From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Decimated. Vanquished. Demolished. As you probably know by now, those are but a few of the words being used to describe how “Watson” — the IBM question-answering...Erwin Gianchandani From The Computing Community Consortium Blog | February 18, 2011 at 02:19 PM
Moglen on Freedom Box and making a free net Eben’s ideas on a zero-interaction home server (“FreedomBox”) to route internet traffic safely and effectively seem...Simon Phipps From Wild WebMink | February 18, 2011 at 01:02 PM
NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this...schneier From Schneier on Security | February 18, 2011 at 12:22 PM
The World Economic Forum just came out with a report, “Personal Data: The Emergence of a New Asset Class,” that surely is going to raise some controversy, as it...Experientia From Putting People First | February 18, 2011 at 11:49 AM
Here are a few of the articles that have caught my attention recently:Googler and AI guru Peter Norvig on what artificial intelligence has been able to do and what...Greg Linden From Geeking with Greg | February 18, 2011 at 02:28 AM
Google has changed its social searches so that when you are logged in with your Google account you will get interleaved results that include hits from your ownMuch...Franz Dill From The Eponymous Pickle | February 18, 2011 at 01:05 AM
I am in the midst of a consulting project where it looks like it will be very hard to disrupt the industry. Most everything has been done already. All the slack...Franz Dill From The Eponymous Pickle | February 17, 2011 at 10:31 PM
In the Carleton Game Dev Club meeting last week, a member showed a video from the Escapist series Extra Credit. Called Narrative Mechanics, this episode was all...Gail Carmichael From The Female Perspective of Computer Science | February 17, 2011 at 09:27 PM
Good defensive computing CW piece on backups, what they are and what they are not and how to make sure you don't lose really important things.Franz Dill From The Eponymous Pickle | February 17, 2011 at 06:05 PM
More resources that can help you do research with languages: " ... It has just become a whole lot easier to search the world's language archives. The new OLAC Language...Franz Dill From The Eponymous Pickle | February 17, 2011 at 05:39 PM
Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952schneier From Schneier on Security | February 17, 2011 at 02:38 PM
Microsoft: Absolutely NO Free Software for Windows Phone and Xbox Apps Despite all the rhetoric from Microsoft's evangelists, they just can't get over their hatred...Simon Phipps From Wild WebMink | February 17, 2011 at 01:01 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Dreamspark is all about free development software for students. This week we added six new or updated products to the mix. This release included: KoduSmallBasic...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 17, 2011 at 10:25 AM
I’ve not found a way to add a subject index page to my blog that’s automatically generated from the tags or extracts or even a word list, but I have added an archive...Simon Phipps From Wild WebMink | February 17, 2011 at 10:08 AM
Good overview article from Wharton which provides a statement of the direction of what we used to call merchandising: " ... Shopper marketing is gaining popularity...Franz Dill From The Eponymous Pickle | February 17, 2011 at 06:15 AM
Today the Center for Democracy and Technology released a statement it developed to respond to possible changes to the Communications Assistance for Law Enforcement... From U.S. Public Policy Committee of the ACM | February 16, 2011 at 09:38 PM
Sands Research has posted their most recent super bowl ad ranking information, based on their unique neuro marketing methods. They have also included eye tracking...Franz Dill From The Eponymous Pickle | February 16, 2011 at 06:42 PM
CONTENTS
[1] Newsletter Highlights
[2] USACM Comments on Proposed Web Accessibility Guidance
[3] USACM Responds to Department of Commerce Online Privacy Report... From U.S. Public Policy Committee of the ACM | February 16, 2011 at 06:21 PM
If I tweeted there is what I would tweet:
There was an interesting blog post that responded to
Aaron Sterling's Chemoinformatics Post. See
here for this interesting...GASARCH From Computational Complexity | February 16, 2011 at 03:38 PM