From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Google Lat Long: Having been involved in several crowd sourcing efforts, its always good to see further and more complex examples. Mapping would seem to be...Franz Dill From The Eponymous Pickle | June 22, 2012 at 08:08 PM
I am writing this at the Games, Learning and Society Conference (http://www.glsconference.org/2012/index.html) in Madison, Wisconsin. This is an interesting and... From Computer Science Teachers Association | June 22, 2012 at 06:36 PM
As a grad student in anthropology, Gabriella Coleman was warned that studying the culture of computer hackers would make it hard to get a job teaching in a university...Experientia From Putting People First | June 22, 2012 at 03:26 PM
Yes, it's clever:
The basic problem is the average haul from a bank job: for the three-year period, it was only schneier From Schneier on Security | June 22, 2012 at 12:20 PM
A random cross-section of our first 400 posts (src) Brian Lara remains the only cricket batsman to score 400 or more runs in one innings of a Test Match. In fact...Pip From Gödel's Lost Letter and P=NP | June 22, 2012 at 11:57 AM
Back in April, I was featured on STEMinist and forgot to mention it here!Find out what my answers were to such questions as 'What inspired you to pursue a career...Gail Carmichael From The Female Perspective of Computer Science | June 22, 2012 at 02:15 AM
I have just become involved in a new collaboration with James Tenser of VSN Strategies. " ... Consultant to the retail consumer products industry and authorSee...Franz Dill From The Eponymous Pickle | June 21, 2012 at 07:43 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Anyone who reads this blog regularly knows that I really believe that we need more computer science in education long before university. The only national influence...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 21, 2012 at 07:30 PM
Interesting conclusion by Cormac Herley, in this paper: "Why Do Nigerian Scammers Say They are From Nigeria?"
Abstract: False positives cause many promising detection...schneier From Schneier on Security | June 21, 2012 at 06:03 PM
People create profiles on social network sites and Twitter accounts against the background of an audience. This paper by Alice Marwick argues that closely examining...Experientia From Putting People First | June 21, 2012 at 03:56 PM
When communicating, context is king. A breakthrough in modelling context in human communication could make computers better conversationalists, according to cognitive...Experientia From Putting People First | June 21, 2012 at 03:06 PM
It has been obvious that the US Postal Service needs to adapt to change. Wharton discusses this in some detail. They have changed considerably, introducing many...Franz Dill From The Eponymous Pickle | June 21, 2012 at 01:23 PM
In CACM: Reexamining the popular meme of tight connectivity of our social network. The small world. In 2000 we visited the Santa Fe Institute for a workshop...Franz Dill From The Eponymous Pickle | June 21, 2012 at 01:00 PM
“How is the general population of researchers and institutions to meet [the needs of] ‘Big Data’?” That was the question posed last week by Ian Foster, director...Erwin Gianchandani From The Computing Community Consortium Blog | June 21, 2012 at 12:00 PM
MIT scientists are working on a bottle of ketchup where you CAN get out every last drop. See here for details and some nice videos of the new bottle in action....GASARCH From Computational Complexity | June 21, 2012 at 11:32 AM
It's not a new idea, but Apple Computer has received a patent on "Techniques to pollute electronic profiling":
Abstract: Techniques to pollute electronic profiling...schneier From Schneier on Security | June 21, 2012 at 10:51 AM
The draft Communications Data Bill is of great concern, not primarily because it lacks controls over who can access private data – these will be added – but because...Simon Phipps From Wild WebMink | June 21, 2012 at 09:00 AM