From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Universities require their professors to publish research papers. Yet publishing your research has little to do with most of the teaching that goes on in universities...Daniel Lemire From Daniel Lemire's Blog | December 28, 2012 at 11:56 PM
Good article.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 28, 2012 at 09:16 PM
I’ve written a bit about my holiday project to try the Raspberry Pi as a PBX over on InfoWorld today.Simon Phipps From Wild WebMink | December 28, 2012 at 08:00 PM
From "The Insider's TSA Dictionary":
Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...schneier From Schneier on Security | December 28, 2012 at 06:34 PM
Fascinating article.
Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison...schneier From Schneier on Security | December 28, 2012 at 12:37 PM
During the early days of our cognitive science work we often asked this question. Who among Fortune 500 companies have used techniques to measure and understand...Franz Dill From The Eponymous Pickle | December 28, 2012 at 03:55 AM
In IEEE Spectrum: Will this system end by 2018? The 134 year old public phone network is dying. What are the implications of changes to the network and how...Franz Dill From The Eponymous Pickle | December 28, 2012 at 03:30 AM
I don't normally like yearly predictions. But I found these to be thought provoking. They all deal with the long proposed suggestion that increasingly transparent...Franz Dill From The Eponymous Pickle | December 28, 2012 at 03:02 AM
Research at Ga Tech is using 'deception' methods used in nature to enhance behavioral models. Have always been interested in biological models. They have often...Franz Dill From The Eponymous Pickle | December 28, 2012 at 02:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A lot of people are thinking about the future this time of year. I’ve got a few ideas myself. This is the year I’ve done a lot with apps on phones and tablets....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 27, 2012 at 11:21 PM
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work?
Elcomsoft Forensic Disk...schneier From Schneier on Security | December 27, 2012 at 07:02 PM
As we turn our thoughts from Turing to Erdős, a look back at the complexity year that was. Written with help from co-blogger Bill Gasarch.
The complexity result...Lance Fortnow From Computational Complexity | December 27, 2012 at 01:59 PM
In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...schneier From Schneier on Security | December 27, 2012 at 12:21 PM
From Inside Analysis. Here I disagree in one sense and agree in another. . It is true that it has never entirely been about the size of the data. What we have...Franz Dill From The Eponymous Pickle | December 27, 2012 at 05:12 AM
In CACM: News aggregation is a common thing in the internet. Many sites and blogs find news in their specialty areas, and the results are redistributed to different...Franz Dill From The Eponymous Pickle | December 27, 2012 at 03:04 AM
Akin to the $99 laptop, the $99 tablet, which I wrote about in the enterprise some long time ago with the hope of getting some support to drive it world-wide. Is...Franz Dill From The Eponymous Pickle | December 27, 2012 at 12:10 AM
An excellent article by MIT’s Bill Bonvillian, just out in the MIT Press journal Innovations. Bill’s prescription: The U.S. must develop an integrated strategy...Ed Lazowska From The Computing Community Consortium Blog | December 26, 2012 at 11:31 PM
A big part of this is reorganizing search, a big component of our use of the Web. This article talks about that from the search engine Bing's perspective. Isee...Franz Dill From The Eponymous Pickle | December 26, 2012 at 08:00 PM
My school celebrated CS Ed Week with a visit from alumni who are working in CS-related careers. One alumnus spoke to my students over skype about his career in... From Computer Science Teachers Association | December 26, 2012 at 07:26 PM
Battle testing an innovation strategy. In the McKinsey Quarterly. This does remind me of defense department approaches, that were reimplemented in big enterprise...Franz Dill From The Eponymous Pickle | December 26, 2012 at 07:06 PM