From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
When I talk about Liars and Outliers to security audiences, one of the things I stress is our traditional security focus -- on technical countermeasures -- is much...schneier From Schneier on Security | May 30, 2012 at 05:54 PM
Data and graphs from Mark Perry on the inflation of grades and college costs. Are they related? Hearing more talk about the necessity of a college education....Franz Dill From The Eponymous Pickle | May 30, 2012 at 02:41 PM
Sun acknowledged in 2008 and 2009 that Java ME was fragmented – and had been for years – without any help from Android. More in today’s article on ComputerWorld...Simon Phipps From Wild WebMink | May 30, 2012 at 02:39 PM
Our colleagues at IEEE’s Spectrum have posted a neat montage of the exhibit hall at last week’sErwin Gianchandani From The Computing Community Consortium Blog | May 30, 2012 at 12:14 PM
The context is tornado warnings:
The basic problem, Smith says, it that sirens are sounded too often in most places. Sometimes they sound in an entire county for...schneier From Schneier on Security | May 30, 2012 at 11:44 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I worked with concept and mind mapping for a number of years, and use it still for consulting interactions. It is still evolving. Allowing us to co-create conversations...Franz Dill From The Eponymous Pickle | May 30, 2012 at 03:52 AM
ACM Turing Centenary Celebration to Be Webcast Live!If you can't attend ACM's Turing Centenary Celebration, you can still experience the thrill of rubbing elbows...Franz Dill From The Eponymous Pickle | May 29, 2012 at 11:25 PM
In April, the Computing Community Consortium (CCC) commissioned members of the computer architecture research community to generate a short report to help guide...Erwin Gianchandani From The Computing Community Consortium Blog | May 29, 2012 at 07:02 PM
I think my last blog was written while I was monitoring my final exam. This one is written as I take a break from planning for a summer institute for teachers for... From Computer Science Teachers Association | May 29, 2012 at 05:08 PM
May 31 Hearing: The Communications and Technology Subcommittee of the House Energy and Commerce Committee will hold a hearing on international proposals to regulate...David B. From U.S. Public Policy Committee of the ACM | May 29, 2012 at 04:43 PM
One thing I noticed talking to CS graduates from Harvard this year is -- entirely anecdotally -- more seem to be going to small start-ups. This has been an increasing...Michael Mitzenmacher From My Biased Coin | May 29, 2012 at 03:37 PM
I have been reading: Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics by Bill Franks. I read this in preparation...Franz Dill From The Eponymous Pickle | May 29, 2012 at 03:28 PM
Human-computer Information Retrieval (HCIR) combines research from the fields of human-computer interaction (HCI) and information retrieval (IR), placing an emphasis...Daniel Tunkelang From The Noisy Channel | May 29, 2012 at 03:08 PM
The theoretical computer science job market has mostly settled so time for the annual spring jobs posts. I set up a Google Spreadsheet that everyone can edit so...Lance Fortnow From Computational Complexity | May 29, 2012 at 02:31 PM
From The Computing Community Consortium Blog
Mobiledia is out this week with an interesting article about “Big Data”: Technology is improving Siri, powering driverless cars, improving cancer treatment and...Erwin Gianchandani From The Computing Community Consortium Blog | May 29, 2012 at 12:30 PM
We all knew this was possible, but researchers have found the exploit in the wild:
Claims were made by the intelligence agencies around the world, from MI5, NSA...schneier From Schneier on Security | May 29, 2012 at 12:28 PM
The legal kind. It's interesting:
Q: How realistic are movies that show people breaking into vaults?
A: Not very! In the movies it takes five minutes of razzle...schneier From Schneier on Security | May 29, 2012 at 11:03 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Links are a day late because of the Memorial Day holiday. A day of remembrance. I spent a little time with my father, a combat veteran of World War II which was...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 29, 2012 at 09:31 AM
Dr Paul Bernal, a lecturer in information technology, intellectual property and media law at the University of East Anglia (UK), provides clarification on what...Experientia From Putting People First | May 29, 2012 at 07:49 AM