From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
To further address the personalized experience. In Technology Review. " .... The rejuvenated research labs at Yahoo are investigating ways to predict what users...Franz Dill From The Eponymous Pickle | February 11, 2014 at 09:18 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SURLYSPAWN
(TS//SI//REL TO USA,FVEY) Data RF retro-reflector. Provides return...schneier From Schneier on Security | February 11, 2014 at 03:55 PM
February 21, 2014 is the 2nd Annual Canadian Computing Education Day. It is an initiative of the Canadian Association of Computer Science/Association d'Informatique... From Computer Science Teachers Association | February 11, 2014 at 02:35 PM
In the lab we examined a number of ways to make grocery shopping smarter. This included a laptop strapped to the cart, a device embedded inside the handle. And...Franz Dill From The Eponymous Pickle | February 11, 2014 at 01:21 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are all I.T. Guys <sic> white males?INFOGRAPHIC - What Do IT People Really Do All Day? I'd hang this in my classroom if there were some women and some non-white...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 11, 2014 at 11:37 AM
The Computing Community Consortium (CCC) invites nominations for members to serve on its 20-person Council. We are looking for individuals who have ideas, energy...Ann Drobnis From The Computing Community Consortium Blog | February 11, 2014 at 10:58 AM
What are the advantages and challenges inherent in working with children in the design process for creating games or apps? How do you stop them getting bored, and...Experientia From Putting People First | February 11, 2014 at 10:38 AM
In Technology Review. Google seeking Deep learning. More on the DeepMind acquisition. With some concerns by those doing academic research. And motivation: ...Franz Dill From The Eponymous Pickle | February 11, 2014 at 10:04 AM
In the Forrester Blog: About Bosch making acquisitions to set themselves up for this integration. Worth thinking. Not sure there is enough difference betweensmart...Franz Dill From The Eponymous Pickle | February 11, 2014 at 09:30 AM
Via Stefan Conrady of Bayesia: Modeling Vehicle Choice and Simulating Market Share with Bayesian Networks Useful example of the technical application of Bayesian...Franz Dill From The Eponymous Pickle | February 11, 2014 at 09:18 AM
Cory Doctorow gives a good history of the intersection of Digital Rights Management (DRM) software and the law, describes how DRM software is antithetical to end...schneier From Schneier on Security | February 11, 2014 at 08:15 AM
We’ve got a new nation-state espionage malware. "The Mask" was discovered by Kaspersky Labs:
The primary targets are government institutions, diplomatic offices...schneier From Schneier on Security | February 11, 2014 at 07:57 AM
Talking to Strangers: Chinese Youth and Social Media by Tricia Wang Doctor of Philosophy in Sociology, University of California, San Diego, 2013 Professor Richard...Experientia From Putting People First | February 11, 2014 at 07:07 AM
Consumers want value for personal information. The survey specifics are interesting. " ... A new IBM (NYSE: IBM) study of more than 30,000 global consumers...Franz Dill From The Eponymous Pickle | February 10, 2014 at 06:14 PM
Assisting the blind with sonification, changing sensory information to sound. " ... Researchers at Universidad Carlos III de Madrid (UC3M) have developed an assistive...Franz Dill From The Eponymous Pickle | February 10, 2014 at 05:51 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
WISTFULTOLL
(TS//SI//REL) WISTFULTOLL is a UNITEDRAKE and STRAITBIZZARE plug...schneier From Schneier on Security | February 10, 2014 at 03:58 PM
BASF's internal network. An area we also worked in the enterprise, and were influenced by both BASF and IBM. Worth a closer look now regarding where they have...Franz Dill From The Eponymous Pickle | February 10, 2014 at 02:41 PM
DARPA’s new Memex program seeks user-defined, domain-specific search of public information, and plans to use its groundbreaking research to fight human trafficking...Shar Steed From The Computing Community Consortium Blog | February 10, 2014 at 02:11 PM
Farnam Jahanian, Assistant Director at the National Science Foundation (NSF) for the Computer and Information Science and Engineering (CISE) Directorate has sent...Ann Drobnis From The Computing Community Consortium Blog | February 10, 2014 at 09:10 AM