From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Tom Davenport in HBR blogs: How to "Connect the Dots" in Your Business, one of a series of interesting posts that examine integrating data. " ... In this post,...Franz Dill From The Eponymous Pickle | February 5, 2010 at 07:44 PM
This is unconscionable:
At Tuesday's hearing, Senator Dianne Feinstein, Democrat of California and chairwoman of the Senate Intelligence Committee, asked Mr. Blair...schneier From Schneier on Security | February 5, 2010 at 05:59 PM
Just substantially updated my Linkedin entry. For more about me and what I am up to. -Franz Dill From The Eponymous Pickle | February 5, 2010 at 05:24 PM
Since I couldn't get myself to New York for WSDM, I asked my student Giorgos Zervas to report. This is his report from Thursday.-----------------------Greetings...Michael Mitzenmacher From My Biased Coin | February 5, 2010 at 01:45 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
No, really! Are you making your summer plans yet and do they include learning time? I have some ideas for you. First off is CS & IT run by CSTA. This is in my opinion...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 5, 2010 at 01:30 PM
Lively Kernel
Spun out to its own site, this project (a virtual machine kernel written in Javascript) is absolutely fascinating...webmink From Wild WebMink | February 5, 2010 at 12:06 PM
Does anyone think this is a good idea?
Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate...schneier From Schneier on Security | February 5, 2010 at 12:02 PM
Note: this post is cross-posted at BLOG@CACM.
Today was the first day of the Third ACM International Conference on Web Search and Data Mining (WSDM 2010), held...Daniel Tunkelang From The Noisy Channel | February 5, 2010 at 05:52 AM
Note: this post is cross-posted at BLOG@CACM.
Today was the first day of the Third ACM International Conference on Web Search and Data Mining (WSDM 2010), held...Daniel Tunkelang From The Noisy Channel | February 5, 2010 at 05:50 AM
Very good IEEE Computer Now issue on the general problem of using biometric methods for identification. ' ... This month, Computing Now explores biometricsFranz Dill From The Eponymous Pickle | February 5, 2010 at 05:11 AM
Google is apparently going to add 'store views' to its valuable 'street views', attached by location to its maps. More here. I am assuming with permission, but...Franz Dill From The Eponymous Pickle | February 4, 2010 at 08:15 PM
Five months ago, Peter Lee took a leave of absence as Head of the Computer Science Department at Carnegie Mellon University to begin a stint at DARPA as the Director...Ed Lazowska From The Computing Community Consortium Blog | February 4, 2010 at 07:42 PM
Another development that brings the smartphone closer to everyday use as a sensor by the consumer. I recently reviewed the updates to the Redlaser scanner and found...Franz Dill From The Eponymous Pickle | February 4, 2010 at 06:57 PM
I've been spending time on both graduate admissions and undergraduate admissions.For graduate admissions, we've moved to an all-electronic system; the applications...Michael Mitzenmacher From My Biased Coin | February 4, 2010 at 03:11 PM
There have been some articles on how much things have changed
because of technology.
One from the Washington Post Magazine, titled
Going, Going, ..., Gone
lists...GASARCH From Computational Complexity | February 4, 2010 at 03:00 PM
Security is rarely static. Technology changes both security systems and attackers. But thereschneier From Schneier on Security | February 4, 2010 at 12:35 PM
One of the things that came up from the panel I was on last week (that panel has prompted a bunch of blog and Twitter posts already) was that students like relevant...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 4, 2010 at 11:48 AM
Note: this post will also appear on BLOG@CACM.
It is my pleasure to report on the 3rd Annual Workshop on Search in Social Media (SSM 2010), a gathering of information...Daniel Tunkelang From The Noisy Channel | February 4, 2010 at 08:25 AM
Good Wired article on a number of ad biometrics studies being done during the Superbowl, which has increasingly become a laboratory for non conscious neuromarketing...Franz Dill From The Eponymous Pickle | February 4, 2010 at 05:34 AM