From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The US Library of Congress has announced that it will archive all public tweets. See more in it's blog. To be mine-able, for ever and ever, all your mundane thoughts...Franz Dill From The Eponymous Pickle | April 14, 2010 at 08:47 PM
Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.
schneier From Schneier on Security | April 14, 2010 at 06:30 PM
April 9 was
Tom Lehrer's
82nd birthday!
To celebrate I give you breaking news that a
Tom L DVD
was released April 13, 2010. It seems to have some videos of him...GASARCH From Computational Complexity | April 14, 2010 at 03:53 PM
From the CACM: Augmented Reality Brings Movie Magic to City Visits: " ... Using a combination of personalized location-based services and augmented reality, in...Franz Dill From The Eponymous Pickle | April 14, 2010 at 02:10 PM
Using examples from vacations to colonoscopies, Nobel laureate and founder of behavioral economics Daniel Kahneman reveals in a February 2010 lecture at TED how...Experientia From Putting People First | April 14, 2010 at 12:03 PM
Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...schneier From Schneier on Security | April 14, 2010 at 11:57 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The Computer Science Teachers Association sent out an announcement about an upcoming workshop hosted in Partnership with the Anita Borg Institute for Women and...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 14, 2010 at 10:30 AM
John Markoff had an extremely interesting profile of DARPA Director Regina Dugan in today’s NY Times.Ed Lazowska From The Computing Community Consortium Blog | April 13, 2010 at 09:57 PM
Elissa Pellizzon Fink of Tableau writes about this good example of showing embedded complex graphics: "We have a new product that is more of an online media product...Franz Dill From The Eponymous Pickle | April 13, 2010 at 07:19 PM
Following a blog post by John D. Cook, I started reading Fred Brooks‘ latest book. Brooks is famous, among other things, for his earlier book, the Mythical Man...Daniel Lemire From Daniel Lemire's Blog | April 13, 2010 at 06:40 PM
John Adams argues that our irrationality about comparative risks depends on the type of risk:
With "pure" voluntary risks, the risk itself, with its associated...schneier From Schneier on Security | April 13, 2010 at 06:18 PM
Continuing the past discussion on authorship issues, I've been considering the questions: at what point has a person involved in the project done so little work...Michael Mitzenmacher From My Biased Coin | April 13, 2010 at 01:33 PM
I was just sent a promo piece by Epic Systems on their visualization system called Trend Compass. With a brief examination, it creates bubble charts and includes...Franz Dill From The Eponymous Pickle | April 13, 2010 at 12:40 PM
Have been an Office user since the beginning and just in the last year have started to use some of Google Docs. Some new features, like easier sharing have made...Franz Dill From The Eponymous Pickle | April 13, 2010 at 12:18 PM
Besides being tax day, Thursday is the deadline to decide where to attend graduate school. How should you choose? I've blogged on this topic before but a few recent...Lance From Computational Complexity | April 13, 2010 at 12:03 PM
Last week Carleton's Women in Science and Engineering hosted the very first Carleton Celebration of Women in Science and Engineering, and it was a great success...Gail Carmichael From The Female Perspective of Computer Science | April 13, 2010 at 08:56 AM
Nice analysis by John Mueller and Mark G. Stewart:
There is a general agreement about risk, then, in the established regulatory practices of several developed...schneier From Schneier on Security | April 13, 2010 at 08:54 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson