From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On Thursday Aug 26 Lance stated
Bill is at
Barriers II in Princeton and promises a full report upon his return.
Not quite sure I promised that, or what a full report...GASARCH From Computational Complexity | August 31, 2010 at 01:39 PM
Thirty researchers met August 11-13 to discuss the future of interactive systems. This workshop was sponsored by the Computing Community Consortium, ACM/SIGCHI...Erwin Gianchandani From The Computing Community Consortium Blog | August 31, 2010 at 12:58 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Or is it “mind” the data? Last week I read a blog post by Stacey Armstrong (CS News – Video Game Data Mining) that linked to an article about how game companies...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 31, 2010 at 12:14 PM
I started blogging a little over 3 years ago, as something of an experiment. Lance had given up blogging, and I had been a reasonably frequent and opinionatedKleinberg's...Michael Mitzenmacher From My Biased Coin | August 31, 2010 at 11:48 AM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Some people scoff at those who have too many friends on Facebook. "They probably just friend a bunch of people they don't know to look popular," they say. While...Gail Carmichael From The Female Perspective of Computer Science | August 31, 2010 at 09:47 AM
In response to several comments, I’ve just extracted my discussion of direct and indirect causality from my recent article on why “which licence” is now the wrong...Simon Phipps From Wild WebMink | August 31, 2010 at 02:38 AM
Want your service, book, software or consulting skills presented to an elite audience here in review form? See my Ad and review policies here. -----------------...Franz Dill From The Eponymous Pickle | August 30, 2010 at 06:54 PM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
The Simons Foundation will provide up to $6 million/year in funding for a new Institute for the Theory of Computing. The call for applications recognizes the deep...Erwin Gianchandani From The Computing Community Consortium Blog | August 30, 2010 at 03:26 PM
I have now mentioned Recorded Future a number of times in this space, here is another independent review that does a good job of introducing it for niche research...Franz Dill From The Eponymous Pickle | August 30, 2010 at 02:42 PM
Hungarian Parliament, originally uploaded by webmink. My best wishes to all my friends attending the OpenOffice.org conference in Budapest this week. With all of...Simon Phipps From Wild WebMink | August 30, 2010 at 01:36 PM
Vanguard Records Sounds of Summer MP3 Sampler Not 100% to my taste, but some of the tracks are very good (I like Robert Cray and Stacy Clark) but the whole thing...Simon Phipps From Wild WebMink | August 30, 2010 at 12:07 PM
The Simons Foundation has announced a competition to establish a new Institute for the Theory of Computing in the United States.
Computation (and its abstractTTI...Lance From Computational Complexity | August 30, 2010 at 11:11 AM
Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...schneier From Schneier on Security | August 30, 2010 at 10:31 AM
Research results are more important than the number of publications or citations. This is fine. Yet, we don’t have time to read your papers. So, just keep publishing...Daniel Lemire From Daniel Lemire's Blog | August 30, 2010 at 09:17 AM