From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....schneier From Schneier on Security | June 29, 2010 at 04:42 PM
Some random thoughts about quiz shows.
THOUGHT ONE: There could be a quiz show based on P and NP.
We all think that FINDING an answer is harder than VERIFYING...GASARCH From Computational Complexity | June 29, 2010 at 02:13 PM
The open core model is being feted as the new default open source business model. But I assert it does not deliver and sustain the principle that delivers cost...Simon Phipps From Wild WebMink | June 29, 2010 at 01:55 PM
In the CACM:, technical but interesting, The last sentence is telling, if you have to explain it, is it a good visualization? Yes, the underlying technology you...Franz Dill From The Eponymous Pickle | June 29, 2010 at 01:50 PM
This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets:
I talked to a retired FBI agent who said that one of the things they were looking at...schneier From Schneier on Security | June 29, 2010 at 11:28 AM
The July/August issue of Analytics Magazine cover enterprise forecasting. A tricky area I spent much time working in. This magazine is always a practical place...Franz Dill From The Eponymous Pickle | June 28, 2010 at 05:53 PM
Several major players built alternatives to conventional database systems: Google created BigTable, Amazon built Dynamo and Facebook initiated Cassandra. There...Daniel Lemire From Daniel Lemire's Blog | June 28, 2010 at 04:46 PM
There was a
Women in Theory Workshop at Princeton From
June 19-23.
***SORELLE***, who was there, has some intelligent and interesting
things to say about it...GASARCH From Computational Complexity | June 28, 2010 at 03:04 PM
GigaOhm does a good job providing a case study of how to best understand your Twitter followers. This starts to answer a question I have had recently: Just who...Franz Dill From The Eponymous Pickle | June 28, 2010 at 02:49 PM
A cautionary tale about password use. Cory Doctorow gets Phished. Cory Doctorow: Persistence Pays ParasitesFranz Dill From The Eponymous Pickle | June 28, 2010 at 02:48 PM
UPI article on the increasing use of private label by cost conscious consumers. Useful statistics.Franz Dill From The Eponymous Pickle | June 28, 2010 at 02:41 PM
July 1
Hearing:
The House Oversight and Government Reform Committee will hold a hearing on using cloud computing for federal information technology needs.
10... From U.S. Public Policy Committee of the ACM | June 28, 2010 at 02:34 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I have been told that once upon a time the ISTE conference (back when it was still called NECC) had a lot of computer science education content. ThatAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2010 at 01:06 PM
Yesterday was more or less the opening of ISTE. These conference are sort of interesting in that they start gradually. Wednesday ISTE will end somewhat abruptly...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2010 at 09:44 AM
I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...schneier From Schneier on Security | June 28, 2010 at 09:02 AM
A joint venture that links several groups I know well: " ... Nielsen and management consultancy McKinsey & Company have formed a joint venture to help clients improve...Franz Dill From The Eponymous Pickle | June 28, 2010 at 01:06 AM
I’m looking forward to attending SIGIR 2010 in a few weeks and particularly to the SimInt 2010 Workshop on the Automated Evaluation of Interactive Information Retrieval...Daniel Tunkelang From The Noisy Channel | June 28, 2010 at 12:21 AM
I notice that CACM Editor-in-Chief Moshe Vardi’s letter in the July 2010 issue of CACM speaks to what he calls “Hypercriticality,” and cites my post of May 4 here...Erwin Gianchandani From The Computing Community Consortium Blog | June 28, 2010 at 12:09 AM