From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's been a forged Google certificate out in the wild for the past month and a half. Whoever has it -- evidence points to the Iranian government -- can, if...schneier From Schneier on Security | September 1, 2011 at 10:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I get questions. Oh boy do I get questions. I donAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 1, 2011 at 09:09 AM
In the next ten years, smart machines will enter virtually every domain of our lives, including assisting doctors during surgery, fighting on battlefields, building...Experientia From Putting People First | September 1, 2011 at 08:30 AM
Megan Garber of the Nieman Journalism Lab recently visited the New York Times R&D Lab and updates us on the latest interface developments there. The New York Times...Experientia From Putting People First | September 1, 2011 at 08:07 AM
We experimented with several applications of complexity models. Not sure we every truly embraced the idea as a general problem solving technique, but it is one...Franz Dill From The Eponymous Pickle | September 1, 2011 at 12:36 AM
An interesting acquisition. I2 is a company known for pattern recognition solutions. You do wonder how this will be linked to applications like Watson. Pattern...Franz Dill From The Eponymous Pickle | September 1, 2011 at 12:22 AM
In Wharton's long running set of online articles: New Retail Strategies: Offering a Better Fit for Today's Careful Consumers. Among a number of other things...Franz Dill From The Eponymous Pickle | August 31, 2011 at 08:23 PM
This job can't be fun:
This Public Affairs Specialist position is located in the Office of Strategic Communications and Public Affairs (SCPA), Transportation Security...schneier From Schneier on Security | August 31, 2011 at 05:30 PM
This article essentially describes mobile applications that use 'game dynamic' style relationship building. Looking at potential applications in the aisle for...Franz Dill From The Eponymous Pickle | August 31, 2011 at 03:32 PM
During Hurricane Irene I lost power for about 18 hours.
I was actually pleased how short this was. PEPCO (my power company)
did not tell us when power would beprior...GASARCH From Computational Complexity | August 31, 2011 at 03:08 PM
Software Freedom Day It's just two weeks away, get ready to join in! (tags: OpenSource FOSS Software Freedom) open80211s Meshed WiFi in every Linux device? Yes...Simon Phipps From Wild WebMink | August 31, 2011 at 01:02 PM
Social networking sites make it very difficult, if not impossible, to have undercover police officers:
"The results found that 90 per cent of female officers were...schneier From Schneier on Security | August 31, 2011 at 12:21 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A lot of people are looking into using Python in computer science education these days. Of course a lot of people are also using Visual Studio for Visual BasicPython...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 31, 2011 at 09:12 AM
The latest issue of Informs Analytics Magazine. News and topical articles on analytical methodologies from the premier business analysis and marketing science professional...Franz Dill From The Eponymous Pickle | August 31, 2011 at 01:45 AM
I blogged for the Institute for the Future for several years. They consulted with our C-suite and we were often asked to follow up. The are always saying some...Franz Dill From The Eponymous Pickle | August 30, 2011 at 07:58 PM
We met computer scientist Jaron Lanier while doing work with the Institute for the Future. In the Edge he talks about the local global flip. Quite a long rant...Franz Dill From The Eponymous Pickle | August 30, 2011 at 07:46 PM
It's actually pretty good.
Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...schneier From Schneier on Security | August 30, 2011 at 05:24 PM
We finally have some, even though the company isn't talking:
So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...schneier From Schneier on Security | August 30, 2011 at 03:52 PM
It has happened before:
In the WSJ: How a Grocer Bagged Profits
At its peak, the chain had nearly 16,000 stores. Critics charged it with competing unfairly by...Franz Dill From The Eponymous Pickle | August 30, 2011 at 03:37 PM