From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSF, NIH, Robert Wood Johnson Foundation, and McKesson Foundation announced this week a call for white papers on innovative methods to accelerate the evaluation...Erwin Gianchandani From The Computing Community Consortium Blog | April 29, 2011 at 01:30 PM
In my previous post, I argued that people who pursue double-blind peer review have an idealized “LEGO block” view of scientific research. Research papers are “pure”...Daniel Lemire From Daniel Lemire's Blog | April 29, 2011 at 01:12 PM
A few months back Rudy de Waele (m-trends) got in touch with Ken Banks (kiwanja | FrontlineSMS) and Eric Hersman (WhiteAfrican) about helping to curate a collaborative...Experientia From Putting People First | April 29, 2011 at 09:10 AM
Simple And Usable: Web, Mobile and Interaction Design by Giles Colborne New Riders, Sep 2010 Paperback, 208 pages In a complex world, products that are easy to...Experientia From Putting People First | April 29, 2011 at 07:49 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
If you are a computer science or information technology professor/instructor/teacher would you help us out as we make plans for how Microsoft can support you in...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 29, 2011 at 02:25 AM
Yesterday, I threw a public hissy fit when I found out that Tumblr’s customer service had acted on a trademark request from a company called Zephoria who had written...zephoria From Apophenia | April 29, 2011 at 12:01 AM
Lauren Carlson contacted me a few days ago to point out some posts in her Software Advice blog. She originally posted a very good introductory note about the idea...Franz Dill From The Eponymous Pickle | April 28, 2011 at 11:58 PM
There has been an increased emphasis on equity issues in computer science education in recent years, supported largely by NSF programs aimed at broadening participation... From Computer Science Teachers Association | April 28, 2011 at 04:56 PM
Below is a list of items with policy relevance from the February issue of Communications of the ACM. As always, much of the material in CACM is premium content,... From U.S. Public Policy Committee of the ACM | April 28, 2011 at 03:55 PM
(
Annoucements:
New York Theory day May 13 and
UMCP Theory Postdoc opening.
)
This is an anon guest blogger. Even we don't know who this is! He or she emailed...GASARCH From Computational Complexity | April 28, 2011 at 03:01 PM
Just exploring Flypaper: " .... Software anyone can use to create professional quality multi-touch, interactive or motion graphics content in one-sixth the time...Franz Dill From The Eponymous Pickle | April 28, 2011 at 02:19 PM
In my previous post I introduced the fact that there weren't very many educational games that specifically aim to teach computer science concepts. Here I'll share...Gail Carmichael From The Female Perspective of Computer Science | April 28, 2011 at 01:53 PM
Roger Dooley posts: Walmart CEO confirms Payday Timing Effect. Was thought to be common knowledge, but had never seen a specific 'proof' of the effect. Though...Franz Dill From The Eponymous Pickle | April 28, 2011 at 01:52 PM
Recently I had a meeting with EmPower, custom market and media intelligence services company. Here is an overview of their background and services.Franz Dill From The Eponymous Pickle | April 28, 2011 at 01:40 PM
Newly discovered blog by Kevin Emmons that covers, among other things, neuromarketing. Most recently: Android Phones Using Neuromarketing, where he talks about...Franz Dill From The Eponymous Pickle | April 28, 2011 at 01:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
As someone who is mildly addicted to statistics and who has a degree in Sociology (really) I found this article in Fast Company very interesting on several levels...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 28, 2011 at 01:13 PM
Barnes & Noble Charges Microsoft with Misusing Patents to Further an Anticompetitive Scheme Against Android Barnes and Noble’s strongly-worded response to Microsoft’s...Simon Phipps From Wild WebMink | April 28, 2011 at 01:04 PM
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
Many scientific journals use double-blind peer review. That is, the authors submit their work in a way that cannot be traced back to them. Meanwhile, the authors...Daniel Lemire From Daniel Lemire's Blog | April 28, 2011 at 09:14 AM
We already live in a world where there is ubiquitous computing. Yet there are many complex challenges to combine, direct and have ubiquitous computing ideas link...Franz Dill From The Eponymous Pickle | April 28, 2011 at 04:39 AM