From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Putting People First
Tomorrow I will be speaking at an informal, but high energy Paris conference, called (somewhat predictably) Paris 2.0.
The conference takes a total of four days...Experientia From Putting People First | September 22, 2009 at 03:46 PM
Luke Wroblewski, an internationally recognized Web thought leader and Senior Director of Product Ideation & Design at Yahoo! Inc., provides a comprehensive overview...Experientia From Putting People First | September 22, 2009 at 03:25 PM
The latest issue of Interfaces Magazine, a quarterly magazine published by Interaction, the specialist HCI group of the British Computer Society (BCS), contains...Experientia From Putting People First | September 22, 2009 at 02:43 PM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM
I worked with Institute for the Future for years, and blogged for them as well. A new interesting report from them: Future Knowledge Ecosystems: The Next Twenty...Franz Dill From The Eponymous Pickle | September 22, 2009 at 11:07 AM
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Last semester, for various reasons, I ended up "double-teaching", offering both my undergraduate algorithms class and my graduate network algorithms class. The...Michael Mitzenmacher From My Biased Coin | September 22, 2009 at 11:00 AM
I recently posted about a shopper modeling system from TNS - Sorensen called Atlas, at that link you will find more information about the method and how it is evolving...Franz Dill From The Eponymous Pickle | September 22, 2009 at 04:10 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Arrr! I hope everyone had a swashbuckling day this past September 19. As you no doubt knew, September 19 is International Talk Like a Pirate Day - an unofficial... From Computer Science Teachers Association | September 21, 2009 at 05:30 PM
You can now register on-line for FOCS which includes the 50th celebration. Early registration deadline is October 1. Hotel rate good until October 9th or whilehttp...Lance From Computational Complexity | September 21, 2009 at 05:20 PM
Akin to Chernoff faces, but univariate. You can generate a smiley face in Excel that displays a range of emotions. Fun and perhaps useful if you can stand a smiley...Franz Dill From The Eponymous Pickle | September 21, 2009 at 03:44 PM
Ad Age details Procter's idea of 'store back', which they consider essential to improvement of sales competing with private label as we emerge from a recession....Franz Dill From The Eponymous Pickle | September 21, 2009 at 03:25 PM
Nice piece about SAS JMP tool developer John Sall, who I met years ago. Used JMP in the enterprise, but no longer have access. Was quite well done, it introduced...Franz Dill From The Eponymous Pickle | September 21, 2009 at 02:12 PM
September 21
Presentation:
The DC Chapter of the Association for Computing Machinery and the New America Foundation host a discussion with Prof. Jonathan Lazar... From U.S. Public Policy Committee of the ACM | September 21, 2009 at 01:43 PM
September 21
Presentation:
The DC Chapter of the Association for Computing Machinery and the New America Foundation host a discussion with Prof. Jonathan Lazar... From U.S. Public Policy Committee of the ACM | September 21, 2009 at 01:41 PM