From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A very good post and video about how newspapers saw their future in the early 1990s. Which describes how a Knight Ridder innovation group saw the future of...Franz Dill From The Eponymous Pickle | August 13, 2011 at 05:18 PM
Mark Montgomery points me to a post on Boris Evelson's blog on Forrester's site regarding the total cost of BI ownership. Some very good comment interaction including...Franz Dill From The Eponymous Pickle | August 13, 2011 at 04:29 PM
LED lights can be flickered very quickly to transmit data. It could replace Wi-Fi under some conditions, though it does require line of sight or easily reflected situations...Franz Dill From The Eponymous Pickle | August 13, 2011 at 02:52 PM
The three men in the image on the right have something in common: Rush Holt, whoErwin Gianchandani From The Computing Community Consortium Blog | August 13, 2011 at 02:15 PM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | August 12, 2011 at 09:28 PM
Often things slow down in the summer, but that’s not been the case for USACM this year. We’ve been busy commenting on various government proposals related to computing...David B. From U.S. Public Policy Committee of the ACM | August 12, 2011 at 09:08 PM
My new book, Liars and Outliers, has a cover.
Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...schneier From Schneier on Security | August 12, 2011 at 07:09 PM
Sand's most recent newsletter on neuroscience methods covers a number of interesting papers and articles on the topic. If you have not read about neuromarketing...Franz Dill From The Eponymous Pickle | August 12, 2011 at 06:36 PM
This summer I was able to attend three Computer Science conferences this summer which were CS4HS:
http://www.cs4hs.com/participating-schools-2011.html
at two... From Computer Science Teachers Association | August 12, 2011 at 06:00 PM
The African crested rat applies tree poison to its fur to make itself more deadly.
The researchers made their discovery after presenting a wild-caught crestedAcokanthera...schneier From Schneier on Security | August 12, 2011 at 04:13 PM
A couple months ago, I blogged about David Ferrucci’s excellentErwin Gianchandani From The Computing Community Consortium Blog | August 12, 2011 at 02:56 PM
I saw this post about IBM's first personal computer, not the consumer PC, but the IBM 5150. In 1981 we received a loaner from IBM. One ended up in our Chairman's...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:56 PM
This seems like a really bad idea:
...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...schneier From Schneier on Security | August 12, 2011 at 02:46 PM
MJ Perry on US consumer spending on goods made in China. Less than 2%. Surprising that it is so low.Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:43 PM
Is it more fun to shop online in 3D rather than 2D? I experimented with this concept in the seminal virtual community Second Life, and found it less than satisfying...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:32 PM
Interesting development I was late to:
" ... Creating a social network is so last week. Today, American Express is unveiling a social media platform called "Link...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:29 PM
Wolfram's blog has a long post on Computable Document Format (CDF) which explains it nicely. Now experimentally built into WolframAlpha. The idea of having a...Franz Dill From The Eponymous Pickle | August 12, 2011 at 04:46 AM
The Gordon and Betty Moore Foundation has just announced a Request for Ideas (RFI) about Data Intensive Science: The increasing volume and complexity of scientific...Erwin Gianchandani From The Computing Community Consortium Blog | August 12, 2011 at 01:43 AM
Just starting to read: Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade us to Buy by Martin Lindstrom. To be available September 20. Have...Franz Dill From The Eponymous Pickle | August 12, 2011 at 12:48 AM
Below is a list of items with policy relevance from the May issue of Communications of the ACM. As always, much of the material in CACM is premium content, and...David B. From U.S. Public Policy Committee of the ACM | August 11, 2011 at 10:17 PM