From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A balanced view from E-Commerce Times about the topic. What it is and is definitely not. Recently have been asked for a concise definition of Big Data, and though...Franz Dill From The Eponymous Pickle | June 29, 2013 at 10:05 AM
The producer-consumer model is so ingrained in our society that we tend to treat everything like a product—a one-and-done offering that can be pushed to the market...Experientia From Putting People First | June 29, 2013 at 05:35 AM
Many agree that a combination of factors – a demand for better user experience, the rise of ubiquitous technologies and more readily accessible datasets – present...Experientia From Putting People First | June 29, 2013 at 05:22 AM
The College Board announced this month a new Advanced Placement course and exam – Computer Science Principles (AP CSP). The course will introduce high school students...Renee Dopplick From U.S. Public Policy Committee of the ACM | June 28, 2013 at 06:32 PM
As my Area Administrator Tristen reminded me, "...today is officially your last day as my boss..." Monday is July 1, which officially ends my term as Area Dean...Michael Mitzenmacher From My Biased Coin | June 28, 2013 at 05:08 PM
Video story on Animal Planet.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 28, 2013 at 05:07 PM
We worked with and visited the nonprofit research group SRI a number of times. They originally had been spun out of Stanford University. They were involved in...Franz Dill From The Eponymous Pickle | June 28, 2013 at 04:29 PM
Last week, I gave a talk at Google. It's another talk about power and security, my continually evolving topic-of-the-moment that could very well become my next...schneier From Schneier on Security | June 28, 2013 at 03:42 PM
Thomas Davenport on the use of Big Data in the travel industry. A very nontechnical view of the potential, but not necessarily current use of Big Data in the online...Franz Dill From The Eponymous Pickle | June 28, 2013 at 03:35 PM
Adding a remote kill switch to cell phones would deter theft.
Here we can see how the rise of the surveillance state permeates everything about computer security...schneier From Schneier on Security | June 28, 2013 at 02:37 PM
The following is a special contribution to this blog from Christos Papadimitriou, C. Lester Hogan Professor of Electrical Engineering and Computer Science at the...Ann Drobnis From The Computing Community Consortium Blog | June 28, 2013 at 02:19 PM
It's finally official: I get to teach for a year!Teach Your Heart Out / Krissy.Venosdale I've had this post bottled up for a while now, waiting for the papers to...Gail Carmichael From The Female Perspective of Computer Science | June 28, 2013 at 02:04 PM
Open source Foundations have a great track record for good governance of open source projects – think of the Apache Software Foundation, the Document Foundation...Simon Phipps From Wild WebMink | June 28, 2013 at 01:38 PM
Out of Carnegie Mellon, new research about how brain activities link to emotions. Further research into nonconscious activity of the brain. Depends strongly...Franz Dill From The Eponymous Pickle | June 28, 2013 at 12:39 PM
A fairly detailed article on work MS is doing to track the mood of people using a smartphone. Called MoodScope. Of interest to enterprises that would like another...Franz Dill From The Eponymous Pickle | June 28, 2013 at 11:41 AM
Another good example of time forward looking search. From a company I have followed for some time: Recorded Future. Good understanding of possible futures has...Franz Dill From The Eponymous Pickle | June 28, 2013 at 10:53 AM
Good examples of the MOOC educational process in progress. Will this be our future education process? How will it be layered with more traditional methods? Efficiencies...Franz Dill From The Eponymous Pickle | June 28, 2013 at 07:39 AM
This is an interesting article about a new breed of malware that also hijack's the victim's phone text messaging system, to intercept one-time passwords sent via...schneier From Schneier on Security | June 28, 2013 at 06:31 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
For the second in my series of blog interviews with computer science educators I present Kathleen Weaver from Hillcrest High School in Dallas Texas. Texas is a...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2013 at 06:10 AM