From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There are many things I'm thankful for this year. Perhaps most notably, the new year marks the halfway point of my 3-year stint as "Area Dean for Computer Science"...Michael Mitzenmacher From My Biased Coin | December 30, 2011 at 08:51 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was watching an episode of Mythbusters the other day. I always enjoy that show and while most of the attention goes to the two main stars my favorite is Grant...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 30, 2011 at 06:55 PM
Excellent post by Mark Montgomery: Strategic IT Alignment in 2012: Leverage Semantics ... read it hereFranz Dill From The Eponymous Pickle | December 30, 2011 at 05:38 PM
IBM Fellow Grady Booch, co-creator of UML and object-oriented programming, has launched “a transmedia project” seeking to engage “audiences of all ages in the story...Erwin Gianchandani From The Computing Community Consortium Blog | December 30, 2011 at 01:29 PM
Alan A. Kirschenbaum, Michele Mariani, Coen Van Gulijk, Sharon Lubasz, Carmit Rapaport, and Hinke Andriessen, "Airport Security: An Ethnographic Study," Journal...schneier From Schneier on Security | December 30, 2011 at 12:11 PM
In ReadWriteWeb. A look at Kevin Kelly's new book on technology evolution. Makes me want to read it. "... It's a highly ambitious and expansive book, which looks...Franz Dill From The Eponymous Pickle | December 30, 2011 at 04:11 AM
Result of the Year goes to the new bounds on Matrix Multiplication by Andrew Stothers and Virginia Vassilevska Williams. It's not every year that we see progress...Lance Fortnow From Computational Complexity | December 29, 2011 at 08:41 PM
There's a service that can be hired to tie up target phone lines indefinitely. The article talks about how this can be used as a diversionary tactic to mask a...schneier From Schneier on Security | December 29, 2011 at 07:58 PM
10. January 12, 2011- A Joint Call for Research Why Computer Science Education is Important for K-12. This post is well worth a second look to provide a good reminder... From Computer Science Teachers Association | December 29, 2011 at 05:29 PM
An interview with computer pioneer Grace Hopper, who I met while working at the Pentagon. A reminder of how far we have come.Franz Dill From The Eponymous Pickle | December 29, 2011 at 05:18 PM
A great story:
Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...schneier From Schneier on Security | December 29, 2011 at 03:47 PM
In Japan, the home of universal vending, machines that will provide free registration-less WiFi and product. Assuming they will sell advertising for companies that...Franz Dill From The Eponymous Pickle | December 29, 2011 at 02:45 PM
We decided to submit our paper on MIC and MINE to Science it's a venue that my co-authors were familiar with and very interested in applying to. I was happy to...Michael Mitzenmacher From My Biased Coin | December 29, 2011 at 01:07 PM
…became “the center of your world.” So says technology writer/editorErwin Gianchandani From The Computing Community Consortium Blog | December 29, 2011 at 12:18 PM
An interesting result that starts to connect new ad analysis methods with classic methods:------Wall St. Journal and AdWeek Agree withFranz Dill From The Eponymous Pickle | December 29, 2011 at 03:26 AM
Telling a business story. Simple advice overall. " ... Because presentations are generally about very specific topics, companies use SlideShare for inbound marketing...Franz Dill From The Eponymous Pickle | December 28, 2011 at 07:02 PM
Here's a new biometric: how you sit:
...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...schneier From Schneier on Security | December 28, 2011 at 05:40 PM
January: Innovating without permission Not even eventually consistent February: Taking scientific publishing to the next level Ten things Computer Science tells...Daniel Lemire From Daniel Lemire's Blog | December 28, 2011 at 04:42 PM
From The Computing Community Consortium Blog
msnbc.com’s Cosmic Log is out with its list of the top 11 scientific twists from 2011 this morning: The past year brought us the supercomputer that trouncedErwin Gianchandani From The Computing Community Consortium Blog | December 28, 2011 at 12:11 PM
Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...Greg Linden From Geeking with Greg | December 28, 2011 at 06:40 AM