From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A famous algorithm, a new paper, a full correctness proof Vijay Vazirani is one of the world experts on algorithmic theory, and is especially known for his masterful...Pip From Gödel's Lost Letter and P=NP | March 28, 2014 at 11:49 AM
A famous algorithm, a new paper, a full correctness proof Vijay Vazirani is one of the world experts on algorithmic theory, and is especially known for his masterful...Pip From Gödel's Lost Letter and P=NP | March 28, 2014 at 11:49 AM
I am old enough that, as a kid, I did not have access to a calculator. My mother, a teacher, had an electronic calculator that you had to plug in the wall. She...Daniel Lemire From Daniel Lemire's Blog | March 28, 2014 at 11:04 AM
Correspondent Shoumen Datta reports that the Industrial Internet Consortium Site has been made public. " ... Accelerating Innovation In Connected, Intelligent...Franz Dill From The Eponymous Pickle | March 28, 2014 at 10:36 AM
KC says more marketing specialists needed. In particular technological skill that can determine what is possible with new data." .... As companies turn to digital...Franz Dill From The Eponymous Pickle | March 28, 2014 at 10:24 AM
I have been using the iPad for a note taking and consulting tool for some time now. With Evernote as an organization tool. This has been a problem at times when...Franz Dill From The Eponymous Pickle | March 28, 2014 at 10:14 AM
As a researcher and parent, I quickly learned that I have no patience for parenting books. When I got pregnant, I started trying to read parenting books and I threw...zephoria From Apophenia | March 27, 2014 at 03:56 PM
In Progressive Grocer: Report on how people interact with grocery shelves. We always knew it was more than just about having the eye level shelf. Its about...Franz Dill From The Eponymous Pickle | March 27, 2014 at 03:22 PM
As reported in today’s New York Times, the Industrial Internet Consortium (IIC) announced their formation today as an open membership group to further the development...Ann Drobnis From The Computing Community Consortium Blog | March 27, 2014 at 01:59 PM
Both Der Spiegel and the New York Times are reporting that the NSA has hacked Huawei pretty extensively, getting copies of the company's products' source code and...Bruce Schneier From Schneier on Security | March 27, 2014 at 01:33 PM
There's a private competition to identify new password hashing schemes. Submissions are due at the end of the month....Bruce Schneier From Schneier on Security | March 27, 2014 at 01:24 PM
Via Lisa Kaczmarczyk. How can networks help modernize a manufacturing economy? A look at changing manufacturing economy in NE Ohio.Franz Dill From The Eponymous Pickle | March 27, 2014 at 01:17 PM
Intriguing view from IBM. I further like the idea of using data and then creating simulations, perhaps more commonly called emulations, based on that data gathered...Franz Dill From The Eponymous Pickle | March 27, 2014 at 01:15 PM
Interesting research. Both vocabulary and question comprehension were positively correlated with generalized trust. Those with the highest vocab scores were 34...Bruce Schneier From Schneier on Security | March 27, 2014 at 12:54 PM
An omen of what? An increase in the number of giant squid being caught along the Sea of Japan coast is leading puzzled fishermen to fear their presence may be some...Bruce Schneier From Schneier on Security | March 27, 2014 at 12:41 PM
Originally posted on Meshed Insights & Knowledge:Draft regulations have been published in Britain that will finally end the anomaly where quotation, parody, caricature...Simon Phipps From Wild WebMink | March 27, 2014 at 10:41 AM
On March 26, Derek Thompson of The Atlantic published an article titled Which College – and Which Major – Will Make You Richest? The article provides the full...Ann Drobnis From The Computing Community Consortium Blog | March 27, 2014 at 09:34 AM
Interesting research into figuring out where Twitter users are located, based on similar tweets from other users: While geotags are the most definitive location...Bruce Schneier From Schneier on Security | March 27, 2014 at 08:43 AM
We sometimes hear of the (rare) scientist who fakes data or results of experiments. In theoretical computer science one cannot fake a theorem, particularly an important...Lance Fortnow From Computational Complexity | March 27, 2014 at 08:14 AM