From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The National Science Foundation (NSF) sought comments on the Federal Cybersecurity Research and Development Plan. The plan was released in late 2011, and NSF was...David B. From U.S. Public Policy Committee of the ACM | December 20, 2012 at 06:23 PM
In the HBR Blogs: A video interview with Alexandra Samuel. Some interesting points here. Yes, I believe this can be done, selectively. I do not yet believeVision...Franz Dill From The Eponymous Pickle | December 20, 2012 at 06:07 PM
In her work anthropologist Nancy Fried Foster applies anthropological principles to the study of the university’s libraries and their users. By focusing on the...Experientia From Putting People First | December 20, 2012 at 04:24 PM
Smart Design’s Dan Saffer discusses on Fast Company on how we should interact with the automobiles of the (near) future: “What will this feel like, riding in our...Experientia From Putting People First | December 20, 2012 at 04:04 PM
Longtime political operative Joe Trippi advocates a bottom-up, people-centered politics, and cheers the innovations of Obama 2012, saying they restored the primacy...Experientia From Putting People First | December 20, 2012 at 02:29 PM
Is your management thinking about allowing people to login to your precious systems by using their Facebook, Google or LinkedIn accounts? What are the risks?...Pascal Meunier From CERIAS Blog | December 20, 2012 at 02:28 PM
Is your management considering logins using Facebook, Google or LinkedIn accounts? What are the risks? One consideration is password policies. I experimented...Pascal Meunier From CERIAS Blog | December 20, 2012 at 02:28 PM
The UK government’s deficit reduction plan may fall short of its targets, prompting speculation that austerity measures will have to continue into the next parliament...Experientia From Putting People First | December 20, 2012 at 02:22 PM
The "Great Firewall of China" is now able to detect and block encryption:
A number of companies providing "virtual private network" (VPN) services to users in...schneier From Schneier on Security | December 20, 2012 at 12:32 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I don’t think many people set out to be thought leaders. I sure didn’t but yet I have been called that from time to time. I think that is more flattering than true...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 20, 2012 at 10:21 AM
This video message from EU vice president Neelie Kroes includes a fantastic explanation of the benefits of open source for public administrations. Simon Phipps From Wild WebMink | December 20, 2012 at 09:25 AM
Somewhere I read that I should buy a plane ticket three months before a trip in order to get the best price. If that's right, then I'm almost two weeks overdue... From Computer Science Teachers Association | December 19, 2012 at 11:57 PM
In AdAge: Why Mobile Ads Still Fail. Interesting look into the industry and related statistics. Is it because we just don't want them on our phone?Franz Dill From The Eponymous Pickle | December 19, 2012 at 08:38 PM
There's a nice story about my research on the Carleton website. I'm particularly happy to see it because it hasn't been easy to figure out my exact thesis project...Gail Carmichael From The Female Perspective of Computer Science | December 19, 2012 at 06:00 PM
Having better terminology for innovation, like it is for many things, makes lots of sense. I find myself often getting into debates about analytics based on this...Franz Dill From The Eponymous Pickle | December 19, 2012 at 05:05 PM
If you're looking for a worthwhile project, here's something that could benefit most security practitioners. The application "fail2ban" has been extremely useful...Pascal Meunier From CERIAS Blog | December 19, 2012 at 05:00 PM
One of the mysteries of computational theory source—our congratulations George Nemhauser is one of the world experts on all things having to do with large-scale...Pip From Gödel's Lost Letter and P=NP | December 19, 2012 at 03:49 PM
A short piece on the use of visualization methods at Oak Ridge Labs. Using multiple projectors and images for analytics. Working on a project now that includes...Franz Dill From The Eponymous Pickle | December 19, 2012 at 02:51 PM
This is an interesting blog post:
Buried inside a recent United Nations Office on Drugs and Crime report titled Use of Internet for Terrorist Purposes one canHere's...schneier From Schneier on Security | December 19, 2012 at 12:47 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week was Computer Science Education week aka CSEdWeek. This was by far the biggest most active CSEdWeek yet. There are over 3,400 pledges to do something...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 19, 2012 at 10:31 AM