From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Wired: A disconcerting piece about how law enforcement and governments are gathering data directly from mobile phone. " ... Newly uncovered components of...Franz Dill From The Eponymous Pickle | June 25, 2014 at 10:04 AM
New York City officials anonymized license plate data by hashing the individual plate numbers with MD5. (I know, they shouldn't have used MD5, but ignore that for...Bruce Schneier From Schneier on Security | June 25, 2014 at 07:36 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The cartoon below by Hugh MacLeod is one of the most shared of his images on the Internet. I have to say I see something different in it every time I view it....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 25, 2014 at 06:20 AM
Via Metaio. " .... Metaio, the world leader in Augmented Reality (AR) software and solutions today revealed its 6D Holodeck technology that places virtual environments...Franz Dill From The Eponymous Pickle | June 24, 2014 at 07:54 PM
Ex-NSA director Keith Alexander has his own consulting company: IronNet Cybersecurity Inc. His advice does not come cheap: Alexander offered to provide advice to...Bruce Schneier From Schneier on Security | June 24, 2014 at 03:56 PM
In Adage: Ad agencies are now seeking more than just Ad ideas. For additional revenue streams " ... Ad Ideas? RFPs Morph Into Requests for Innovation, Products...Franz Dill From The Eponymous Pickle | June 24, 2014 at 12:21 PM
In CACM: Former NSA chief says culture not technology key to cyber defense. I really don't see our culture going that way. If anything a sense of personal responsibility...Franz Dill From The Eponymous Pickle | June 24, 2014 at 09:50 AM
A long time goal. Some of the research generally described here. Completely personalized navigation indoors is still not here. Coming to an office this morning...Franz Dill From The Eponymous Pickle | June 24, 2014 at 09:36 AM
Interesting view. Via Linkedin. To what degree are we benefited versus being exploited? Most of this is obvious, but the measures of each are not there. I would...Franz Dill From The Eponymous Pickle | June 24, 2014 at 09:25 AM
The second Quadrennial Homeland Security Review has been published by the Department of Homeland Security. At 100+ pages, I'm not going to be reading it, but I...Bruce Schneier From Schneier on Security | June 24, 2014 at 09:09 AM
Interesting paper: M. Bellare, K. Paterson, and P. Rogaway, "Security of Symmetric Encryption against Mass Surveillance." Abstract: Motivated by revelations concerning...Bruce Schneier From Schneier on Security | June 24, 2014 at 08:55 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the links in yesterday’s interesting links post was to a fun questionnaire for computer science people. Guess the Programming Language asks you to identify...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 24, 2014 at 06:37 AM
Attended today the announcement of the Wolfram Programming Cloud. This embodies the ability to create public and private clouds using the Wolfram programming language...Franz Dill From The Eponymous Pickle | June 23, 2014 at 08:18 PM
Glad at least some progress was made here. My opinion is it should have gone further to enhance net creativity. It may well have some economic repercussions...Franz Dill From The Eponymous Pickle | June 23, 2014 at 08:07 PM
Have followed the idea of placing sensors in existing infrastructure for some time. Starting in retail environments. Here Chicago steps into the approach. A...Franz Dill From The Eponymous Pickle | June 23, 2014 at 08:04 PM
Another dichotomy theorem Jin-Yi Cai is one of the world’s experts on hardness of counting problems, especially those related to methods based on complex—pun intended—gadgets...Pip From Gödel's Lost Letter and P=NP | June 23, 2014 at 04:58 PM
Another dichotomy theorem Jin-Yi Cai is one of the world’s experts on hardness of counting problems, especially those related to methods based on complex—pun intended—gadgets...Pip From Gödel's Lost Letter and P=NP | June 23, 2014 at 04:58 PM
Monday, June 23, 2014 The House Committee on Homeland Security will hold a field hearing on “Mass Gathering Security: A Look at the Coordinated Approach to Super...Renee Dopplick From U.S. Public Policy Committee of the ACM | June 23, 2014 at 03:13 PM
A group of researchers have reverse-engineered the NSA's retro reflectors, and has recreated them using software-defined radio (SDR): An SDR Ossmann designed and...Bruce Schneier From Schneier on Security | June 23, 2014 at 01:10 PM
A Complementary Strategy. My view: I really see them as the same thing. You should always consider the simplest methods first. Starting with just understanding...Franz Dill From The Eponymous Pickle | June 23, 2014 at 12:33 PM