From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This continues my conversations with developers in the Augmented reality space. Here with the Ukranian firm Augmented Pixels. A new free game developed and then...Franz Dill From The Eponymous Pickle | October 8, 2013 at 01:00 AM
Most interesting and timely report from McKinsey: Urban world: The shifting global business landscape. With lots of interesting graphics and statistics." ... Emerging...Franz Dill From The Eponymous Pickle | October 7, 2013 at 05:59 PM
I still have my doubts over the longevity of the term 'Data Scientist', and now they are creating a professional society and a code of conduct." ... Data Scientists...Franz Dill From The Eponymous Pickle | October 7, 2013 at 02:42 PM
Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site.
Despite the elaborate technical underpinnings, however, the...schneier From Schneier on Security | October 7, 2013 at 02:35 PM
Have always been a journalist at heart. There are useful news stories lined up in my head waiting to emerge. I particularly love to see examples of how young"...Franz Dill From The Eponymous Pickle | October 7, 2013 at 01:47 PM
That was the question I was asked in an email from a colleague who teaches in a neighboring district. I had thought about it but not in depth. It had been mentioned... From Computer Science Teachers Association | October 7, 2013 at 01:30 PM
HBR establishes a health care innovation center site. " ... Leading Health Care Innovation, a collaboration of the editors of the Harvard Business Review and...Franz Dill From The Eponymous Pickle | October 7, 2013 at 01:19 PM
I love the curriculum that Zoe Wood and Julie Workman created for their school's CS0 course and that they spoke about at GHC13. It uses Processing, like the CS1...Gail Carmichael From The Female Perspective of Computer Science | October 7, 2013 at 12:25 PM
In light of the leaks surrounding U.S. national intelligence surveillance efforts, President Obama appointed a group to review those programs to determine if they...David B. From U.S. Public Policy Committee of the ACM | October 7, 2013 at 12:22 PM
A good piece on the problem. But ultimately it is ROI that talks. And making sure that decision makers get the word of what is happening. Before, during and...Franz Dill From The Eponymous Pickle | October 7, 2013 at 11:25 AM
Consumer products taking cues from robotics. We did this early on. But the economics ultimately did not make sense. " ... Smart thermostats, drones and other...Franz Dill From The Eponymous Pickle | October 7, 2013 at 11:15 AM
As I am sure you all know, the TV show Elementary (Premise- Sherlock Homes in Modern Day NY. He emails and Texts! Watson is a female! and...) had an episode that...GASARCH From Computational Complexity | October 7, 2013 at 10:25 AM
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...schneier From Schneier on Security | October 7, 2013 at 07:24 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’m staring off today with two other sets of links. Some good resource lists created by some friends of mine. Joe Kmoch has a great list of CS and IT educational...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 7, 2013 at 06:09 AM
Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...Gene Spafford From CERIAS Blog | October 6, 2013 at 03:22 PM
Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...Gene Spafford From CERIAS Blog | October 6, 2013 at 03:22 PM
Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...Gene Spafford From CERIAS Blog | October 6, 2013 at 03:22 PM
Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations...Gene Spafford From CERIAS Blog | October 6, 2013 at 03:22 PM
I was asked about how I do quotes in blog posts. Quotes are always placed in italics, and then embedded in quote marks. Ellipses are usually included to indicate...Franz Dill From The Eponymous Pickle | October 6, 2013 at 02:00 PM
Recommended to me, now scanning and and considering for further use: Data Science for Business: What you need to know about data mining and data-analytic thinking...Franz Dill From The Eponymous Pickle | October 6, 2013 at 01:44 PM