From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Yesterday Microsoft announced that Windows 8 Release Preview is now available for download in 14 languages. This is the final pre-release, and includes Windows...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 1, 2012 at 02:31 PM
Recently, there have been several articles about the new market in zero-day exploits: new and unpatched computer vulnerabilities. It's not just software companies...schneier From Schneier on Security | June 1, 2012 at 11:48 AM
A number of news outlets have begun covering Plan X, a new five-year, $110 million cyberwarfare research program that theErwin Gianchandani From The Computing Community Consortium Blog | June 1, 2012 at 11:35 AM
Some interesting stats from Cisco on the increasing use of mobile and how it is driving internet traffic. A tidal wave is rising. " ... The Franz Dill From The Eponymous Pickle | May 31, 2012 at 07:34 PM
The second annual Hub Prize competition, honoring excellence in the retail experience, is now underway and will run through July 31. Honored entries will be featured...Franz Dill From The Eponymous Pickle | May 31, 2012 at 07:27 PM
I wrote about this sort of thing in 2006 in the UK, but it's even bigger business here:
The criminals, some of them former drug dealers, outwit the Internal Revenue...schneier From Schneier on Security | May 31, 2012 at 06:19 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Or more importantly how do students know that they are NOT interested in computer science? As I mentioned recently I had a conversation with Mike Zamansky from...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 31, 2012 at 04:02 PM
Compilers align data structures so that if you read an object using 4 bytes, its memory address is divisible by 4. There are two reasons for data alignment: Some...Daniel Lemire From Daniel Lemire's Blog | May 31, 2012 at 04:02 PM
Andrew Keen, a British-American entrepreneur and the author of “The Cult of the Amateur” and “Digital Vertigo”, tells CNN why he believes that Facebook is stealing...Experientia From Putting People First | May 31, 2012 at 03:55 PM
Ethnographic research by the Ericsson User Experience Lab, in collaboration with Trendethnography, aimed to discover unconscious behaviour related to health and...Experientia From Putting People First | May 31, 2012 at 03:42 PM
An acronym I have just learned: BYOD, bring your own devices. The policy of companies allowing employees to use their own devices for internal use. The practice...Franz Dill From The Eponymous Pickle | May 31, 2012 at 02:12 PM
Three new 17×17 items:
The paper (and some sequels) that SOLVED the 17×17 problem and the 17×18 problem are now available here. (I can't seem to link to the page...GASARCH From Computational Complexity | May 31, 2012 at 02:03 PM
An impressive special report in IEEE Spectrum on the Future of Money. With emphasis on the near future direction of electronic payment methods. Are we in the...Franz Dill From The Eponymous Pickle | May 31, 2012 at 01:42 PM
An idea related to previous work at MIT to determine how people reacted to ideas, products and interaction. We examined this previously to determine how people...Franz Dill From The Eponymous Pickle | May 31, 2012 at 01:35 PM
A particularly clever form of retail theft -- especially when salesclerks are working fast and don't know the products -- is to switch bar codes. This particular...schneier From Schneier on Security | May 31, 2012 at 11:17 AM
A number of videos from the Data Science Summit via Greenplum that are worth examining. Useful selection from 2011 as well: The few I have looked at so far...Franz Dill From The Eponymous Pickle | May 31, 2012 at 12:48 AM
Why we Lie. by Dan Ariely. Why we do, and how he has experimented with methods to increase and decrease the likelihood of the lie. As usual a thought provoking...Franz Dill From The Eponymous Pickle | May 31, 2012 at 12:40 AM
In the WSJ: More on wearable computing solutions like Google Glasses. A favorite topic based on our own experiments. Inevitable? " ... Some computer scientists...Franz Dill From The Eponymous Pickle | May 31, 2012 at 12:28 AM
When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...schneier From Schneier on Security | May 30, 2012 at 05:54 PM