From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Technology Review: Apps that could change your smartphone into a wallet. Overview of the state of the technology.Franz Dill From The Eponymous Pickle | January 26, 2011 at 10:32 PM
This is a bit surreal:
Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature...schneier From Schneier on Security | January 26, 2011 at 07:42 PM
Fascinating piece in Stephen Wolfram's blog on the IBM assault on the Jeopardy game. Includes some intriguing comparisons about how other online knowledge search...Franz Dill From The Eponymous Pickle | January 26, 2011 at 07:39 PM
I suspect that beneath discussions of computing/computer science/computational thinking in K-12, there is an underlying fear that the computer scientists will come... From Computer Science Teachers Association | January 26, 2011 at 06:06 PM
My article on the problem of indemnity requirements for open source procurement is now available in the Essays section, in English and Portuguese. O artigo “Aquisi...Simon Phipps From Wild WebMink | January 26, 2011 at 04:40 PM
A case study of personalizing the message with Technology: " .... Digitized window displays, motion-gesture navigation signs and custom e-mail messages are some...Franz Dill From The Eponymous Pickle | January 26, 2011 at 04:24 PM
Third annual Neuroscience boot camp at the University of Pennsylvania this summer, have not been, but looks to be good or those seeking to understand the space.Franz Dill From The Eponymous Pickle | January 26, 2011 at 03:28 PM
It's amazing how many security cameras are on the Internet, accessible by anyone.
And it's not just for viewing; a lot of these cameras can be reprogrammed by...schneier From Schneier on Security | January 26, 2011 at 12:28 PM
When Experientia’s four partners decided to start a business back in 2005, one of the important discussions then was about the name. After brainstorming on the...Experientia From Putting People First | January 26, 2011 at 11:56 AM
2011 marks the 150th anniversary of Italian unification, and it is fitting that the celebrations are kicking off in Turin, which (in addition to being Experientia’s...Experientia From Putting People First | January 26, 2011 at 09:35 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
More on the motivations of Apple to include near field communications and Wallet software in the IPhone. A long expected direction ... Phone as Wallet.Franz Dill From The Eponymous Pickle | January 25, 2011 at 10:30 PM
A QR code is 2D bar code that was standardized well enough that free decoders are readily available for computers and smart phones. You can encode about 3 KB of...Gail Carmichael From The Female Perspective of Computer Science | January 25, 2011 at 08:28 PM
A group of students at the Chinese University in Hong Kong have figured out how to store data in bacteria. The article talks about how secure it is, and the students...schneier From Schneier on Security | January 25, 2011 at 07:40 PM
The case that education pays is often made by compare the income of people who graduated against the people who did not. The result is compelling: (Source: U.S....Daniel Lemire From Daniel Lemire's Blog | January 25, 2011 at 03:54 PM
In IEEE: Building a super robust Anthropomorphic robotic hand. An example where the robotic can exceed the human.Franz Dill From The Eponymous Pickle | January 25, 2011 at 03:12 PM