From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
CSTA like so many great conferences is as much about learning from face to face informal conversations as it is about formal sessions. I’ve been able to talk with...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 15, 2014 at 06:23 PM
Brian Krebs is reporting that: The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers...Bruce Schneier From Schneier on Security | July 15, 2014 at 03:30 PM
In Tech Review: Turning waste heat into energy. With an abundantly available material. " ... California-based Alphabet Energy plans to begin selling a new type...Franz Dill From The Eponymous Pickle | July 15, 2014 at 03:26 PM
Synthetic biology (WP Overview) is of interest for product development, some readers of this blog have indicated an interest in how this domain could link to analytic...Franz Dill From The Eponymous Pickle | July 15, 2014 at 11:20 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Usually I’m good about writing up the events of a conference at the end of the day and putting up a blog post. Not this time. I blame it on Peli de Halleux from...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 15, 2014 at 10:02 AM
The following is a special contribution to this blog by by CCC Executive Council Member Mark D. Hill of the University of Wisconsin-Madison. Background: Senior...Ann Drobnis From The Computing Community Consortium Blog | July 15, 2014 at 09:45 AM
Interesting concept, in Venturebeat: A means to observe and compare data about major cities. And I hope visualizing related analytics. Sounds akin to work that...Franz Dill From The Eponymous Pickle | July 15, 2014 at 08:32 AM
Last week, we learned that the NSA targets people who look for information about Tor. A few days later, the operator of a Tor exit node in Austria has been found...Bruce Schneier From Schneier on Security | July 15, 2014 at 07:49 AM
In Wired: Have heard of it, but never even looked at the code. Will it remake computer programming? I like new ways of thinking about the process of logical control...Franz Dill From The Eponymous Pickle | July 15, 2014 at 12:40 AM
How to know if you should hire more people?Organizational psychologist and leadership specialist David Javitch said there are several signs employers should look...Franz Dill From The Eponymous Pickle | July 15, 2014 at 12:29 AM
The World Wide Web is now only 25 years old. It seems much longer. IEEE Computing Now discusses the birthday, and the future of the Web. It will be here for some...Franz Dill From The Eponymous Pickle | July 14, 2014 at 07:28 PM
Have followed D-Wave Quantum computing since its inception. The WSJ reports on new funding it has received. I talked to them about potential applications in...Franz Dill From The Eponymous Pickle | July 14, 2014 at 05:41 PM
In Linkedin: How Germany Beat Brazil. And how Big Data Helped. Via my colleague : Ali Rebaie: Big Data Analyst and Consultant , Top Big Data Influencer, Public...Franz Dill From The Eponymous Pickle | July 14, 2014 at 03:21 PM
The latest Snowden story is a catalog of exploit tools from JTRIG (Joint Threat Research Intelligence Group), a unit of the British GCHQ, for both surveillance...Bruce Schneier From Schneier on Security | July 14, 2014 at 03:01 PM
You would not think size would be a big issue, given what can be done in a smartphone. But the goal is a good one: In CWorld:" ... The company ... will show a...Franz Dill From The Eponymous Pickle | July 14, 2014 at 02:41 PM
The next WATCH Talk is scheduled for July 17 at noon EDT. Crispin Cowan will reflect on decades of defending imperfect software. Dr. Cowan works for Microsoft adding...Helen Vasaly From The Computing Community Consortium Blog | July 14, 2014 at 01:46 PM
Piece on how a number of brands are using neuromarketing. Nontechnical. Some examples I had not heard of. Nielson pitches its own acquisitions" ... To be sure...Franz Dill From The Eponymous Pickle | July 14, 2014 at 12:16 PM
July 15 Hearing: The Crime and Terrorism Subcommittee of the Senate Judiciary Committee will hold a hearing on botnets and associated criminal networks. 2:30 p.m...David B. From U.S. Public Policy Committee of the ACM | July 14, 2014 at 12:04 PM
IKEA using Instagram. " .... IKEA Creates an Entire Website Inside Instagram ... Russian Agency Instinct Uses Tagging Feature in a New Way ... "Franz Dill From The Eponymous Pickle | July 14, 2014 at 10:10 AM
This is an interesting paper: "An Anthropological Approach to Studying CSIRTs." A researcher spent 15 months at a university's SOC conducting "ethnographic fieldwork...Bruce Schneier From Schneier on Security | July 14, 2014 at 07:16 AM