From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Thanks to the Harvard Extension School, the lectures for several more Harvard courses have been put online. My understanding is that these are classes taught at...Michael Mitzenmacher From My Biased Coin | October 7, 2009 at 10:51 AM
FSF Files Amicus Brief in Bilski
Another "friend of the court" filing in the US Supreme Court in the reconsideration of the case law that makes...webmink From Wild WebMink | October 7, 2009 at 09:53 AM
Have only looked at a few, but some interesting videos from the summit. Are you ready to be uploaded? The concept of a technological singularity continues to intrigue...Franz Dill From The Eponymous Pickle | October 7, 2009 at 09:52 AM
Many of my Ph.D. students have admitted to being motivated by financial gain. Stanford is famous for their graduate-students-turned-entrepreneurs. Sergey Brin and...Daniel Lemire From Daniel Lemire's Blog | October 7, 2009 at 09:50 AM
I enjoyed my proverbial fifteen seconds of fame on CNN yesterday, and I even enjoyed lunch at the New York Times cafeteria today. But for a prime-time media show...Daniel Tunkelang From The Noisy Channel | October 7, 2009 at 09:31 AM
Richard James sends along a link to a very detailed article about Tesco in the US: RETAIL CASE STUDY: ANATOMY OF A TESCO FRESH AND EASY NEIGHBORHOOD. Much written...Franz Dill From The Eponymous Pickle | October 7, 2009 at 01:44 AM
You'd think this would be obvious:
Douglas Havard, 27, serving six years for stealing up to schneier From Schneier on Security | October 6, 2009 at 07:32 PM
Correspondent Sy Truong has just had an Iphone App called BI Flash approved. It allows you to deliver SAS reports and data to the IPhone, enter parameters, capture...Franz Dill From The Eponymous Pickle | October 6, 2009 at 06:39 PM
When you get an invitation via email should you accept? How well targeted is it? Some real examples that I got.
EXAMPLE ONE:
I would like to invite you toclick...GASARCH From Computational Complexity | October 6, 2009 at 05:15 PM
Good, short, non-technical video all about Google Wave. Also, Businessweek asks if it will replace E-mail and Facebook. -Franz Dill From The Eponymous Pickle | October 6, 2009 at 03:07 PM
A $1.99 IPhone App called IP Camera can take a picture every 12 to 15 seconds and then posts the picture to a local network via WiFi. Effectively a security camera...Franz Dill From The Eponymous Pickle | October 6, 2009 at 02:56 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Digital Revolution (working title) is an open source documentary, due for transmission on BBC Two in 2010, that will take stock of 20 years of change brought about...Experientia From Putting People First | October 6, 2009 at 06:55 AM
The HCIR 2009 proceedings are now available on the workshop web site. We’re planning toDaniel Tunkelang From The Noisy Channel | October 6, 2009 at 03:29 AM
As has been anticipated for a while–and discussed during the Ethics of Blogging panel–the United States Federal Trade Commission (FTC) has published explicit guidelines...Daniel Tunkelang From The Noisy Channel | October 6, 2009 at 03:19 AM
I decided to read Outliers by Malcolm Gladwell as it was recommended to me by several people. That in turn let me to read his first book Tipping Point. This may... From Computer Science Teachers Association | October 5, 2009 at 10:32 PM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM