From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The following is a special contribution to the CCC blog from Will Barkis, Project Lead, Mozilla Ignite. Mozilla, in partnership with the National Science Foundation...Shar Steed From The Computing Community Consortium Blog | February 20, 2013 at 05:07 PM
High Roman Wall, originally uploaded by webmink. We went walking yesterday around the remains of the Roman town Calleva Atrebatum in Silchester, Hampshire. This...Simon Phipps From Wild WebMink | February 20, 2013 at 03:40 PM
The politician. He will get people to collaborate on joint projects. How to recognize: He knows everyone! Pro: He makes things happen irrespective of the available...Daniel Lemire From Daniel Lemire's Blog | February 20, 2013 at 03:07 PM
How international soccer matches are fixed.
Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...schneier From Schneier on Security | February 20, 2013 at 01:29 PM
Interaction, the annual interaction design conference organized by IxDA (the global Interaction Design Association), will head to Amsterdam in in February 2014....Experientia From Putting People First | February 20, 2013 at 12:09 PM
A good overview piece. A review of some of Sherry Turkle's work. We examined this when we looked at Japanese work on robot companions and help mates. The idea...Franz Dill From The Eponymous Pickle | February 20, 2013 at 04:00 AM
In SCiam: When will the Internet reach its limit, and what are the implications? " ... The number of smartphones, tablets and other network-connected gadgets...Franz Dill From The Eponymous Pickle | February 19, 2013 at 10:58 PM
I was sent a copy of Gartner's Magic Quadrant publication for business intelligence and analytics software. A simplistic view, but always a good place to start...Franz Dill From The Eponymous Pickle | February 19, 2013 at 08:50 PM
As a non common-core subject, computer science relies on vigorous policy efforts to help our educational leaders understand the importance of including computing... From Computer Science Teachers Association | February 19, 2013 at 06:59 PM
There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...schneier From Schneier on Security | February 19, 2013 at 06:52 PM
Colleague, correspondent and former co-fellow of mine at SNCR Paul Gillin has written a book just brought to my attention. Attack of the Customers: Why Critics...Franz Dill From The Eponymous Pickle | February 19, 2013 at 03:51 PM
Recently Daniel Apon (grad student of Jon Katz at UMCP, but he also hangs out with me) proved a LOWER BOUND by proving an UPPER BOUND. His paper is here. I have...GASARCH From Computational Complexity | February 19, 2013 at 03:26 PM
As soon as I heard about the trademark dispute concerning Python, I tried to contact both sides and understand why there was even an issue. I got through straight...Simon Phipps From Wild WebMink | February 19, 2013 at 12:15 PM
Recently published Nielsen/Norman Group research shows that teens are (over)confident in their web abilities, but they perform worse than adults. Lower reading...Experientia From Putting People First | February 19, 2013 at 10:55 AM
Haptics are a favorite topic. We sought to gather large amounts of data about how hands interacted with products. Then mine that data for specific usage capabilities...Franz Dill From The Eponymous Pickle | February 19, 2013 at 05:05 AM
From my long time favorite collaborative future consulting group: Insititute for the Future (IFTF). A favorite topic, reinventing health care. I know of a number...Franz Dill From The Eponymous Pickle | February 19, 2013 at 05:00 AM
Back in the 90s we visited mathematician at the Santa Fe Institute, and learned to soon to be iconic statistic that people were separated on the web by a remarkably...Franz Dill From The Eponymous Pickle | February 19, 2013 at 04:26 AM
The DataMining Collective sends along links to Data Mining in R. Fairly well done as an introduction, of both the power and complexity of using the Package R.the...Franz Dill From The Eponymous Pickle | February 18, 2013 at 10:32 PM
After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...schneier From Schneier on Security | February 18, 2013 at 07:43 PM