From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Remote staff? Learn from open source. My article for InfoWorld this week observes that having a distributed team works best when you borrow the practices of the...Simon Phipps From Wild WebMink | September 7, 2012 at 02:18 PM
Truly bizarre story of someone who seems to have figured out how to successfully cheat at marathons. The evidence of his cheating is overwhelming, but no one knows...schneier From Schneier on Security | September 7, 2012 at 12:10 PM
Good topic. An area that also deserves more analytics attention. How should this be done better and lead to more sales and value?Franz Dill From The Eponymous Pickle | September 7, 2012 at 12:04 PM
Science’s Jeffrey Mervis is reporting tonight that the National Science Foundation (NSF) is undertaking a realignment affecting, among other units, its Office of...Erwin Gianchandani From The Computing Community Consortium Blog | September 7, 2012 at 03:02 AM
The integration of sensing technologies to lead to sustainable buildings. A technical paper. A good example of the integration of sensing and focused smart technology...Franz Dill From The Eponymous Pickle | September 7, 2012 at 01:34 AM
I'm trying to separate cloud security hype from reality. To that end, I'd like to talk to a few big corporate CSOs or CISOs about their cloud security worries,...schneier From Schneier on Security | September 6, 2012 at 05:31 PM
This is why middle school CS is a vital step in the path of a comprehensive K-12 CS education!
Brittany Wegner, 17, took the grand prize in this year's Google... From Computer Science Teachers Association | September 6, 2012 at 05:30 PM
Paul Dourish and Scott Mainwaring, the founders of the Intel funded Social Computing Research Center at UC Irvine, presented yesterday a paper at Ubicomp 2012 with...Experientia From Putting People First | September 6, 2012 at 05:25 PM
I'm excited to announce that a project I've been working on all year with some awesome women from the Anita Borg Institute for Women and Technology is launching...Gail Carmichael From The Female Perspective of Computer Science | September 6, 2012 at 03:56 PM
Moments ago, the Institute of Medicine (IOM) of the National Academies released what promises to become a landmark study — Best Care at Lower Cost: The Path to...Erwin Gianchandani From The Computing Community Consortium Blog | September 6, 2012 at 03:17 PM
Ahead of next week’s Dutch election, the UK think tank Demos launched Populism in Europe: Netherlands, which analyses the rise of Geert Wilders’ Partij voor de...Experientia From Putting People First | September 6, 2012 at 03:12 PM
Marko Athisaari, Nokia’s head of design, is pushing a general overall vision where advanced function is blended into unforgettable form¿post-industrial form. The...Experientia From Putting People First | September 6, 2012 at 02:27 PM
Among the many conference/journal discussions, one systems person said the reason they don't publish in journals is that their work is very dependent on current...Lance Fortnow From Computational Complexity | September 6, 2012 at 02:01 PM
According to a recent multi-country study commissioned by Intel Corporation and conducted by Ipsos Observer on “Mobile Etiquette,” the majority of adults and teens...Experientia From Putting People First | September 6, 2012 at 01:57 PM
A study by the Pew Research Center, released Wednesday, found that among Americans adults who use smartphone apps, half had decided not to install applications...Experientia From Putting People First | September 6, 2012 at 01:45 PM
We’ve blogged extensively in this space over the last few months about the promise of Big Data science and engineering, including stories describing how very large...Kenneth Hines From The Computing Community Consortium Blog | September 6, 2012 at 01:20 PM
In this story, we learn that hackers got their hands on a database of 12 million Apple Apple Unique Device Identifiers (UDIDs) by hacking an FBI laptop.
When I...schneier From Schneier on Security | September 6, 2012 at 11:48 AM
MJ Perry reports on online instruction at Marginal University. Another example of college courses online." ... We think education should be better, cheaper, and...Franz Dill From The Eponymous Pickle | September 6, 2012 at 06:52 AM
Well thought out piece .in Mashable. " ... When defining and developing strategy, marketers and agencies must ensure that their clients understand that strategy...Franz Dill From The Eponymous Pickle | September 6, 2012 at 06:15 AM
I was introduced to a new and visually instructive book on optimizing the supply chain: Supply Chain Network Design: Applying Optimization and Analytics to the...Franz Dill From The Eponymous Pickle | September 6, 2012 at 05:59 AM