From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On teaching programming, and using it as a method to teach logic in general. Judy Robertson in the CACM.Franz Dill From The Eponymous Pickle | May 16, 2014 at 08:07 AM
About 0.2% of all SSL certificates are forged. This is the first time I've ever seen a number based on real data. News article: Of 3.45 million real-world connections...Bruce Schneier From Schneier on Security | May 16, 2014 at 07:43 AM
It appears that Windows remains ahead in this operating systems arm race: dual booting with Linux has become even more difficult. Here are some updated instructions...Jean From updated sporadically at best | May 16, 2014 at 02:00 AM
The Computer Science Teachers Association (CSTA) and Oracle have released a series of new documents that demonstrate alignment between the CSTA K-12 Computer Science... From Computer Science Teachers Association | May 15, 2014 at 08:46 PM
Looks to be well done.MajorBI-All Things Business Intelligence:Is Your Company Ready to Deploy Business Intelligence Intelligently?" ... Although the majority of...Franz Dill From The Eponymous Pickle | May 15, 2014 at 08:20 PM
Symantec declared anti-virus dead, and Brian Krebs writes a good response. He's right: antivirus won't protect you from the ever-increasing percentage of malware...Bruce Schneier From Schneier on Security | May 15, 2014 at 02:58 PM
In the 70's growing up, to listen to music I had a turntable for vinyl records. The quality of music went up almost continuously with the amount you were willing...Lance Fortnow From Computational Complexity | May 15, 2014 at 02:33 PM
The medium size business always needs help with choices. They need easy to make choices that are as inexpensive as possible, and link directly to their current...Franz Dill From The Eponymous Pickle | May 15, 2014 at 01:45 PM
Via the SAS Blog. Good example of predictive analytics with a not generally well known technique for Big Data practitioners. Set in a real world tactical problem...Franz Dill From The Eponymous Pickle | May 15, 2014 at 01:31 PM
Been looking at how retailers address e-commerce futures. Here a piece by the Tesco CEO on e-commerce. Not too unexpected." ... Tesco group chief executive Philip...Franz Dill From The Eponymous Pickle | May 15, 2014 at 09:48 AM
Slide show on a number of techniques, including add-ons to Excel for machine learning. Not much detail, but informative about software I had not seen as yet.Franz Dill From The Eponymous Pickle | May 15, 2014 at 08:55 AM
On April 1, I announced the Seventh Movie Plot Threat Contest: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous surveillance...Bruce Schneier From Schneier on Security | May 15, 2014 at 07:08 AM
It has arrived, but many companies are discovering that putting all this data together is harder than you think. Not all is captured, or structured, or even fully...Franz Dill From The Eponymous Pickle | May 14, 2014 at 05:25 PM
According to NSA documents published in Glenn Greenwald's new book No Place to Hide, we now know that the NSA spies on embassies and missions all over the world...Bruce Schneier From Schneier on Security | May 14, 2014 at 01:53 PM
Piracy of devices, storage technologies, and mobile technologies is growing worldwide according to the USTR’s annual Special 301 Report on Intellectual Property...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 14, 2014 at 12:26 PM
Just brought to my attention:IBM just released ExperienceOne - an analytics and automation-based customer engagement solution that ties together marketing, sales...Franz Dill From The Eponymous Pickle | May 14, 2014 at 11:53 AM
A long time correspondent, Tom Ritchey, sends a note about an analytical approach that is little used in enterprise, but should be much better known. Using the...Franz Dill From The Eponymous Pickle | May 14, 2014 at 10:37 AM
The Web intelligence company Recorded Future is reporting -- picked up by the Wall Street Journal -- that al Qaeda is using new encryption software in the wake...Bruce Schneier From Schneier on Security | May 14, 2014 at 07:58 AM
The connection between automated configuration and design. Here Cisco is talking about a technical network thing. I am not so much interested in how networks...Franz Dill From The Eponymous Pickle | May 13, 2014 at 07:26 PM
On the last two Saturdays of March, a group of high school girls came to both Carleton University and the University of Ottawa to learn about computer science and...Gail Carmichael From The Female Perspective of Computer Science | May 13, 2014 at 02:59 PM