2014 at 02:01 PM
My former colleague Andrew Tarvin does a TED talk on Humor at work. Also on Facebook. He is now a Humor Engineer at Humor that Works. Nice idea for the enterprise...Franz Dill From The Eponymous Pickle | August 13, 2014 at 11:53 AM
Have always made a point that applications for wearable glasses, like Google Glass, are most valuably applied to augmented reality applications. Mentioned this...Franz Dill From The Eponymous Pickle | August 13, 2014 at 11:25 AM
Good view of examples of how realistic commercial 3D printing is being used in manufacturing and how it may realign supply chain systems. Still narrow domains...Franz Dill From The Eponymous Pickle | August 13, 2014 at 10:05 AM
This borders on ridiculous: Chinese scientists are developing a mini-camera to scan crowds for highly stressed individuals, offering law-enforcement officers a...Bruce Schneier From Schneier on Security | August 13, 2014 at 07:54 AM
In Businessweek. This scenario has been much in the news. It is starting to happen:" ... Imagine getting a call from your doctor if you let your gym membership...Franz Dill From The Eponymous Pickle | August 13, 2014 at 06:52 AM
Robots in Hotels. Perhaps not really as multi-functional as what we could call butlers. But you can see how they can be applied. Now how will this influence employment...Franz Dill From The Eponymous Pickle | August 12, 2014 at 04:58 PM
At the opening ceremonies of the International Congress of Mathematicians in 2014, Subhash Khot was awarded the Rolf Nevanlinna Prize, given every four years to...Lance Fortnow From Computational Complexity | August 12, 2014 at 02:36 PM
This past July 14-15, 326 attendees converged on St. Charles, Illinois, for the 2014 CSTA Annual Conference. This number continues the impressive growth of the... From Computer Science Teachers Association | August 12, 2014 at 01:24 PM
The National Science Foundation (NSF)‘s Secure and Trustworthy Cyberspace (SaTC) program has announced two Frontier-scale projects, part of a $74.5 million investment...Helen Vasaly From The Computing Community Consortium Blog | August 12, 2014 at 11:03 AM
Good Wired piece on the challenges for the success of Google Glass. In our own enterprise experiment we also met some of these same issues. Still have not seen...Franz Dill From The Eponymous Pickle | August 12, 2014 at 10:19 AM
The EU rulings that you could ask for posts to be removed from Google web searches have led to more unusual and unexpected results. Not that there are not already...Franz Dill From The Eponymous Pickle | August 12, 2014 at 10:04 AM