From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From The Computing Community Consortium Blog
There’s anErwin Gianchandani From The Computing Community Consortium Blog | April 1, 2011 at 05:59 PM
Editor's Note: Candidates for the upcoming CSTA election have been invited to post brief blog statements so that members can have a chance to get to know them
... From Computer Science Teachers Association | April 1, 2011 at 05:23 PM
For April Fool’s Day, Wikipedia editors have collected such a wonderful set of links and articles that it seems a shame to let it perish in the daily update. So...Simon Phipps From Wild WebMink | April 1, 2011 at 03:34 PM
I conjecture that, everything else being equal, the level of your education is inversely correlated with innovation. At first, a new idea appears interesting, but...Daniel Lemire From Daniel Lemire's Blog | April 1, 2011 at 02:21 PM
Creepy app warns of an end to privacy The biggest threat to your privacy is not the disclosure of any one piece of data. It's triangulation across all the data...Simon Phipps From Wild WebMink | April 1, 2011 at 01:01 PM
A CS vision professor once told me "Of course we know there is an efficient algorithm for that humans can do it." Are we just nothing more than Turing machines...Lance From Computational Complexity | April 1, 2011 at 12:50 PM
For geolocation developers:" .... SimpleGeo's hosted spatial database service Storage was released from private beta. This is the flagship product from the company...Franz Dill From The Eponymous Pickle | April 1, 2011 at 12:31 PM
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...schneier From Schneier on Security | April 1, 2011 at 11:58 AM
Major emphasis on user-centred design, open innovation and social innovation in new EU innovation strategy On 6 October 2010, the European Commission adopted the...Experientia From Putting People First | April 1, 2011 at 10:59 AM
Earlier this year, the NAE and IOM, along with Health 2.0, announced a challenge for college students throughout the U.S., to create new apps or tools that use...Erwin Gianchandani From The Computing Community Consortium Blog | April 1, 2011 at 03:18 AM
@jzbJoe Brockmeier Microsoft is going to the EU about Google being anticompetitive. That's like Jack the Ripper going to the cops for getting mugged. about 18 hours...Simon Phipps From Wild WebMink | April 1, 2011 at 02:28 AM
Currently reading Sherry Turkle's book, mentioned below:A podcast from HBR IdeaCast: Productivity, Multitasking, and the Death of the PhoneFeatured Guest: Sherry...Franz Dill From The Eponymous Pickle | April 1, 2011 at 01:06 AM
I was told that Empower Research has updated their blog. Here it is. I was recently introduced to some of their work. Emphasizes social media research, Media...Franz Dill From The Eponymous Pickle | April 1, 2011 at 12:27 AM
We have owls in the woods around here. I love going to and from the office after dark and hearing the sound of them going about their business (and competing with...Simon Phipps From Wild WebMink | March 31, 2011 at 10:32 PM
Have now worked on a number of image recognition applications. And have always noticed the big G working around the edges of this space. Here Engadget describes...Franz Dill From The Eponymous Pickle | March 31, 2011 at 06:54 PM
Post from the Burghard group. " ... Eric Canada has studied the impact of existing companies on job growth in communities. His data suggest attraction generally...Franz Dill From The Eponymous Pickle | March 31, 2011 at 03:20 PM
A quite interesting video series by Saffron Technology, I have mentioned them in this space a number of times. A unique application of technology for the enterprise...Franz Dill From The Eponymous Pickle | March 31, 2011 at 03:08 PM
Good piece in GigaOm about the continuing march towards the smartphone largely replacing the credit card and the wallet. Covers as well as some of the issues...Franz Dill From The Eponymous Pickle | March 31, 2011 at 02:30 PM
This isn't good:
The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...schneier From Schneier on Security | March 31, 2011 at 12:00 PM