From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Lost within all the health care legislation coverage was the release of a new draft of S.773, the Cybersecurity Act of 2010. The new draft was released a week... From U.S. Public Policy Committee of the ACM | March 24, 2010 at 12:01 AM
I have a new book, sort of. Cryptography Engineering is really the second edition of Practical Cryptography. Niels Ferguson and I wrote Practical Cryptography...schneier From Schneier on Security | March 23, 2010 at 07:42 PM
In British Columbia:
When Auditor-General John Doyle and his staff investigated the security of electronic record-keeping at the Vancouver Coastal Health Authority...schneier From Schneier on Security | March 23, 2010 at 05:23 PM
Instructive, most people assume the search engines find everything:" ... Google sees only a fraction of the content that appears on the internet. Stuart Andrews...Franz Dill From The Eponymous Pickle | March 23, 2010 at 04:24 PM
I recently discovered Interaction Dynamics via their Twitter presence. See also their blog: ' ... Interaction Dynamics is a tool to increase online customer conversions...Franz Dill From The Eponymous Pickle | March 23, 2010 at 03:41 PM
The EU ACTA Consultation: European Commission vs. European Parliament
In the gentlest possible way considering the reactions of other commentators, Geist points...Simon Phipps From Wild WebMink | March 23, 2010 at 12:09 PM
Amazing:
The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a...schneier From Schneier on Security | March 23, 2010 at 11:13 AM
In his blog, Dan Lockton, a Ph.D. researcher at Brunel University (UK), describes eleven behavioural change patterns “drawn from games or modelled on more playful...Experientia From Putting People First | March 23, 2010 at 10:54 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Is it time to rethink and replace Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 23, 2010 at 09:47 AM
In an interesting development: -- 3M Launches Asset and Inventory Tracking System ... The solution includes 13.56 MHz passive RFID tags, handheld and pad readers...Franz Dill From The Eponymous Pickle | March 22, 2010 at 09:53 PM
Designers can play a pivotal role, writes Mark Baskinger, associate professor in the School of Design at Carnegie Mellon University, in empowering elders towards...Experientia From Putting People First | March 22, 2010 at 09:07 PM
(REMINDER AND UPDATE:
If you are a a grad student you can apply for travel support for STOC 2010.
See
here for details.
One update on that: since registration and...GASARCH From Computational Complexity | March 22, 2010 at 06:04 PM
MS Word has been dethroned:
Files based on Reader were exploited in almost 49 per cent of the targeted attacks of 2009, compared with about 39 per cent that took...schneier From Schneier on Security | March 22, 2010 at 06:03 PM
Intriguing and a natural expansion on the notion of a semantic web, plus looking at the infrastructure required to deliver it. In ReadWriteWeb: Inventor of the'...Franz Dill From The Eponymous Pickle | March 22, 2010 at 05:47 PM
Most researchers are convinced that their current work is important. Otherwise, they wouldn’t do it. Yet, few of them work on obviously important things like curing...Daniel Lemire From Daniel Lemire's Blog | March 22, 2010 at 03:27 PM
Too many of us are too busy to be healthy–not because we lack awareness. It’s finding the time to do it that’s the problem. In an age of 24/7 connectivity, time...Experientia From Putting People First | March 22, 2010 at 03:10 PM
I mentioned this some time ago, here is more. Via Richard L. James. Procter has run physical store 'sand boxes' of this type for a long time, it is long overdue...Franz Dill From The Eponymous Pickle | March 22, 2010 at 02:50 PM
March 23
Hearing:
The Technology and Innovation Subcommittee of the House Science and Technology Committee will hold a hearing on teh National Institute of Standards... From U.S. Public Policy Committee of the ACM | March 22, 2010 at 02:13 PM
This, from a former CIA chief of station:
The point is that in this day and time, with ubiquitous surveillance cameras, the ability to comprehensively analysearticle...schneier From Schneier on Security | March 22, 2010 at 02:10 PM
Via Byron Sharp:Understanding, Identifying and Building Distinctive Brand AssetsThis post is part of a continuing series of guest posts. Jenni Romaniuk is an Associate...Franz Dill From The Eponymous Pickle | March 22, 2010 at 02:09 PM