From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Via Gib Bassett: Will Glass make Big Data into Huge Data? Yes, definitely if it becomes popular, and something like it will, we will be collecting increasing amounts...Franz Dill From The Eponymous Pickle | June 16, 2013 at 03:31 PM
By Mark Rasch† and Sophia Hannah‡
The NSA programs to retrieve and analyze telephone metadata and internet communications and files (the former we will call the...Gene Spafford From CERIAS Blog | June 15, 2013 at 09:28 PM
In the midst if a mobile application. But the value will be in efficiency, connectivity and supporting decisions from anywhere. Not advertising dollars from consumers...Franz Dill From The Eponymous Pickle | June 15, 2013 at 01:48 PM
Yes there are math issues in this activity William Banting may have created the first very popular diet. In 1863 he published the Letter on Corpulence, Addressed...rjlipton From Gödel's Lost Letter and P=NP | June 15, 2013 at 01:48 PM
This morning the College Board announced that the National Science Foundation has committed $5.2 million in funding to support the continued development of theBroadening... From Computer Science Teachers Association | June 14, 2013 at 11:31 PM
It's a novel behavior.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | June 14, 2013 at 09:53 PM
In the WSJ: A balanced review of correspondent Sally Satel and Scott Lilienfeld's book: Brainwashed: The Seductive Appeal of Mindless Neuroscience.Franz Dill From The Eponymous Pickle | June 14, 2013 at 07:11 PM
In Mediapost, Elissa Moses posts a good introduction about a number of non conscious methods and their use in marketing analysis. For a largely contrary critical...Franz Dill From The Eponymous Pickle | June 14, 2013 at 06:58 PM
It's amazing how many people fail to realize that computing can be a creative field. In fact, in many cases, it has to be! For example, it makes no sense for me...Gail Carmichael From The Female Perspective of Computer Science | June 14, 2013 at 05:39 PM
On April 1, I announced the Sixth Annual Movie Plot Threat Contest:
I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...schneier From Schneier on Security | June 14, 2013 at 05:20 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Wow! Free computers. Hard to ignore that one. If you are heading out to San Antonia for ISTE 2013 Microsoft has a deal for you. They are giving away free Microsoft...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 14, 2013 at 04:01 PM
I mentioned some time ago visiting a new Microsoft Store in the local mall. Located very close to the Apple store, which had been around for a couple of years....Franz Dill From The Eponymous Pickle | June 14, 2013 at 04:01 PM
Kroger and GS1 are beginning a three year Project Mercury effort to synchronize data. A key element of running any large, complex retail operation. " ... Under...Franz Dill From The Eponymous Pickle | June 14, 2013 at 03:38 PM
Researchers at Lawrence Berkeley National Laboratory and Northwestern University have conducted a study and found that moving common applications to the cloud can...Ann Drobnis From The Computing Community Consortium Blog | June 14, 2013 at 02:51 PM
An intriguing article on the employment of genius. By their carefully limiting definition. Seen this effect relatively often. Genius does not always combine...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:35 PM
In IEEE Spectrum: Cisco and iRobot working to produce a telepresence robot. Conceptually an appealing idea, but I wonder about the practicality before robotic...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:04 PM
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
In Industry Week:" ... Supply chain managers adopt new strategies to mitigate risks Research has shown that major interruptions in the supply chain can sap a company's...Franz Dill From The Eponymous Pickle | June 14, 2013 at 02:39 AM
From Tableau Software: Major global retailer on the use of visualization: " ... Tesco uses Teradata to warehouse their supply and inventory data. They've got...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:26 AM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM