From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A CGT interview with Steve Knox, CEO of P&G's Tremor. " ... Have you ever wondered why consumers talk? Thought-leader Steve Knox shares tricks for building consumer...Franz Dill From The Eponymous Pickle | June 23, 2010 at 07:28 PM
Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:
No...schneier From Schneier on Security | June 23, 2010 at 06:16 PM
Interesting piece on the power of the checklist and our aversion to it: " Checking Everything Off -- Except the Resistance to Changefrom Knowledge@WhartonErrors...Franz Dill From The Eponymous Pickle | June 23, 2010 at 05:48 PM
Maybe it’s a trend, or maybe I just noticed because I was looking, but following my article last week about the strange parallels between Life of Brian and the...Simon Phipps From Wild WebMink | June 23, 2010 at 02:35 PM
I set up a new blog, Future of STOC to discuss role of our main conference and how to achieve it.
At STOC this year we had a relatively large attendance of 350...Lance From Computational Complexity | June 23, 2010 at 11:22 AM
In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:
"High-tech, low-tech, we can't...schneier From Schneier on Security | June 23, 2010 at 11:00 AM
I noticed in updates for the Bing IPhone App today that they were now allowing you to read barcodes and other images using a smartphone's camera. Then search for...Franz Dill From The Eponymous Pickle | June 23, 2010 at 04:50 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Paul Vick wrote a post called Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 23, 2010 at 01:40 AM
In CACM: Successful Software Platforms are the Byproducts of Successful Businesses, by Ruben Ortega Most startup business plans I have encountered over the past...Franz Dill From The Eponymous Pickle | June 23, 2010 at 01:35 AM
Towards richer bar codes ... This is an evolution that has been going on for years, now we are in the midst of making it useful ..." ... A shopper in a self-scan...Franz Dill From The Eponymous Pickle | June 23, 2010 at 01:19 AM
Almost two years ago I wrote in this blog about how CERIAS (and Purdue) was not going to resubmit for the NSA/DHS Centers of Academic Excellence program.
Some of...Gene Spafford From CERIAS Blog | June 22, 2010 at 09:58 PM
We saw DemandTec during their early days as a revenue management system. An impressive and sophisticated approach. Gigaom posts a good article on their work with...Franz Dill From The Eponymous Pickle | June 22, 2010 at 09:26 PM
The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"
schneier From Schneier on Security | June 22, 2010 at 04:50 PM
This month Chip Chick, the site that focuses on technology for women, was invited by Intel to its annual Upgrade Your Life Event where the company presented what...Experientia From Putting People First | June 22, 2010 at 04:06 PM
I'm just about finished the Graduate University Teaching Skills Certificate (GUTS) program I took this summer. I also just had the last class of my first timeBinary...Gail Carmichael From The Female Perspective of Computer Science | June 22, 2010 at 03:56 PM
(Guest Post by Vijay Vazirani)
Foundational ... or Simply a Curiosity?
Conventional wisdom has it that whereas linear programs have
rational solutions,...GASARCH From Computational Complexity | June 22, 2010 at 02:55 PM
Interesting:
TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...schneier From Schneier on Security | June 22, 2010 at 11:49 AM