From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is something we wrestled with a number of times. Experience did seem to show that a team should be co located to achieve the best effectiveness. Though the...Franz Dill From The Eponymous Pickle | January 16, 2011 at 02:44 PM
In Roughtype, a good piece on literary allusion and the effect of things like Google Search on communicating. We live in a world where fewer and fewer of the classics...Franz Dill From The Eponymous Pickle | January 16, 2011 at 03:59 AM
New book on a favorite topic, Cellular Automata, by Thomas M. Li The paradigm was used in the enterprise. Too expensive to assure that I will acquire this,...Franz Dill From The Eponymous Pickle | January 15, 2011 at 02:52 PM
In the CACM: A Firm Foundation for Private Data Analysis. What does it mean to preserve privacy? There is lots to do here.Franz Dill From The Eponymous Pickle | January 14, 2011 at 11:25 PM
I have been trying to convince local participants in the Let's Talk Science program that I can connect almost any of their course material to computer science. ...Gail Carmichael From The Female Perspective of Computer Science | January 14, 2011 at 10:23 PM
Another book added to the stack: Slow Down, Sell Faster!: Understand Your Customer's Buying Process and Maximize Your Sales, by Kevin Davis. We always tried...Franz Dill From The Eponymous Pickle | January 14, 2011 at 08:25 PM
Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...schneier From Schneier on Security | January 14, 2011 at 08:11 PM
I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...schneier From Schneier on Security | January 14, 2011 at 05:03 PM
IMedia Connections interviews Donna Sturgess of Buyology Inc. about what her company does to understand the non conscious interactions of consumer to media and...Franz Dill From The Eponymous Pickle | January 14, 2011 at 04:23 PM
Almost every day I receive electronic newsletters with articles discussing STEM and robotics competitions, but I rarely see a mention of Computer Science. So,ACTE... From Computer Science Teachers Association | January 14, 2011 at 02:55 PM
Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb.
A terrorist bomb is likely to be relatively small -- possibly only a fraction...schneier From Schneier on Security | January 14, 2011 at 01:07 PM
A Walled Wide Web for Nervous Autocrats I have been making the core point that this good WSJ article makes in my discussions with governments all over the world...Simon Phipps From Wild WebMink | January 14, 2011 at 01:02 PM
From Putting People First
Sherry Turkle, has been an ethnographer of our technological world for three decades, hosted all the while at one of its epicenters: MIT. A professor of the social...Experientia From Putting People First | January 14, 2011 at 09:50 AM
A good piece in Knowledge at Wharton about key aspects and directions of of the global economy in countries such as India and China. Particularly useful for...Franz Dill From The Eponymous Pickle | January 14, 2011 at 02:51 AM
“What is Jericho?” Those were the first words from “Watson,” the IBM supercomputer system that’s taking on Ken Jennings and Brad Rutter — the two winningest players...Erwin Gianchandani From The Computing Community Consortium Blog | January 13, 2011 at 11:01 PM
I see that former colleague Krista Neher's new book: The Social Media Field Guide, is now out. Much more here and ordering information. Also see her excellent...Franz Dill From The Eponymous Pickle | January 13, 2011 at 09:52 PM
Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate.
Those lights introduced...schneier From Schneier on Security | January 13, 2011 at 06:54 PM
A ringer is an impostor, especially one whose pretense is intended to gain an advantage in a competition.
This definition is from
Wikipedia and
agrees with what...GASARCH From Computational Complexity | January 13, 2011 at 06:41 PM