From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSF’s CISE and Biological Sciences (BIO) directorates have joined forces to seek interdisciplinary proposals that further the frontiers of both fields. In a...Erwin Gianchandani From The Computing Community Consortium Blog | June 1, 2011 at 05:06 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
In all honestly I tend to avoid Slashdot. Oh I scan it for the news from time to time but I work hard at avoiding the comments and avoid the Q&A forums. Why? The...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 1, 2011 at 04:04 PM
DPPI 11, the 5th conference on Designing Pleasurable Products and Interfaces, will take place in Milan at the end of this month, with Experientia partner Mark Vanderbeeken...Experientia From Putting People First | June 1, 2011 at 03:56 PM
I am lucky enough to be situated in a school in the Abu Dhabi emirate (in a town called Al Ain) for 12 weeks. Although I work as a Math advisor, I talk to a number... From Computer Science Teachers Association | June 1, 2011 at 03:18 PM
CI Reader: An American Revolution Into the New Millennium, Volumes I, II, and III is published by the U.S. Office of the National Counterintelligence Executive....schneier From Schneier on Security | June 1, 2011 at 01:59 PM
Thoughts about turning an e-book into a social reading network. Makes sense, though I wonder how often people will interact in this way. Comments on the books...Franz Dill From The Eponymous Pickle | June 1, 2011 at 11:48 AM
Is it based on Insanity and Fear? And will it take decades to complete? An AdAge interview looks at the implications. I think there will be dual channels for...Franz Dill From The Eponymous Pickle | May 31, 2011 at 11:07 PM
I was at RatLoCC last week
which stands for Ramsey Theory in Logic, Combinatorics and Complexity.
The idea was to bring in researchers for all three areas (actually...GASARCH From Computational Complexity | May 31, 2011 at 06:42 PM
That's what the U.S. destroyed after a malfunction in Pakistan during the Bin Laden assassination. (For helicopters, "stealth" is less concerned with radar signatures...schneier From Schneier on Security | May 31, 2011 at 06:12 PM
UPDATE (June 1) – The House Oversight and Government Reform Committee hearing scheduled for June 1 has been postponed. While the Senate is not in session this week...David B. From U.S. Public Policy Committee of the ACM | May 31, 2011 at 06:07 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are you interesting in public service, of using you computer science, web development, information technology and other Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 31, 2011 at 03:55 PM
Their section on Mobile, an increasingly important area, as mobile devices become data gathering and sensor devices. At an event recently I gave an impromptu...Franz Dill From The Eponymous Pickle | May 31, 2011 at 03:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Tara Walker is running a three-day Microsoft Mobile Development appLab at the Library at the Atlanta-Fulton County Library June 7 - 9th : 9:30am - 4:00pm This...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 31, 2011 at 02:36 PM
A good presentation video on competitive intelligence. The startup Recorded Future is a novel search engine that uses the rich time-based information found intheir...Franz Dill From The Eponymous Pickle | May 31, 2011 at 01:33 PM
From The Computing Community Consortium Blog
IRan Libeskind-Hadas From The Computing Community Consortium Blog | May 31, 2011 at 12:39 PM
In my latest book (available February), I talk about various mechanisms for societal security: how we as a group protect ourselves from the "dishonest minority"...schneier From Schneier on Security | May 31, 2011 at 11:34 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Since yesterday was Memorial Day I posted something just a bit fun and saved my links post for today. I hope those of you in the US enjoyed a three day weekend...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 31, 2011 at 09:55 AM
If you Google [relevance theory], you’ll discover this Wikipedia entry about a theory proposed by Dan Sperber and Deirdre WilsonDaniel Tunkelang From The Noisy Channel | May 31, 2011 at 03:19 AM
From Matthew Hurst's site. I remember seeing similar visuals which represented processes like sorting, also very naturally visual. Since this is so visual, could...Franz Dill From The Eponymous Pickle | May 31, 2011 at 12:00 AM