From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
In a Facebook post recently, Gerald Thurman, a computing/math instructor at Scottsdale Community College located in Scottsdale, Arizona introduced me to Vampire...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 7, 2012 at 10:00 AM
Coke has launched a photo sharing application about 'happy places'. Nice idea, how well it will be picked up will depend on. I worked on such an app, and depends...Franz Dill From The Eponymous Pickle | November 6, 2012 at 07:40 PM
Have been re-reading The Design of Business: Why Design Thinking is the Next Competitive Advantage, by Roger Martin. For background on a talk on innovation I...Franz Dill From The Eponymous Pickle | November 6, 2012 at 06:49 PM
Expensive, but it's in complete working order. They're also auctioning off a complete set of rotors; those are even rarer than the machines -- which are often missing...schneier From Schneier on Security | November 6, 2012 at 06:17 PM
In a voting line this morning, which was the first time in memory I had waited more than a few minutes, I noticed the large number of people using smart phones...Franz Dill From The Eponymous Pickle | November 6, 2012 at 05:45 PM
Is anyone out there interested in buying a pile of copies of my Liars and Outliers for a giveaway and book signing at the RSA Conference? I can guarantee enormous...schneier From Schneier on Security | November 6, 2012 at 04:13 PM
According to Pew Internet research, the teachers who instruct the most advanced American secondary school students render mixed verdicts about students’ research...Experientia From Putting People First | November 6, 2012 at 04:07 PM
It doesn't look good.
These are often called SCADA vulnerabilities, although it isn't SCADA that's involved here. They're against programmable logic controllers...schneier From Schneier on Security | November 6, 2012 at 12:40 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This post all started as a comment on a guest post by Barbara Ericson on Mark Guzdial’s blog - The Need for an Industry-based Java Exam. In that post Barbara makes...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 6, 2012 at 10:09 AM
We predict that one of three outcomes will happen Nate Silver is arguably the world’s foremost psephologist. This sounds like someone who foretells a person’s future...Pip From Gödel's Lost Letter and P=NP | November 6, 2012 at 04:59 AM
I have been following DemandTec (Now part of IBM) since they presented at our innovation centers soon after they were formed. I was impressed by the deep analytics...Franz Dill From The Eponymous Pickle | November 5, 2012 at 10:21 PM
I'm happy that I'm starting to get noticed when it comes to my public speaking abilities. My latest speaking request was for a local edition of TED on DecemberTEDxSandyHillWomen...Gail Carmichael From The Female Perspective of Computer Science | November 5, 2012 at 10:11 PM
I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.schneier From Schneier on Security | November 5, 2012 at 08:54 PM
I'd sure like to know more about this:
Government code-breakers are working on deciphering a message that has remained a secret for 70 years.
It was found onSome...schneier From Schneier on Security | November 5, 2012 at 07:26 PM
In Progressive Retailer. A near time view of who the power retailers of the future. Those that operate in mutliple channels. " ... Manufacturers expect Wal-Mart...Franz Dill From The Eponymous Pickle | November 5, 2012 at 07:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I don’t work for Microsoft anymore so I don’t get paid to promote things like this. On the other hand I like the idea of a) applications for social good and b)http...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 5, 2012 at 05:01 PM
While digital ethnography is an established field within ethnography, we don’t often hear of ethnographers building digital tools to conduct their fieldwork. Wendy...Experientia From Putting People First | November 5, 2012 at 05:01 PM
Every year or so the National Science Foundation releases a new version of the holy bible of grant submission procedures, the Grant Proposal Guide. Last month's...Lance Fortnow From Computational Complexity | November 5, 2012 at 01:51 PM
I've written about it before, but not half as well as this story:
"That search was absolutely useless." I said. "And just shows how much of all of this is security...schneier From Schneier on Security | November 5, 2012 at 12:19 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Super Storm Sandy (for various reasons I believe it was not technically a hurricane when it reached me) came and went last week. I was lucky and we only lost power...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 5, 2012 at 10:17 AM