From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Thought provocative SXSW accelerator finalists. In particular the big data in the enterprise section, but more beyond that. " ... For the 2014 SXSW Accelerator...Franz Dill From The Eponymous Pickle | February 28, 2014 at 05:57 PM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 28, 2014 at 05:38 PM
As part of the government response to public concerns over national security surveillance programs, the President announced in January that there would be a review...David B. From U.S. Public Policy Committee of the ACM | February 28, 2014 at 05:02 PM
The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a Distinguished Lecture on...Ann Drobnis From The Computing Community Consortium Blog | February 28, 2014 at 03:27 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NEBULA
(S//SI//FVEY) Multi-Protocol macro-class Network-In-a-Box (NIB) system...schneier From Schneier on Security | February 28, 2014 at 03:16 PM
Regrettably presented as an infographic, but an interesting view of consumer segmentation. Points through to a white paper that requires registration. " .... The...Franz Dill From The Eponymous Pickle | February 28, 2014 at 02:48 PM
Can you trademark a phrase? To the extent to which you are willing to sue. In Language Log. A list of phrases and their defenders. Here the defenders are promoters...Franz Dill From The Eponymous Pickle | February 28, 2014 at 02:34 PM
In McKinsey: Some interesting views on manufacturing. " ... A Video: Shaping the future of manufacturing ... Advances in technology are allowing companies to...Franz Dill From The Eponymous Pickle | February 28, 2014 at 01:39 PM
Pointed out to me, this course on data analytics, from Duke, which includes a free PDF text. Examining. " ... Data Analysis and Statistical Inference. Part of...Franz Dill From The Eponymous Pickle | February 28, 2014 at 01:27 PM
A non technical description of a very technical set of methods for forecasting. Baum-Welch and Hidden Markov. Don't know much about this direction but looks to...Franz Dill From The Eponymous Pickle | February 28, 2014 at 01:20 PM
Computing is at the heart of one up-and-coming cultural trend – wearable technology. This emerging market is enabled by advances in computing, and it’s positioned...Shar Steed From The Computing Community Consortium Blog | February 28, 2014 at 01:04 PM
Solving is believing Cropped from source. Boris Konev and Alexei Lisitsa are both researchers at the University of Liverpool, who work in Logic and Computation....Pip From Gödel's Lost Letter and P=NP | February 28, 2014 at 11:10 AM
I like to throw off my academic colleagues outside of computer science by pointing out that much of our software relies on probabilities… down to the ubiquitous...Daniel Lemire From Daniel Lemire's Blog | February 28, 2014 at 10:55 AM
Just as we did in the case of CPTN’s threatened acquisition of Novell’s patent portfolio in 2011, the OSI and FSF have once again collaborated to file a briefing...Simon Phipps From Wild WebMink | February 28, 2014 at 09:46 AM
The Voynich Manuscript has been partially decoded. This seems not to be a hoax. And the manuscript seems not to be a hoax, either.
Here's the paper.
schneier From Schneier on Security | February 28, 2014 at 07:25 AM
In Retailwire: Another indication of how the world of retail is changing. And in particular the relationship between manufacturers and retailers. Do also read...Franz Dill From The Eponymous Pickle | February 27, 2014 at 06:24 PM
Editing Bots: Did not realize that so much WP editing was done with bots. Implications and dangers are still unclear. How does it influence confidence in the knowledge...Franz Dill From The Eponymous Pickle | February 27, 2014 at 06:09 PM
In CLickZ: What it is and why the hype? Most of us today use multiple devices. " ... Cross-device targeting, the ability to serve targeted advertising to consumers...Franz Dill From The Eponymous Pickle | February 27, 2014 at 06:02 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GENESIS
(S//SI//REL) Commercial GSM handset that has been modified to include...schneier From Schneier on Security | February 27, 2014 at 03:08 PM
A look at the humble histogram. In Flowingdata. There would not seem to be much to say about this, but the details are interesting. Comparing them to the similar...Franz Dill From The Eponymous Pickle | February 27, 2014 at 09:24 AM