From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Review: Modeling Techniques in Predictive Analytics: Business Problems and Solutions with R by Thomas W. Miller This book does an excellent job of defining prediction...Franz Dill From The Eponymous Pickle | September 26, 2013 at 02:00 PM
Mary Jean Harrold, a professor of software engineering at Georgia Tech, passed away last week. Mary Jean was 67 and still quite active before the cancer struck....Lance Fortnow From Computational Complexity | September 26, 2013 at 01:42 PM
We juggled with link rot since the earliest days of the Internet. As we were trying to build from existing Internet content. You can point to anything, but that...Franz Dill From The Eponymous Pickle | September 26, 2013 at 11:16 AM
Educational Collaboration: " ... IBM is hoping to help create the next generation of "big data" specialists through a series of partnerships with universitiesNine...Franz Dill From The Eponymous Pickle | September 26, 2013 at 10:56 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’ve written about a number of technology competitions and award programs for students in the last month or so. I thought that a single post on them might be useful...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 26, 2013 at 10:42 AM
We interacted with designer Don Norman a few times, author of the ground breaking Design of Everyday Things. This new interview in GigaOM relates well what he...Franz Dill From The Eponymous Pickle | September 26, 2013 at 09:53 AM
Some time ago, for a problem we were working on for visualizing initiative data, we looked at the work of Martin Wattenberg. Probably most famous is his Baby Name...Franz Dill From The Eponymous Pickle | September 26, 2013 at 09:29 AM
Interesting paper: "Three Paradoxes of Big Data," by Neil M. Richards and Jonathan H. King, Stanford Law Review Online, 2013.
Abstract: Big data is all the rage...schneier From Schneier on Security | September 26, 2013 at 07:58 AM
In Computing Now: Video. Small Data in Big Data — Ayse Bener, Ryerson University. From data to knowledge, and leveraging the knowledge to decision. " ... As...Franz Dill From The Eponymous Pickle | September 25, 2013 at 09:08 PM
Spoke today with MooseMobility. An acronym forMobile Out-of-Stock Ordering Sales Electronic Application. " ... Enabling Solutions for your Mobile Sales Force...Franz Dill From The Eponymous Pickle | September 25, 2013 at 08:40 PM
Saw a commercial for this service the other day. Financial training from the Kahn Academy sponsored by the Bank of America. A partnership. A nice idea. IfWhat...Franz Dill From The Eponymous Pickle | September 25, 2013 at 06:07 PM
Lauren Pope of Nokia writes that there are three things to think about if you want your devices and your brain to sing in unison: mindfulness, attention and metacognition...Experientia From Putting People First | September 25, 2013 at 01:28 PM
Simon Roberts, the highly engaging, smart and easily approachable chair of the EPIC conference last week, was so absorbed with all the logistics that he didn’t...Experientia From Putting People First | September 25, 2013 at 12:04 PM
Press release. Have not examined this yet, but it is of interest. SAP was looking at this forecasting direction over a decade ago. The question always arises...Franz Dill From The Eponymous Pickle | September 25, 2013 at 10:47 AM
And the further development of customer segmenation. " ... Customer Segmentation Moves into the Fast Lane ... It is a common marketing dilemma: Companies know...Franz Dill From The Eponymous Pickle | September 25, 2013 at 10:36 AM
Have had a number of talks with industry leader about R and its potential. At least they have heard of it now, but are still nervous about how it fits into their...Franz Dill From The Eponymous Pickle | September 25, 2013 at 10:32 AM
In 2011, the National Science Foundation (NSF) created the Washington Area Trustworthy Computing Hour (WATCH), a series of thought-provoking talks by innovative...Ann Drobnis From The Computing Community Consortium Blog | September 25, 2013 at 09:06 AM
Kim Zetter has written the definitive story -- at least so far -- of the possible backdoor in the Dual_EC_DRBG random number generator that's part of the NIST SP800...schneier From Schneier on Security | September 25, 2013 at 08:17 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This was posted to the AP Computer Science mailing list. I thought it was worth posting here for people not on that list. Looks interesting. Introducing the Second...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 25, 2013 at 08:06 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was helping a student today and realized that he’d been “lost” for a while. I was going pretty quickly and everyone seemed to be keeping up just fine. Not this...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 24, 2013 at 06:26 PM