From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ahead of next week’s Dutch election, the UK think tank Demos launched Populism in Europe: Netherlands, which analyses the rise of Geert Wilders’ Partij voor de...Experientia From Putting People First | September 6, 2012 at 03:12 PM
Marko Athisaari, Nokia’s head of design, is pushing a general overall vision where advanced function is blended into unforgettable form¿post-industrial form. The...Experientia From Putting People First | September 6, 2012 at 02:27 PM
Among the many conference/journal discussions, one systems person said the reason they don't publish in journals is that their work is very dependent on current...Lance Fortnow From Computational Complexity | September 6, 2012 at 02:01 PM
According to a recent multi-country study commissioned by Intel Corporation and conducted by Ipsos Observer on “Mobile Etiquette,” the majority of adults and teens...Experientia From Putting People First | September 6, 2012 at 01:57 PM
A study by the Pew Research Center, released Wednesday, found that among Americans adults who use smartphone apps, half had decided not to install applications...Experientia From Putting People First | September 6, 2012 at 01:45 PM
We’ve blogged extensively in this space over the last few months about the promise of Big Data science and engineering, including stories describing how very large...Kenneth Hines From The Computing Community Consortium Blog | September 6, 2012 at 01:20 PM
In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop.
When I...schneier From Schneier on Security | September 6, 2012 at 11:48 AM
MJ Perry reports on online instruction at Marginal University. Another example of college courses online." ... We think education should be better, cheaper, and...Franz Dill From The Eponymous Pickle | September 6, 2012 at 06:52 AM
Well thought out piece .in Mashable. " ... When defining and developing strategy, marketers and agencies must ensure that their clients understand that strategy...Franz Dill From The Eponymous Pickle | September 6, 2012 at 06:15 AM
I was introduced to a new and visually instructive book on optimizing the supply chain: Supply Chain Network Design: Applying Optimization and Analytics to the...Franz Dill From The Eponymous Pickle | September 6, 2012 at 05:59 AM
A new logo for MS, also has some links to past logos of Windows. We traveled to Redmond way back then during Windows 1, talked to Gates, who tried to convince...Franz Dill From The Eponymous Pickle | September 6, 2012 at 05:38 AM
More on robots improvising. An important step.The ones that will ultimately be able to sense. react to and plan for their future under a given set of goals will...Franz Dill From The Eponymous Pickle | September 6, 2012 at 05:34 AM
DRM farces are like London buses. You wait for ever, and then several come along at once. After writing my story for ComputerWorld about the blackout of the Hugo...Simon Phipps From Wild WebMink | September 5, 2012 at 10:38 PM
Liars and Outliers (along with two other books: Kip Hawley's memoir of his time at the TSA and Against Security, by Harvey Molotch) has been reviewed in the Wall...schneier From Schneier on Security | September 5, 2012 at 07:04 PM
The University of Maryland at College park is having a Theory Day on Wed Oct 24! Come hear
Distinguished talks by Julia Chuzhoy and Venkataesan Guruswami!
Short...GASARCH From Computational Complexity | September 5, 2012 at 04:08 PM
In this fascinating piece of research, the question is asked: can we surreptitiously collect secret information from the brains of people using brain-computer interface...schneier From Schneier on Security | September 5, 2012 at 11:06 AM
First day of lecture for CS 222, Algorithms at the End of the Wire. They stuck me in a classroom that holds 20 comfortably, and 25 or so can be done. I'm pretty...Michael Mitzenmacher From My Biased Coin | September 5, 2012 at 03:32 AM
The CSTA is pleased to announce the launching of its student poster contest, "We are the Faces of Computing". For this contest, students are asked to create a poster... From Computer Science Teachers Association | September 4, 2012 at 11:57 PM
How we cope with overloaded words and symbols src Georg Cantor invented not only the concepts of transfinite cardinal and ordinal numbers, but also the notation...KWRegan From Gödel's Lost Letter and P=NP | September 4, 2012 at 09:13 PM
As we blogged in this space last month, Judea Pearl – winner of the 2011 ACM A. M. Turing Award ”for fundamental contributions to artificial intelligence through...Erwin Gianchandani From The Computing Community Consortium Blog | September 4, 2012 at 02:56 PM