From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the HBR: From a group we used a number of times. For more on that click on the IDEO tag below. We practiced by setting up context creating locations. For...Franz Dill From The Eponymous Pickle | November 8, 2013 at 12:42 PM
When I first read this I thought this it gave the impression that Tableau and Powerpoint were competing for the same purpose. I see them having the same operational...Franz Dill From The Eponymous Pickle | November 8, 2013 at 12:34 PM
Whether you are or will be teaching Exploring Computer Science (ECS) or Computer Science Principles (CSP), the topic of data will begin to permeate your course.... From Computer Science Teachers Association | November 8, 2013 at 12:04 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I'm passing this along for Code.org who I am helping organize tutorials for an Hour of Code during CS education week. We need help evaluating the tutorials we have...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 8, 2013 at 10:12 AM
In the Information Age, it's easier than ever to steal and publish data. Corporations and governments have to adjust to their secrets being exposed, regularly.
...schneier From Schneier on Security | November 8, 2013 at 07:58 AM
Devices once only in the hands of doctors, such as heart or blood pressure monitors, are now in the pockets of consumers, putting them in charge of their health...Experientia From Putting People First | November 8, 2013 at 07:25 AM
Journalism and anthropology both purport to observe and analyse human behaviour and experience, albeit in different ways and over extremely divergent timescales...Experientia From Putting People First | November 8, 2013 at 06:27 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Received this update email from Code.org last night. Looks like an Hour of Code for CS Education week is getting real! And of course it is getting close. Now though...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 8, 2013 at 05:03 AM
These are some of the best known examples of mistakes often made in machine learning i.e. predictive analytics projects. Well stated, the examples are good,...Franz Dill From The Eponymous Pickle | November 7, 2013 at 03:45 PM
The Informs Outreach magazine this month has as its emphasis text analytics. Always interesting, business solution oriented, not heavily technical. I read every...Franz Dill From The Eponymous Pickle | November 7, 2013 at 01:17 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
My friend and fellow teacher Tom Indelicato and I are teaching a new course this year. We are calling to Explorations in Computer Science and it is patterned somewhat...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 7, 2013 at 12:13 PM
Colleague and correspondent Herb Sorensen writes about the shopper from the view of a scientist. He helped us formulate some of the key concepts we used in the...Franz Dill From The Eponymous Pickle | November 7, 2013 at 11:29 AM
Are we making it too easy for machines to take over? In ReadwriteWeb. Do we see early symptoms when we listen for every smartphone ring? I have been reading...Franz Dill From The Eponymous Pickle | November 7, 2013 at 11:05 AM
I have a confession to make. I am one of these people who can’t watch a TV show like Games of throne because there is too much evil. In fact, I generally cringe...Daniel Lemire From Daniel Lemire's Blog | November 7, 2013 at 10:48 AM
Chalking up a terrific talk on bit compression Winsor McCay was a cartoonist and animator in the early part of the twentieth century, and authored the comic strip...rjlipton From Gödel's Lost Letter and P=NP | November 7, 2013 at 10:08 AM
Monday I attended the 24th Symposium on Operating Systems Principles, the lead conference for computer systems research. Why would a nice theorist go to SOSP? Trying...Lance Fortnow From Computational Complexity | November 7, 2013 at 09:57 AM
I like this idea of giving each individual login attempt a risk score, based on the characteristics of the attempt:
The risk score estimates the risk associated...schneier From Schneier on Security | November 7, 2013 at 08:06 AM
A number of interesting items in the Edge about the implications of new models, and most notable to me the implications of Big Data, for social science. Social...Franz Dill From The Eponymous Pickle | November 7, 2013 at 12:00 AM
After mentioning the startup Waze, recently acquired by Google, I was sent a note to take a look at the startup Wix. I was intrigued by their description of it...Franz Dill From The Eponymous Pickle | November 6, 2013 at 11:42 PM
Technology solutions for dementia care. Here from the CACM. An extensive view of technology current and future uses, and the barriers involved. I am peripherally...Franz Dill From The Eponymous Pickle | November 6, 2013 at 11:24 PM