From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm sure this is a pirated copy.
Looking at it, it's amazing how long ago twenty years was.schneier From Schneier on Security | January 24, 2014 at 01:43 PM
The National Science Foundation (NSF) has released a Dear Colleague Letter (DCL) on “Preparing Applications to Participate in Phase I Ideas Labs on Undergraduate...Ann Drobnis From The Computing Community Consortium Blog | January 24, 2014 at 12:38 PM
So what is complexity science and how can it be useful? From the Santa Fe Institute. A long time partner of ours in this space, that helped us navigate its usefulness...Franz Dill From The Eponymous Pickle | January 24, 2014 at 11:21 AM
From TDWI: I like looking at this as a business case. " ... What do companies do when they need the power of analytics to be increased with decision support...Franz Dill From The Eponymous Pickle | January 24, 2014 at 10:21 AM
Related to my recent post on NantMobile. Adage Global talks about the Chinese the move forward. Yes, I am seeing it." ... Mobile Advertising Lags China's Smartphone...Franz Dill From The Eponymous Pickle | January 24, 2014 at 09:43 AM
This is an interesting way to characterizing income inequality as a security issue:
…growing inequality menaces vigorous societies. It is a proxy for how effectively...schneier From Schneier on Security | January 24, 2014 at 07:51 AM
In CACM: More on this interesting topic. " ... In this article, we review the progress that has been made in developing architectures for full-scale quantum computers...Franz Dill From The Eponymous Pickle | January 24, 2014 at 12:06 AM
In the Cisco Blog: (Which I have found to be very informative). Remember the hacked refrigerator." ... The SANS Institute just completed a survey on the security...Franz Dill From The Eponymous Pickle | January 23, 2014 at 04:42 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTWATCH
(TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...schneier From Schneier on Security | January 23, 2014 at 03:39 PM
Google adds sources to search results, via its Knowledge Graph. A suggestion in the piece suggests that a better solution would be a reliability score based on...Franz Dill From The Eponymous Pickle | January 23, 2014 at 01:56 PM
Innovating faster. And focusing your innovation to value. Part of that task is to be able to evaluate innovations in context, as quickly and accurately as possible...Franz Dill From The Eponymous Pickle | January 23, 2014 at 11:17 AM
Several years ago I worked on a project meant to focus key data about operations to firefighters. A kind of augmented reality for a highly dynamic task.  ...Franz Dill From The Eponymous Pickle | January 23, 2014 at 11:12 AM
When I went to college in the early 80's, students protested against college endowments invested in companies that had business in apartheid South Africa. My mother...Lance Fortnow From Computational Complexity | January 23, 2014 at 11:01 AM
Tim Hartford talks about consumer manipulation:
Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...schneier From Schneier on Security | January 23, 2014 at 08:03 AM
Examining the curious role of brand in the product life cycle By James Richardson, Ph.D. on January 22nd, 2014 A new report debunks the notion that brand defines...Franz Dill From The Eponymous Pickle | January 23, 2014 at 12:30 AM
In Computing Now: A snapshot of current trends in visualization. " ... For this issue of Computing Now, we gathered a set of articles that exemplifies current...Franz Dill From The Eponymous Pickle | January 22, 2014 at 09:44 PM
All you have to do is create the PERFECT March Madness bracket. If you manage to do so, Warren Buffett and Berkshire Hathaway will pay you $1,000,000,000, as reported...Ann Drobnis From The Computing Community Consortium Blog | January 22, 2014 at 04:08 PM
Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTSTAND
(TS//SI//REL) An active 802.11 wireless exploitation and injection...schneier From Schneier on Security | January 22, 2014 at 03:15 PM
Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...schneier From Schneier on Security | January 22, 2014 at 01:19 PM
In Knowledge@Wharton: After the home and office, the automobile is the next place to deal with data and decision. It will include many challenges ." ... TheIf...Franz Dill From The Eponymous Pickle | January 22, 2014 at 12:57 PM