From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
February 16 Hearing: The Senate Homeland Security and Government Affairs Committee will hold a hearing on the Cybersecurity and Internet Freedom Act of 2012. 2:30...David B. From U.S. Public Policy Committee of the ACM | February 13, 2012 at 02:52 PM
This is an old story from before I had a blog, but one of my favorite on when technology goes bad.
In the late 90's, the undergraduate CS coordinator at the time...Lance Fortnow From Computational Complexity | February 13, 2012 at 02:21 PM
Since the dawn of the digital age, fundamental research sponsored by the FederalErwin Gianchandani From The Computing Community Consortium Blog | February 13, 2012 at 12:38 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Home again after a week in Texas! Had a great time in Texas both at the TCEA conference and the steering committee meeting for the CS 2013 project. All in all I...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 13, 2012 at 10:56 AM
Over the years I have been investigating all sorts of mapping methods. Concept, process and Mind maps are common approaches that I have used in my work for years...Franz Dill From The Eponymous Pickle | February 13, 2012 at 06:53 AM
In the NYT Sunday Review: On the impact of big data. Personally I think it is how business analytical methods can be effectivey used against the right amount...Franz Dill From The Eponymous Pickle | February 12, 2012 at 09:09 PM
In the Chronicle of Education: A teacher rethinks teaching with technology. Like the solution to any difficult problem, it is never all just about technology...Franz Dill From The Eponymous Pickle | February 12, 2012 at 09:01 PM
Adaptive Marketing was a new term to be. Apparently devised by Mindshare to describe consumer focused and data based marketing. It is good to be as adaptive as...Franz Dill From The Eponymous Pickle | February 12, 2012 at 08:50 PM
From The Computing Community Consortium Blog
A great pieceErwin Gianchandani From The Computing Community Consortium Blog | February 12, 2012 at 05:12 PM
My excursion to Seattle was delightful, and I thought I’d share some details with readers. I spent most of Friday at the University of Washington, meeting with...Daniel Tunkelang From The Noisy Channel | February 12, 2012 at 09:11 AM
Today is the second day of Prolog in the Seven Languages in Seven Weeks series of blog posts. You can find the first day of Prolog here.Prolog, Day 2: ThoughtsToday...Yevgeniy Brikman From Writing | February 11, 2012 at 10:44 PM
I started using Twitter about four years ago, dubbing it an 'experiment'. I continue to use Twitter, in part because some clients and colleagues use it, and in...Franz Dill From The Eponymous Pickle | February 11, 2012 at 08:56 PM
Ultrafast Trades Trigger Black Swan Events Every Day, Say Econophysicists The US financial markets have suffered over 18,000 extreme price changes caused by ultrafast...Franz Dill From The Eponymous Pickle | February 11, 2012 at 04:05 PM
It is obvious that it is, but how? In E-Commerce Times. An author speaks: " ... Just as the iPod changed the music industry a decade ago, e-books are changing...Franz Dill From The Eponymous Pickle | February 11, 2012 at 03:45 PM
This performance by 20-year-old Sarah Jarosz is completely magical. She’s supported by Alison Krauss and Jerry Douglas but there’s no missing her star quality....Simon Phipps From Wild WebMink | February 11, 2012 at 09:11 AM
Pew Internet & American Life Project just released a new study called “The tone of life on social networking sites” where they examine adult meanness and cruelty...zephoria From Apophenia | February 11, 2012 at 01:46 AM
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM