From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Wednesday, March 31, 2010
Summary by Gaspar Modelo-Howard
Day two opened with a keynote from Under Secretary Beers, who has had a long and interesting career3...Keith Watson From CERIAS Blog | April 7, 2010 at 03:15 PM
Tuesday, March 30, 2010
Panel Members:
Mike McConnell, Booz Allen Hamilton
Rand Beers, DHS
Eugene H. Spafford, CERIAS
Summary by Derril Lucci
The fireside...Keith Watson From CERIAS Blog | April 7, 2010 at 03:13 PM
Tuesday, March 30, 2010
Panel Members:
Nicolas Christin, Carnegie Mellon University
Cassio Goldschmidt, Symantec Corporation
Aaron Massey, North Carolina State...Keith Watson From CERIAS Blog | April 7, 2010 at 03:06 PM
Tuesday, March 30, 2010
Panel Members:
Donald Robinson, Northrop Grumman
Ross Maciejewski, Purdue
Alok Chaturvedi, Purdue
Summary by Ryan Poyar
The first...Keith Watson From CERIAS Blog | April 7, 2010 at 03:02 PM
Tuesday, March 30, 2010
Summary by Jason Ortiz
Mike McConnell, retired Admiral of the Navy, former Director of NSA and former Director of National Intelligence...Keith Watson From CERIAS Blog | April 7, 2010 at 02:58 PM
An interview with long time connection Sundar Kadayam about his very innovative search and knowledge system Zakta. We used some of Sundar's previous systems. Also...Franz Dill From The Eponymous Pickle | April 7, 2010 at 02:17 PM
Regular readers may recall hearing about the New York Times Annotated Corpus (which is the basis for the HCIR Challenge), and decision to publish their tags as Linked...Daniel Tunkelang From The Noisy Channel | April 7, 2010 at 02:17 PM
In my
April Fools Day Post
I said the following:
Here are problems that I believe can be solved with
current techniques.
That was indeed true- since they were...GASARCH From Computational Complexity | April 7, 2010 at 02:15 PM
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM
A recent paper I worked on was a 60-40 paper. That's what I call it when one of the authors does noticeably more of the work. Really, it could be a 70-30 paper...Michael Mitzenmacher From My Biased Coin | April 7, 2010 at 12:08 PM
IBM: Back to the Bad Old Days?
Pretty good analysis of the IBM patent aggression from ESR: "IBM has reached a critical juncture. For the last decade the company...Simon Phipps From Wild WebMink | April 7, 2010 at 12:06 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Please join Microsoft for the 2010 US Imagine Cup Community Showcase The US Imagine Cup team would like to extend an invitation to you...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 7, 2010 at 09:05 AM
I had a very good conversation today with Prof Pascal Hitzler. Author of the books: Semantic Web - Grundlagen and Foundations of Semantic Web Technologies. He is...Franz Dill From The Eponymous Pickle | April 7, 2010 at 02:00 AM
In the BBC: Proper nouns are now allowed in new versions of the Scrabble board game. Think of the opportunity for product placement! Though how many people play...Franz Dill From The Eponymous Pickle | April 7, 2010 at 01:54 AM
As I embark on this journey that is a PhD, I constantly remind myself of my goal of remaining useful. I want to retain practical skills that could be used in outside...Gail Carmichael From The Female Perspective of Computer Science | April 6, 2010 at 06:24 PM
CONTENTS
[1] Newsletter Highlights
[2] 2009 ACM Turing Award Goes to Charles Thacker
[3] USACM and CRA Express Concerns with Senate Cybersecurity Bill
[4] Science... From U.S. Public Policy Committee of the ACM | April 6, 2010 at 02:24 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I spent much of yesterday working on a computer program. A friend of mine wrote it in Visual Basic .NET and I was converting it to C# so that it could be used as...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 6, 2010 at 02:17 PM
In my previous post, you were invited to help with a reference implementation of external sorting in Java. Several people tested and improved the code. I like the...Daniel Lemire From Daniel Lemire's Blog | April 6, 2010 at 01:55 PM
Last fall I wrote about the different focus on models and proofs in the Econ and CS theory communities. Today I'll focus on the purpose of a model and what makes...Lance From Computational Complexity | April 6, 2010 at 01:18 PM