From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
UK government ignoring own rules on open source
With Tom Watson gone and his former staff apparently reassigned, this comes asGovernment...webmink From Wild WebMink | September 25, 2009 at 02:26 PM
UK government ignoring own rules on open source
With Tom Watson gone and his former staff apparently reassigned, this comes asGovernment...webmink From Wild WebMink | September 25, 2009 at 12:32 PM
Unfortunately we cannot talk about most of the work we do at Experientia unless the final product gets launched.
But there are these nice moments when we can.
Although...Experientia From Putting People First | September 25, 2009 at 11:55 AM
Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short...schneier From Schneier on Security | September 25, 2009 at 11:17 AM
As part of a larger BI package exploration I took a look at Clario Analytics SaaS (Software as a service). You start by uploading your data via a secure FTP client...Franz Dill From The Eponymous Pickle | September 25, 2009 at 05:23 AM
Honda has a Segway-like, unicycle form personal mobility device called the U-3X in the works that is more remarkable looking than the Segway. No specific dates...Franz Dill From The Eponymous Pickle | September 24, 2009 at 11:14 PM
Earlier this week Federal Communications Commission Chairman Julius Genachowski announced his intention to establish an expanded definition of net neutrality to... From U.S. Public Policy Committee of the ACM | September 24, 2009 at 09:12 PM
Some consider the P = NP problem to be the most important Theoretical Computer Science problem. It asks whether all problems whose solution can be verified quickly...Daniel Lemire From Daniel Lemire's Blog | September 24, 2009 at 08:30 PM
There have been several posts on blogs about P vs NP and two expository articles. Is there anything else to add. I'm not sure, but here are my 2 cents.
QUESTION...GASARCH From Computational Complexity | September 24, 2009 at 05:19 PM
The New Scientist reviews the current state of Augmented Reality and is a bit concerned:
“While some who back the technology think its time has now come, after...Experientia From Putting People First | September 24, 2009 at 02:09 PM
Too many emails, texts and tweets can lead to rising anxiety, lower intelligence Experientia From Putting People First | September 24, 2009 at 01:50 PM
This reminds me of the work of Brenda Laurel, game developer and systems theorist, who wrote about computers and theater. The theater of the brand: Building entertainment...Franz Dill From The Eponymous Pickle | September 24, 2009 at 12:58 PM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM