From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, the NSF brought together leaders of the CS10K effort to discuss potential online supports for teachers and students in computer science. Though the concept... From Computer Science Teachers Association | November 13, 2013 at 10:44 PM
If you have followed this space for a long time, you know I cover many technologies and their implications. Most of which I started looking at in the enterprise...Franz Dill From The Eponymous Pickle | November 13, 2013 at 04:56 PM
An example of virtual interaction. " ... The Tangible Media Group at MIT's Media Lab has unveiled a futuristic display made of atoms, not pixels. We live in an...Franz Dill From The Eponymous Pickle | November 13, 2013 at 03:44 PM
I think this is a good move on Microsoft's part:
Microsoft is recommending that customers and CA's stop using SHA-1 for cryptographic applications, including use...schneier From Schneier on Security | November 13, 2013 at 03:17 PM
The last battle? In Knowledge@Wharton. For dominance in retail. " ... In the retail realm, it’s a clash of the titans: Walmart, the world’s largest retailer,But...Franz Dill From The Eponymous Pickle | November 13, 2013 at 03:03 PM
For both my classes, I put together a study guide that included some general tips on studying as well as what topics to focus on. Since the general advice works...Gail Carmichael From The Female Perspective of Computer Science | November 13, 2013 at 12:31 PM
It has been some time since I looked at the vendor Pentaho. Examined it for use in the enterprise. I noticed that they have something called the data blend of...Franz Dill From The Eponymous Pickle | November 13, 2013 at 10:26 AM
A post this week in AmStatNews, the membership magazine of the American Statistical Association, is a ringing endorsement of CCC’s activities: “On the topic of...Ed Lazowska From The Computing Community Consortium Blog | November 13, 2013 at 10:25 AM
On Tuesday, November 12, 2013, the first non-human rang the closing bell on the NASDAQ stock market. A robotic arm was selected to ring the bell to mark the launch...Shar Steed From The Computing Community Consortium Blog | November 13, 2013 at 10:17 AM
Can a semi-structured text database like the Wikipedia be used to extract structured data? This is the goal of the DbPedia: " ... DBpedia is a crowd-sourced community...Franz Dill From The Eponymous Pickle | November 13, 2013 at 10:05 AM
What are the cultural and social aspects of wearable computing? A Ga Tech researcher addresses. While I agree this is an issue, you could, and some did make the...Franz Dill From The Eponymous Pickle | November 13, 2013 at 09:57 AM
Der Speigel is reporting that the GCHQ used QUANTUMINSERT to direct users to fake LinkedIn and Slashdot pages run by -- this code name is not in the article --reacted...schneier From Schneier on Security | November 13, 2013 at 07:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This went out to the CSTA Member mailing list tonight. Thought it was worth sharing. Beginning Monday, November 18th, 13-17 year old pre-university studentsgoogle...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 12, 2013 at 09:05 PM
Register now to attend the 2013 Business Intelligence Symposium offered through the Center for Business Analytics in the Carl H. Lindner College of Business atThe...Franz Dill From The Eponymous Pickle | November 12, 2013 at 03:02 PM
Some of us work hard to generate new ideas. All of us train on how to implement ideas. But our days look like this: I have 100 ideas. I write down 50 of them. The...Daniel Lemire From Daniel Lemire's Blog | November 12, 2013 at 02:40 PM
In Smartblogs: The rise of the omni-channel shopper in the millennial. The link below is also of interest and new to me." ... The Coca-Cola Company sponsors this...Franz Dill From The Eponymous Pickle | November 12, 2013 at 02:17 PM
Adobe lost 150 million customer passwords. Even worse, they had a pretty dumb cryptographic hash system protecting those passwords. schneier From Schneier on Security | November 12, 2013 at 02:04 PM
Mostly Netflix and Youtube. Not surprising, being heavily used video resources. While I am a litte surprised at this: " ... Meanwhile, peer-to-peer file sharing...Franz Dill From The Eponymous Pickle | November 12, 2013 at 11:25 AM
In my last post I asked you to solve the following question which
was from the Maryland Math Competition:
The inequalities 1/2 + 1/3 + 1/6 = 1 and 1/2 + 1/3 +...GASARCH From Computational Complexity | November 12, 2013 at 11:15 AM
Recent research had me take a look back on the Cyc project, which we had examined during our AI explorations. We talked to Lenat's Cycorp. The system promised...Franz Dill From The Eponymous Pickle | November 12, 2013 at 11:15 AM