From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
My job at Microsoft was to promote the use of Microsoft tools for computer science education. It was a great job and I was promoting tools that I had and that I...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 23, 2013 at 06:56 PM
The mobile technology of tomorrow may be real-time, always on and algorithm driven in its characteristics, writes designer Jessi Baker, but there is a real opportunity...Experientia From Putting People First | February 23, 2013 at 04:36 PM
I agree with some of the commenters. Tools may be necessary these days, but they are not sufficient. Your BI project will mostly likely fail not because features...Franz Dill From The Eponymous Pickle | February 23, 2013 at 03:00 PM
There is an empathy gap in technology development, argues April Demosky on the FT’s Tech Blog. “In the analytic, data-driven world of Silicon Valley, emotions often...Experientia From Putting People First | February 23, 2013 at 02:41 PM
The White House Office of Science and Technology Policy has directed that the published results of federally funded research (final peer-reviewed manuscripts or...Ed Lazowska From The Computing Community Consortium Blog | February 23, 2013 at 05:38 AM
Leading high-tech executives spoke this week on the best ways to promote innovation and improve the quality of software patents at an industry-sponsored Congressional...Renee Dopplick From U.S. Public Policy Committee of the ACM | February 23, 2013 at 03:45 AM
Funny.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 22, 2013 at 10:38 PM
The Computing Community Consortium is governed by an 18-member Council, with members on 3-year staggered terms. The CCC’s Nominating Committee invites nominations...Ed Lazowska From The Computing Community Consortium Blog | February 22, 2013 at 08:50 PM
In Adage: Safeway looks at a world without print ads, moves digital. " ... Safeway is doing its best to eliminate print advertising in favor of more personalized...Franz Dill From The Eponymous Pickle | February 22, 2013 at 08:39 PM
I was a guest on Inventing the Future, for an episode on surveillance technology. The video is here.
schneier From Schneier on Security | February 22, 2013 at 08:21 PM
The Computing Research Association (CRA) Outstanding Undergraduate Researchers award program recognizes undergraduate students in North American colleges and universities...Shar Steed From The Computing Community Consortium Blog | February 22, 2013 at 07:56 PM
In a Communications of the ACM Blog, Mark Guzdial raises some probing “Research Questions About MOOCs.” He points to recent articles that explore the impact of...Shar Steed From The Computing Community Consortium Blog | February 22, 2013 at 07:15 PM
I am nearing the end of my five year cycle for recertification, so I am reviewing what professional development activities I have participated in to see what qualifies... From Computer Science Teachers Association | February 22, 2013 at 06:57 PM
In Baseline Mag: Some thoughts and statistics about how people are getting addicted to the tablet format. Retailers and marketers should notice this.Franz Dill From The Eponymous Pickle | February 22, 2013 at 06:09 PM
As the College of Cardinals prepares to elect a new pope, security people like me wonder about the process. How does it work, and just how hard would it be to hack...schneier From Schneier on Security | February 22, 2013 at 05:12 PM
A piece on Ray Kurzweil's (now at Google) latest book: How to Create a Mind: the Secret of Human Thought Revealed. Always fascinating, sometimes over the top...Franz Dill From The Eponymous Pickle | February 22, 2013 at 03:04 PM
An interesting HBR case study of the cost of suspicion in the enterprise. Refreshingly different piece. Also hints at how this can go beyond just the usual personnel...Franz Dill From The Eponymous Pickle | February 22, 2013 at 02:55 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
On one hand this is great. The President of the United States promotes computer science education. On the other hand he talks about it primarily as a vocational...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 22, 2013 at 02:34 PM
This is interesting:
In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being...schneier From Schneier on Security | February 22, 2013 at 12:03 PM
Nick Hunn, CTO at Onzo, a “smarter than normal” Smart Energy start-up, criticizes the service model of the Nest thermostat: “A basic programmable thermostat in...Experientia From Putting People First | February 22, 2013 at 11:18 AM