From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interestingly enterprise transaction software giant SAP has developed a prototype system that analyzes network data to determine business relationships. You can...Franz Dill From The Eponymous Pickle | November 16, 2009 at 02:54 PM
A very simple marketing idea where you text a mobile question to ChaCha, get an answer and a promotion to be used at Marsh, and go to a local store to pick it up...Franz Dill From The Eponymous Pickle | November 16, 2009 at 10:46 AM
A few weeks ago, I talked about the reviewing process for NSDI and LATIN. I suppose now is a reasonable time for an update.LATIN is nearing the end of the reviewing...Michael Mitzenmacher From My Biased Coin | November 16, 2009 at 10:39 AM
Interesting research:
For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...schneier From Schneier on Security | November 16, 2009 at 09:51 AM
More augmented reality methods for online and mobile.Took a look at the Junaio augmented reality browser on the IPhone today. The basic idea is to let you augment...Franz Dill From The Eponymous Pickle | November 15, 2009 at 07:37 PM
By John Baldoni in the Harvard Business Publishing Blog, A majority of managers just don't understand what it means to be a leader ... 'Franz Dill From The Eponymous Pickle | November 15, 2009 at 04:22 PM
A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...schneier From Schneier on Security | November 15, 2009 at 04:22 PM
For some reason or another, a few recent online conversations have got me thinking about pregnancy and grad school. (I suppose visiting a friend with a month-old...Gail Carmichael From The Female Perspective of Computer Science | November 15, 2009 at 02:25 PM
Long on my stack, just making my way through: The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data by Ronen Feldman and James Sanger. A...Franz Dill From The Eponymous Pickle | November 15, 2009 at 09:50 AM
Apple recently filed for technology to deliver a rather compelling ad-supported business model. Or perhaps the better word is compulsory. You can read an analysis...Daniel Tunkelang From The Noisy Channel | November 15, 2009 at 09:49 AM
Always thought there was something wrong with using US college students for determining universal psychological facts about populations, except when determining...Franz Dill From The Eponymous Pickle | November 14, 2009 at 07:58 PM
From MIT, an interesting piece about representing the real world, always a good thing to think about. I never thought that game theory could accurately represent...Franz Dill From The Eponymous Pickle | November 14, 2009 at 07:23 PM
Just what is computer science? Is it a science course? Is it a math course? Is it a business course?
These questions pop up more frequently now that states... From Computer Science Teachers Association | November 14, 2009 at 05:58 PM
Do music artists fare better in a world with illegal file-sharing?
Answer: Yes. So why do the labels want to kill it off? Because they don't. Translation...webmink From Wild WebMink | November 14, 2009 at 09:48 AM
I spoke this morning at the South Tyrol Free Software Conference in Bolzano, Italy. My subject was the idea of a "software freedom scorecard", a list of indicators...webmink From Wild WebMink | November 13, 2009 at 10:44 PM
Microsoft Corp. is counting on Ms. Larson-Green, its head of Windows Experience, to deliver an operating system that delights the world’s PC users as much as its...Experientia From Putting People First | November 13, 2009 at 08:56 PM
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM