From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Vesa-Matti Lahti, senior lead of the Energy Programme at Sitra, the Finnish Innovation Fund, describes why much more is needed than just correct information if...Experientia From Putting People First | March 25, 2011 at 08:52 PM
As you may recall from my links a few days ago, I actively avoid using Skype. I’ve explained why in more detail over on ComputerWorldUK today.Simon Phipps From Wild WebMink | March 25, 2011 at 06:38 PM
I have been doing some exploration of Executive Information Systems (EIS) and BI, which I was involved in for a number of years, and was sent this excerpt: - "Executive...Franz Dill From The Eponymous Pickle | March 25, 2011 at 06:02 PM
A novel in brain computer-neural implant has now passed the 1000 day milestone: " ... A paralysed woman was still able to accurately control a computer cursor...Franz Dill From The Eponymous Pickle | March 25, 2011 at 05:43 PM
This is an interesting read:
It was a question that changed his life, and changed mine, and may have changed -- even saved -- all of ours by calling attention...schneier From Schneier on Security | March 25, 2011 at 05:22 PM
I was at the Board of Advisers meeting for the Anita Borg Institute for Women and Technology (ABI) last week in Mountain View when it struck me just how much of...Gail Carmichael From The Female Perspective of Computer Science | March 25, 2011 at 04:08 PM
A GigaOm look at why some Apps work and some do not, by Om Malik. Fundamentally he suggests its all about either utility or happiness. Franz Dill From The Eponymous Pickle | March 25, 2011 at 02:04 PM
As in most cases where groups of people are involved, it is not mostly about the technology. We used Greif's work in the 80s about 'Computer Supported Cooperative...Franz Dill From The Eponymous Pickle | March 25, 2011 at 01:40 PM
Last Wednesday, the NSF announced the second round of an international grant competition designed to spur cutting-edge research in the humanities and social sciences...Erwin Gianchandani From The Computing Community Consortium Blog | March 25, 2011 at 01:26 PM
LiveMint.com, the Indian online partner publication of the Wall Street Journal, reports on IndiaExperientia From Putting People First | March 25, 2011 at 11:15 AM
Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users":
Abstract: Tor is a popular low-latency anonymity...schneier From Schneier on Security | March 25, 2011 at 09:34 AM
A judicial case addresses the right to re-post. But I don't think this is the last we will hear about fair-use in blogs.Franz Dill From The Eponymous Pickle | March 25, 2011 at 06:26 AM
Sitting at an academic conference years ago, I was struck by the marginalization of various voices under the guise of inclusion. There were queer panels and race...zephoria From Apophenia | March 25, 2011 at 03:42 AM
I’m nearing the end of the amazingly busy patch that March has turned out to be for me, and I can tell I must be getting older because I am running out of energy...Simon Phipps From Wild WebMink | March 24, 2011 at 11:35 PM
From the Burghard Group: Leadership Lessons From P&G, 10 Lessons from Leaders: 1.Get to know people as individuals. Group activities are great for building teams...Franz Dill From The Eponymous Pickle | March 24, 2011 at 09:26 PM
President Obama wants to spend $90 million on ARPA-ED, an Advanced Research Projects Agency for Education. The goal is to fund porjects that will "transform teaching... From Computer Science Teachers Association | March 24, 2011 at 06:17 PM
The ongoing saga of the Google Books case will continue, according to a recent opinion from the judge overseeing the negotiated settlement. Google Books prompted... From U.S. Public Policy Committee of the ACM | March 24, 2011 at 05:51 PM
Interesting:
Abstract: Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse...schneier From Schneier on Security | March 24, 2011 at 05:46 PM
Starbucks payment method using mobile phones and 2D bar code scanning is apparently quite successful. Now over three million people have used the capability. There have...Franz Dill From The Eponymous Pickle | March 24, 2011 at 02:52 PM