From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The following is a special contribution to the CCC Blog by Stephanie Forrest, professor of computer science at the University of New Mexico — and until recently...Erwin Gianchandani From The Computing Community Consortium Blog | March 18, 2012 at 03:54 PM
In Innovation Excellence: Forecasting is a long term interest. I have taught it and implemented it in corporate systems. There are many styles, from using...Franz Dill From The Eponymous Pickle | March 18, 2012 at 02:28 PM
It's time for a new chapter in the Seven Languages in Seven Weeks series: today, I take a crack at Scala.Scala, Day 1: ThoughtsAfter using Java for years, I was...Yevgeniy Brikman From Writing | March 18, 2012 at 03:50 AM
From The Computing Community Consortium Blog
From yesterday’s New York Times: WhatErwin Gianchandani From The Computing Community Consortium Blog | March 17, 2012 at 05:55 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Microsoft Research announced a new project a couple of days ago called ChronoZoom - An Infinite Canvas in Time and you can get full information at that link but...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 17, 2012 at 04:17 PM
There are lots of new ways to gather data, are we, or will be be overwhelmed? Some useful thoughts about how to think about gathering and using it.Franz Dill From The Eponymous Pickle | March 17, 2012 at 03:07 PM
Bruce Sterling, the celebrated science fiction writer and author of Tomorrow Now, explains why you don’t need to be clairvoyant to predict the future. The article...Experientia From Putting People First | March 17, 2012 at 10:53 AM
What does it take to introduce e-books and e-readers into communities in low income countries — and is this a good idea, asks Michael Trucano on EduTech, a World...Experientia From Putting People First | March 17, 2012 at 10:45 AM
The ubiquitous presence of cell phones in emerging economies has brought about a wide range of cell phone-based services for low-income groups. Often times, the...Experientia From Putting People First | March 17, 2012 at 10:33 AM
Over the past few years there’s been a lot of discussion around whether an experience can be designed. But it seems, writes Jordan Julien in UX Magazine, like everyone’s...Experientia From Putting People First | March 17, 2012 at 10:27 AM
Exploring mobile-only Internet use: results of a training study in urban South Africa Using an ethnographic action research approach, the study by Jonathan Donner...Experientia From Putting People First | March 17, 2012 at 10:08 AM
By 2020, Chinese consumers will join the ranks of the worldExperientia From Putting People First | March 17, 2012 at 10:00 AM
From Putting People First
“Anthropology, Development and ICTs: Slums, Youth and the Mobile Internet in Urban India” is the title of a research paper by Nimmi Rangaswamy and Edward Cutrell...Experientia From Putting People First | March 17, 2012 at 09:44 AM
It looks great.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 16, 2012 at 09:57 PM
More on gamification. Also known as serious play, a means to use the dynamics of games to get things done more quickly or efficiently, or to even get them done...Franz Dill From The Eponymous Pickle | March 16, 2012 at 08:07 PM
Earlier today at a ribbon-cutting ceremony featuring White House Office of Science and Technology Policy (OSTP)Erwin Gianchandani From The Computing Community Consortium Blog | March 16, 2012 at 05:52 PM
Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).schneier From Schneier on Security | March 16, 2012 at 03:35 PM
Earlier this month, the Advanced Projects Research Agency-Energy (ARPA-E) released a $150 million funding opportunity open to all breakthrough energy technologies...Erwin Gianchandani From The Computing Community Consortium Blog | March 16, 2012 at 01:52 PM