From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Aram Harrow and Gil Kalai debate “Conjecture 1″ William Wootters and Wojciech Zurek were office-mates in 1979 as graduate students at U.T. Austin in John Wheeler’s...KWRegan From Gödel's Lost Letter and P=NP | September 16, 2012 at 05:17 AM
Ethnographer at PARC speaks: " ... I spend a lot of time observing ordinary people going about their business — in hospitals, shopping malls, living rooms, even...Franz Dill From The Eponymous Pickle | September 15, 2012 at 06:40 PM
Eldercare robotics. A direction pioneered in Japan that that we saw demonstrated at a major manufacturer. This approach designed for seniors with cognitive impairment...Franz Dill From The Eponymous Pickle | September 15, 2012 at 06:23 PM
Erik Brynjolfsson and Andrew McAfee of MIT have posted an interesting entry to the Harvard Business Review Blog about big data and corporate management: Big data...Erwin Gianchandani From The Computing Community Consortium Blog | September 15, 2012 at 05:51 PM
An overview of predictive analytics in Information Management. Reasonably good overview of analytics today. It is all about utilizing data we are gathering today...Franz Dill From The Eponymous Pickle | September 15, 2012 at 04:42 PM
Brought to my attention regarding agile data consolidation, late but worth noting:" ... Teradata (NYSE: TDC), the leading analytic data solutions company, and Kalido...Franz Dill From The Eponymous Pickle | September 15, 2012 at 04:26 PM
It seems Apple wasn’t serious when it promised the European commission it would use micro-USB. Read more about it in my article in ComputerWorldUK this week.Simon Phipps From Wild WebMink | September 15, 2012 at 08:54 AM
In Valdés, Spain.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | September 14, 2012 at 09:15 PM
Correspondent Chris Herbert sends along a link to Voziq. ... Monitor the social web for mentions of your brand, competitors and industry- Benchmark how you compare...Franz Dill From The Eponymous Pickle | September 14, 2012 at 07:31 PM
Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...schneier From Schneier on Security | September 14, 2012 at 07:20 PM
I spent the past week in Dublin attending the 6th ACM International Conference on Recommender Systems (RecSys 2012). This young conference has become the premier...Daniel Tunkelang From The Noisy Channel | September 14, 2012 at 04:28 PM
This sort of attack will become more common as banks require two-factor authentication:
Tatanga checks the user account details including the number of accounts...schneier From Schneier on Security | September 14, 2012 at 04:23 PM
The first round of awards for next-generation robotics R&D through the National Robotics Initiative (NRI) are being announced today, according to White House Office...Erwin Gianchandani From The Computing Community Consortium Blog | September 14, 2012 at 02:47 PM
I mentioned Recorded Future's monitoring analysis of the embassy attacks. Now they have followed with a thirty minute video that examines the approach. A good...Franz Dill From The Eponymous Pickle | September 14, 2012 at 01:40 PM
From CIO: The ability to have Apps run on multiple mobile platforms. From Intel: "... "With transparent computing, software developers no longer must choose...Franz Dill From The Eponymous Pickle | September 14, 2012 at 01:05 PM
I was blown away by a paper by legal scholar Mark Lemley when I read it in full this week. He plausibly claims there’s a very simple and elegant solution to software...Simon Phipps From Wild WebMink | September 14, 2012 at 11:02 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was talking to a teacher, well chatting online via Facebook actually, and I described what he does as “thinking outside the textbook.” Speaking as someone who...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 14, 2012 at 09:42 AM
We live in an age of sharing. As consumers and online, we regularly share personal information, and generate new data through our browsing or purchasing history...Experientia From Putting People First | September 14, 2012 at 08:44 AM
Correspondent Gib Bassett curates The Connected Consumer. Which contains a number of items about consumer packaged goods that I had missed. Worth checking out...Franz Dill From The Eponymous Pickle | September 14, 2012 at 05:54 AM