From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Following is interesting, just starting to ingest:Blueprints for Value:This is Part 1 in a 14 part series that is my attempt to present, in small easily consumable...Franz Dill From The Eponymous Pickle | December 19, 2013 at 11:42 AM
A couple of policy changes recently, one that supposedly enhances privacy and another that could reduce it.
Google has been implementing perfect forward secrecy...Lance Fortnow From Computational Complexity | December 19, 2013 at 08:35 AM
This is neat:
Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...schneier From Schneier on Security | December 19, 2013 at 07:29 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
By just about any of the usual measures (people involved, media attention, VIP endorsements) this year’s CS Education Week was a huge success. We’ve had a couple...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 19, 2013 at 06:04 AM
I have a confession. All these years I've been evangelizing strongly statically typed languages, I've been going home at night and using Python. Not all the time...Jean From updated sporadically at best | December 19, 2013 at 01:31 AM
This year, (allegedly) a Harvard student performed the modern equivalent of pulling a fire alarm in order to avoid a final exam, in this case by sending an e-mail...Michael Mitzenmacher From My Biased Coin | December 19, 2013 at 12:37 AM
Brought to my attention, you can get this for the usual registration information, usually the first several chapters of each book, which can be helpful:Data Mining...Franz Dill From The Eponymous Pickle | December 18, 2013 at 05:13 PM
Preparations for the second Heidelberg Laureate Forum (HLF) are in full swing, and applications from young researchers to attend the second Forum are being accepted...Shar Steed From The Computing Community Consortium Blog | December 18, 2013 at 02:38 PM
In ComputerWorld: Very broadly biologically inspired, yes. Often replacing analogous statistcal methods. We used them in a number of useful applications in the...Franz Dill From The Eponymous Pickle | December 18, 2013 at 01:43 PM
Storytelling has a thread in this blog, from an investigation for a startup. Now Amazon has put up a Beta for doing screenplays. It is called Storybuilder. Not...Franz Dill From The Eponymous Pickle | December 18, 2013 at 01:18 PM
Unfortunately in an information minimizing slide show, but the topic is important. " ... Five Reasons Knowledge Management is Broken ... Knowledge management...Franz Dill From The Eponymous Pickle | December 18, 2013 at 11:32 AM
An obvious conclusion: you never get perfect answers. Analytics depends upon the correctness if the data in context, AND the power of the model being used.  ...Franz Dill From The Eponymous Pickle | December 18, 2013 at 11:17 AM
We will see the internet of automobiles before we see the Internet of things. An overview in ReadwriteWeb. The future of transportation will take us to the net...Franz Dill From The Eponymous Pickle | December 18, 2013 at 10:59 AM
Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...schneier From Schneier on Security | December 18, 2013 at 10:59 AM
The global smartphone penetration continues to increase. Up to 60% by 2019 says this report. Franz Dill From The Eponymous Pickle | December 18, 2013 at 07:37 AM
In Wired: I continue my look at the use of in store location and communication. Something we thought a lot about in the innovation lab, but never had the technology...Franz Dill From The Eponymous Pickle | December 17, 2013 at 08:31 PM
On April 2, 2013, President Obama launched the Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative to revolutionize our understanding...Shar Steed From The Computing Community Consortium Blog | December 17, 2013 at 04:43 PM
We were asked early on: What is the value for quantum computing? Here a look in particular at the financial industry. With mention of our contact in quantum"...Franz Dill From The Eponymous Pickle | December 17, 2013 at 02:34 PM
In Information Management: Extract, Transfer and Load (ETL) is a key process for the use of information to make it ready for analytics. It's changing to make...Franz Dill From The Eponymous Pickle | December 17, 2013 at 02:34 PM
Editor's Note:
This blog piece from our partners at Change the Equation details their recent report on the continued underrepresentation of women in computing,
... From Computer Science Teachers Association | December 17, 2013 at 01:57 PM