From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A commenter asked me a while back to say what I thought of the SIGCOMM submissions this year. I'm finally getting around to reading and reviewing. (First round...Michael Mitzenmacher From My Biased Coin | March 5, 2010 at 10:36 PM
I might be very well the first person to request to teach COMP 1001. That's the course that arts and social science students take to get the hang of computers and...Gail Carmichael From The Female Perspective of Computer Science | March 5, 2010 at 09:15 PM
Very thoughtful piece in the Edge by computer scientist David Gelernter, author of the book Mirror Worlds. Is it time to take the Internet seriously, or just let...Franz Dill From The Eponymous Pickle | March 5, 2010 at 06:30 PM
The Spanish police arrested three people in connection with the 13-million-computer Mariposa botnet.
schneier From Schneier on Security | March 5, 2010 at 12:02 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I have no idea where this came from originally but it showed up on the AP CS mailing list this week. On one level it is very funny especially if you know the Star...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 5, 2010 at 11:20 AM
From CACM. An interesting technical and historical piece about decisions made at Google to make their massive file requirements work on challenging hardware: '...Franz Dill From The Eponymous Pickle | March 5, 2010 at 05:58 AM
Evan Schuman in StoreFrontBackTalk writes about the intriguing implications of Best Buy re-purchasing used products: ' ... With the economy putting intense pressure...Franz Dill From The Eponymous Pickle | March 5, 2010 at 01:31 AM
As a professional community, we need better idea of how many computer science teachers are also involved in informal education. I have a sense that there are many... From Computer Science Teachers Association | March 4, 2010 at 11:48 PM
Can a fragrance be crowdsourced? " ... New Global Online Platform 'Womanity' Will Try, With Help From Women and Martin Sorrell ... French beauty marketer Clarins...Franz Dill From The Eponymous Pickle | March 4, 2010 at 10:26 PM
Steve Portigal, Julie Norvaisas and Dan Soltzberg of Portigal Consulting were invited by Core77 to discuss what makes their clocks tick: the analogue human and...Experientia From Putting People First | March 4, 2010 at 08:04 PM
This is a relatively old article, but worth reading again:The Innovation ImperativeBy Darrel Rhea, Cheskin CEOOriginally published in The HUB Magazine, March 2006Attempts...Franz Dill From The Eponymous Pickle | March 4, 2010 at 07:19 PM
On Tuesday, the White House published an unclassified summary of its Comprehensive National Cybersecurity Initiative (CNCI). Howard Schmidt made the announcement...schneier From Schneier on Security | March 4, 2010 at 06:55 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are you an educator responsible for providing technology training to colleagues? Do you frequently lead teachers with best practices on how to integrate technology...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 4, 2010 at 05:58 PM
One of the key figures in redefining the Windows experience on smartphones is Albert Shum, who’s been with Microsoft for barely two-and-a-half two years. His previous...Experientia From Putting People First | March 4, 2010 at 03:54 PM
From the Economist:Data, data everywhereInformation has gone from scarce to superabundant. That brings huge new benefits, says Kenneth Cukier (interviewed here)Franz Dill From The Eponymous Pickle | March 4, 2010 at 03:27 PM
(Guest post by Samir Khuller, Sudipto Guha, Laci Babai)
Special Issue of the journal
Theory of Computing
in honor of Rajeev Motwani (1962 - 2009)
Submit...GASARCH From Computational Complexity | March 4, 2010 at 03:19 PM
IBM was one of the first companies to actively encourage their employees to blog. As a way to accumulate knowledge and make social network connections in and outside...Franz Dill From The Eponymous Pickle | March 4, 2010 at 02:09 PM
Look at this new AES-encrypted USB memory stick. You enter the key directly into the stick via the keypad, thereby bypassing any eavesdropping software on the...schneier From Schneier on Security | March 4, 2010 at 12:05 PM