From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last February, the Computing Research Association (CRA) — the umbrella organization of the Computing Community Consortium (CCC) — launched an effort to engage the...Erwin Gianchandani From The Computing Community Consortium Blog | March 9, 2012 at 02:22 PM
The NSF's most prestigious prize, the Alan T. Waterman award, recognizes an outstanding young scientist (35 or under) in any field of science or engineering. Breaking...Lance Fortnow From Computational Complexity | March 9, 2012 at 01:52 PM
Are you safer from software patents today, or more at risk? The news that the Open Invention Network (OIN) has extended the definition of “Linux” so that more software...Simon Phipps From Wild WebMink | March 9, 2012 at 11:30 AM
In Computing Now: About Testing, quality and security concerns for migration to the Cloud. . Some useful comments on important considerations.Franz Dill From The Eponymous Pickle | March 9, 2012 at 01:02 AM
Who knew that having your every move narrated back to you could be so satisfying? Far from annoying, the compelling nature of the voice-overs in Bastion demonstrate...Gail Carmichael From The Female Perspective of Computer Science | March 8, 2012 at 10:18 PM
For the first time in the 37-year history of the distinguished honor, the National Science Foundation (NSF) today named two individuals — both computer scientists...Erwin Gianchandani From The Computing Community Consortium Blog | March 8, 2012 at 07:27 PM
There are about 1800 students at Henry M. Gunn HS (Palo Alto, CA). Enrollment in CS has grown from 90 students three years ago to 110 to 130 last year to 190 this... From Computer Science Teachers Association | March 8, 2012 at 06:00 PM
This was an area we explored at length. During a visit to China in 2003 I saw a remarkable number of examples in retail spaces. Now QR codes and smartphones...Franz Dill From The Eponymous Pickle | March 8, 2012 at 05:50 PM
Via Mark Montgomery of KYield. ... Supercomputing and big data appliances. Venerable Cray take a plunge into the thirst for big data understanding and analytics...Franz Dill From The Eponymous Pickle | March 8, 2012 at 04:05 PM
In another move forward for AI-style interactions, IBM is working with Citicorp:" ... IBM and Citigroup recently announced plans to explore how America's favorite...Franz Dill From The Eponymous Pickle | March 8, 2012 at 03:44 PM
The Open Rights Conference is coming up in London on March 24 and has a glittering array of speakers including Lawrence Lessig and Cory Doctorow. Read all about...Simon Phipps From Wild WebMink | March 8, 2012 at 03:10 PM
The National Socio-Environmental Synthesis Center (SESYNC) — the newest of the national synthesis centers funded by the National Science Foundation (NSF) focused...Erwin Gianchandani From The Computing Community Consortium Blog | March 8, 2012 at 02:24 PM
This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...schneier From Schneier on Security | March 8, 2012 at 12:50 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
CSTA's Annual CS&IT Conference This is the big and best professional development event of the year for middle and high school computer science educators. The program...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 8, 2012 at 12:00 PM
Just watch the presentation, which stole the show at Strata 2012. The written word cannot do justice to Avinash’s passion and his extraordinary ability to communicate...Daniel Tunkelang From The Noisy Channel | March 8, 2012 at 07:23 AM
The NSA has released its specification for a secure Android.
One of the interesting things it's requiring is that all data be tunneled through a secure VPN:
Inter...schneier From Schneier on Security | March 7, 2012 at 07:35 PM
From DemandTec. This was precisely the approach we emphasized for many years within the enterprise. It is all about how the shopper behaves in their increasingly...Franz Dill From The Eponymous Pickle | March 7, 2012 at 05:59 PM
A new term? The term perhaps, but we have been doing this new thing for years. It deserves attention, now being lionized as the next big thing in predictive...Franz Dill From The Eponymous Pickle | March 7, 2012 at 04:42 PM
A good interview by Todd Henry with Peter Bregman. On focus and priorities. " ... In this interview, Peter describes how he came to his 18 minute methodology,...Franz Dill From The Eponymous Pickle | March 7, 2012 at 04:14 PM
Is 1+4 a harder calculation than 4+1?
It may be if you are 2+3 years old.
I asked my 7-2 year old great niece Noelle the
following sequence of questions. I include...GASARCH From Computational Complexity | March 7, 2012 at 03:52 PM