From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
RECALL from
my last post the following game:
Let f(n) be a non-decreasing function from naturals to naturals.
Consider the following game:
Let n be a large...GASARCH From Computational Complexity | August 4, 2010 at 05:11 AM
The 4th Workshop on Human-Computer Interaction and Information Retrieval (HCIR 2010) is coming up on August 22 in New Brunswick, NJ, taking place immediately after...Daniel Tunkelang From The Noisy Channel | August 4, 2010 at 01:55 AM
In Flowingdata: What Online Marketers Know About you. I do like the topic, it is something we should be aware of. I am not sure that the graphics add enough to...Franz Dill From The Eponymous Pickle | August 4, 2010 at 12:57 AM
The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them.
At the heart of the battle is access to thecomplicated...schneier From Schneier on Security | August 3, 2010 at 04:08 PM
The square two dimensional QR code, commonly used in Japan, is uncommon in North America. And that is the problem. If people don't know there may be something...Franz Dill From The Eponymous Pickle | August 3, 2010 at 03:00 PM
We did lots of work on kiosk implementations in the innovation centers. I recently talked to a company, Utiqueshop that was doing some interesting things in advanced...Franz Dill From The Eponymous Pickle | August 3, 2010 at 02:50 PM
The Securities and Exchange Commission recently issued a request for comments on proposed changes to the rules regulating asset-backed securities. Part of the... From U.S. Public Policy Committee of the ACM | August 3, 2010 at 02:46 PM
Evan Schuman, editor of Storefrontbacktalk, points me to their Retail Realities column published every Friday on CBSNews.com. Add it to your feed. Also on Twitter...Franz Dill From The Eponymous Pickle | August 3, 2010 at 02:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
You may have noticed that I wasnAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 3, 2010 at 01:44 PM
Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...schneier From Schneier on Security | August 3, 2010 at 11:25 AM
As I blogged a few months ago, University of Oviedo professor Daniel Gayo-Avello published a research paper entitled “Nepotistic Relationships in Twitter and their...Daniel Tunkelang From The Noisy Channel | August 3, 2010 at 09:25 AM
A couple of years ago I wrote about Mobile Revolutions, a blog about mobile phones, youth and social change by Lisa Campbell Salazar. The blog also supported TakingITMobile...Experientia From Putting People First | August 3, 2010 at 06:55 AM
In the Recorded Future blog, a post about an analysis of the future of social gaming this is a nice example of the use of the novel Recorded Future predictive approach...Franz Dill From The Eponymous Pickle | August 3, 2010 at 02:33 AM
Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...schneier From Schneier on Security | August 3, 2010 at 02:21 AM
I was pleased to be able to attend this year’s OSCON, O’Reilly Media’s open source convention held once again in Portland, Oregon in mid-July. There have been numerous...Simon Phipps From Wild WebMink | August 2, 2010 at 11:01 PM
I just took a look at the Rapportive Rich Contact resource add on to the Chrome browser. It works with the GMail service only. It will not work with the Explorer...Franz Dill From The Eponymous Pickle | August 2, 2010 at 08:51 PM
Not unexpected, and here social networks are including blogs, which is also blogs, broadly defined to include newsfeeds. Not necessarily including any actual social...Franz Dill From The Eponymous Pickle | August 2, 2010 at 05:15 PM
The House is presently on recess until after Labor Day, and the Senate is scheduled to join them by the weekend.
August 4 (Continues to noon on August 6)
The Information... From U.S. Public Policy Committee of the ACM | August 2, 2010 at 04:50 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Bills get written and submitted to Congress without getting passed all the time but if nothing else the process often gets the discussion going. A recent bill to...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 2, 2010 at 04:49 PM