From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
John Perry Barlow Tells Copyright Maximalists That They've Got The Fundamentals Wrong Great stuff from JPB here. Shame of it all is despite hist stature in all...Simon Phipps From Wild WebMink | May 28, 2011 at 01:01 PM
The site of author,entrepreneur and game designer Jesse Schell. A number of useful threads there. I have just received his book: The Art of Game Design: A Book...Franz Dill From The Eponymous Pickle | May 28, 2011 at 12:41 PM
From the CACM: Turing Award winner Leslie Valiant discusses machine learning, parallel computing, and computational neuroscience. Machine learning is a favorite...Franz Dill From The Eponymous Pickle | May 27, 2011 at 10:49 PM
As the pressure on and from political leaders to “regulate” the internet mounts, the need for basic infrastructure to switch from hierarchical to distributed control...Simon Phipps From Wild WebMink | May 27, 2011 at 03:41 PM
Very good piece on what is happening in this space. I think that the continues overflow of information that is occuring makes just-in-time an essential element...Franz Dill From The Eponymous Pickle | May 27, 2011 at 02:44 PM
I was part of the first generation of kids to receive computers as gifts. I was also part of the first generation of professionals to adopt computer-assisted tele...Daniel Lemire From Daniel Lemire's Blog | May 27, 2011 at 02:17 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’ve been working all week in C#. Now C# is a wonderful language if you are going to use semi-colons and curly braces. It fixes almost all of the issues I haveYou...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 27, 2011 at 01:21 PM
NameCoin at The Dot-bit Project With internet-control-freak politics everywhere now – just look at eG8 and PROTECTIP for example – the need for distributed infrastructure...Simon Phipps From Wild WebMink | May 27, 2011 at 01:03 PM
Good piece in the Harvard Blogs. In particular with a useful retail example: Wal-Mart. Which also includes criticism of how the company has handled things,. ...Franz Dill From The Eponymous Pickle | May 27, 2011 at 12:22 PM
All I know is what's in these two blog posts from Elcomsoft. Note that they didn't break AES-256; they figured out how to extract the keys from the hardware (iPhones...schneier From Schneier on Security | May 27, 2011 at 11:04 AM
From The Computing Community Consortium Blog
In light of the tornadoes that have devastated parts of the Midwest and South over the past several weeks,Erwin Gianchandani From The Computing Community Consortium Blog | May 27, 2011 at 10:16 AM
The second global edition of BLINK, a quarterly media industry magazine published by media agency MediaCom, looks into the future of TV. The 48 page magazine contains...Experientia From Putting People First | May 27, 2011 at 09:39 AM
The Internet of Elsewhere: The Emergent Effects of a Wired World by Cyrus Farivar Rutgers University Press May 2011 Abstract Through the lens of culture, The Internet...Experientia From Putting People First | May 27, 2011 at 07:49 AM
From Technology Review: Making 3D Models from multiple 2D photos: video. Features free Autodesk software. Worth a look. Done previously only using a laser scanner...Franz Dill From The Eponymous Pickle | May 26, 2011 at 10:20 PM
I am doing some research in the area of 'gamification' and the use of games to improve serious work processes. That and some emerging project work has led me to...Franz Dill From The Eponymous Pickle | May 26, 2011 at 09:20 PM
As part of ScienceLives — an occasional NSF/LiveScience series that “puts scientists under the microscope to figure out what makes them tick” — CCC Council member...Erwin Gianchandani From The Computing Community Consortium Blog | May 26, 2011 at 07:46 PM
It's not something I know anything about -- actually, it's not something many people know about -- but I've posted some links about the security features of the...schneier From Schneier on Security | May 26, 2011 at 06:57 PM