From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker:
The discrepancy between the panic generated by terrorism and the deaths...schneier From Schneier on Security | August 18, 2011 at 06:32 PM
When AT&T had its monopoly, it could afford Bell Labs, a major research institution that bragged at having more Ph.D.s than any other university. Now very few companies...Lance From Computational Complexity | August 18, 2011 at 02:27 PM
IBM has announced a new chip " ... an experimental computer chip that emulates the way the brain processes information. IBMFranz Dill From The Eponymous Pickle | August 18, 2011 at 02:02 PM
Vending machines. Having seen them used to considerable effect in Japan, have always been interested in their application. Now they are vending drugs.
Franz Dill From The Eponymous Pickle | August 18, 2011 at 01:48 PM
Read about my discussion of WebOS with HP’s open source officer at OSCON, over on ComputerWorldUK now.Simon Phipps From Wild WebMink | August 18, 2011 at 12:58 PM
"Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger.
Abstract. Since Rijndael was chosen as the Advanced...schneier From Schneier on Security | August 18, 2011 at 11:12 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
We all know that students benefit for problem solving exercises. Creating these sorts of problems can be difficult and time consuming. Evaluating them and help...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 18, 2011 at 09:54 AM
Serious Games from Knowledge@Wharton, from the recent conference:
" ... Gamification -- the application of online game design techniques in non-game settingsFor...Franz Dill From The Eponymous Pickle | August 18, 2011 at 04:16 AM
Procter & Gamble's fabled word of mouth group Tremor, built during the early days of consumer social network understanding, has not been in the news lately, ...Franz Dill From The Eponymous Pickle | August 18, 2011 at 02:35 AM
Mark the calendar, gather up resources, and make some plans!
Computer Science Education Week (December 4th through 10th) is the opportunity to be part of a unified... From Computer Science Teachers Association | August 17, 2011 at 11:33 PM
Wharton Prof Marshall Fisher discusses his recently published book: The New Science of Retailing. I have read the book, and have reviewed and mentioned it inKnowledge...Franz Dill From The Eponymous Pickle | August 17, 2011 at 09:12 PM
A prison in Brazil uses geese as part of its alarm system.
There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack...schneier From Schneier on Security | August 17, 2011 at 06:51 PM
I just posted some questions about implementations of EZ Face Virtual Mirror and got the following response, Thanks!
Following your post about the Virtual Mirror...Franz Dill From The Eponymous Pickle | August 17, 2011 at 04:37 PM
Maga Design Group See their site for interesting examples of their mapping visuals, at the right a visual about supply chain design, they also have an interesting...Franz Dill From The Eponymous Pickle | August 17, 2011 at 03:50 PM
There is a continued growing interest in private label brands. Shoppers see them as lower cost, and retailers as higher profit. And they piggyback off the marketing...Franz Dill From The Eponymous Pickle | August 17, 2011 at 03:37 PM
In the WSJ:
With research from Procter & Gamble showing many consumers are not happy with dry cleaning, the company has launched Tide Dry Cleaners stores, which...Franz Dill From The Eponymous Pickle | August 17, 2011 at 03:34 PM
SmartOS.org A new operations system distribution emerges from the OpenSolaris/Illumos legacy. An excellent piece of work technically, bringing all the strengths...Simon Phipps From Wild WebMink | August 17, 2011 at 01:01 PM
Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.schneier From Schneier on Security | August 17, 2011 at 11:13 AM