From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was at the industry advisory board meeting for one of the career/vocational schools I am involved with earlier this week and the topic of apps came up. Apps for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 13, 2012 at 09:16 AM
In CACM by Kate MatsudairaWhile there are lots of informative articles on mobile performance, and just as many on general API design, you’ll find few discussing...Franz Dill From The Eponymous Pickle | September 13, 2012 at 04:57 AM
In Mckinsey Quarterly: Overcoming a bias against risk. " .... Risk-averse midlevel managers making routine investment decisions can shift an entire company’s...Franz Dill From The Eponymous Pickle | September 13, 2012 at 02:42 AM
A missed point in the history of cryptography Shinichi Mochizuki recently released a series of four papers (I, II, III, IV) totaling 512 pages that claim to contain...rjlipton From Gödel's Lost Letter and P=NP | September 13, 2012 at 02:24 AM
Brands increasing push notification to mobile shoppers on the move. In BrandWeek. " .... The notifications can be triggered by contextual factors such as location...Franz Dill From The Eponymous Pickle | September 13, 2012 at 02:03 AM
Picture superiority, which means using very few written words in presentations, is evoked in Forbes. Made me think of an important proposal I was part of crafting...Franz Dill From The Eponymous Pickle | September 13, 2012 at 01:56 AM
Pretty much matching my predictions....My graduate course has 50 enrolled right now, fairly close to 50-50 between undergrads and grads.Salil's introductory complexity...Michael Mitzenmacher From My Biased Coin | September 12, 2012 at 08:39 PM
Nice essay on the futility of trying to prevent another 9/11:
"Never again." It is as simplistic as it is absurd. It is as vague as it is damaging. No two words...schneier From Schneier on Security | September 12, 2012 at 05:55 PM
Databases and search engines often store arrays of integers. In search engines, we have inverted indexes that map a query term to a list of document identifiers...Daniel Lemire From Daniel Lemire's Blog | September 12, 2012 at 02:27 PM
The National Science Foundation (NSF), together with the National Institutes of Health (NIH), NASA, and U.S. Department of Agriculture (USDA), yesterday issued...Erwin Gianchandani From The Computing Community Consortium Blog | September 12, 2012 at 12:56 PM
In AdAge: Writing about a recent Google study. Obvious at one level, but also an increasingly important concept as mobile becomes our ever available information...Franz Dill From The Eponymous Pickle | September 12, 2012 at 12:33 PM
In development and talking to:The UC Center for Business Analytics (CBA) brings together organizations and a world-class, multidisciplinary group of faculty and...Franz Dill From The Eponymous Pickle | September 12, 2012 at 12:08 PM
The "Australia's Security Nightmares: The National Security Short Story Competition" is part of Safeguarding Australia 2012.
To aid the national security community...schneier From Schneier on Security | September 12, 2012 at 11:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the things I hear from university computer science faculty on a regular basis is that they have trouble retaining students. What happens is that students...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 12, 2012 at 09:50 AM
Part of the response to the reported excesses in conference spending involving the General Services Administration has been to restrict conference and travel spending...David B. From U.S. Public Policy Committee of the ACM | September 11, 2012 at 08:46 PM
From the current issue of Analytics Magazine. An excellent, practical publication that deals with quantitative analytical methods. Here: " ... How to make choices...Franz Dill From The Eponymous Pickle | September 11, 2012 at 08:12 PM
The National Science Foundation (NSF) announced an organizational realignment last week, including plans to integrate the Office of Cyberinfrastructure (OCI) within...Erwin Gianchandani From The Computing Community Consortium Blog | September 11, 2012 at 06:30 PM
From the Precursor Blog:" ... Google, Amazon, eBay, and Facebook reportedly are launching a new Internet Association in mid-September to be "the unified voice of...Franz Dill From The Eponymous Pickle | September 11, 2012 at 05:47 PM
In Adage: " ... The task of delivering on both sales and creativity falls to Chief Marketing and Communications Officer Keith Weed, a career Unilever executive...Franz Dill From The Eponymous Pickle | September 11, 2012 at 05:03 PM
Last week was the official start to the fall semester, which also marks my official return to being a student. This time, things are a little different: I haveI've...Gail Carmichael From The Female Perspective of Computer Science | September 11, 2012 at 03:49 PM