From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Three different categories of device – for the ears, eyes and wrists, and each with its own set of uses – will soon become prevalent, predicts new Intel chief executive...Experientia From Putting People First | July 19, 2013 at 01:33 AM
In 2013, the Technology Horizons Program of the Institute for the Future commissioned six leading science fiction writers — Cory Doctorow, Rudy Rucker, Warren Ellis...Experientia From Putting People First | July 19, 2013 at 01:28 AM
The emerging experience economy offers a possibility—yet only a possibility—for rethinking and designing new frameworks for social interaction and new forms of...Experientia From Putting People First | July 19, 2013 at 01:20 AM
Can ‘Shades’ of Carmichael Numbers be busted? MAA source Robert Carmichael was an American mathematician who worked and published in various areas of mathematics...Pip From Gödel's Lost Letter and P=NP | July 19, 2013 at 12:42 AM
In Knowledge@Wharton: (In English and Chinese). " ... Chinese Supply Chains Reach an ‘Inflection Point’ – and Multinationals Recast Strategies ... " Precisely...Franz Dill From The Eponymous Pickle | July 18, 2013 at 04:37 PM
From the Santa Fe Institute: I used to be our representative to SFI in the 90s and we got quite a few inspirations from them, and we provided them with problems...Franz Dill From The Eponymous Pickle | July 18, 2013 at 04:20 PM
In SMB Resource: This article was brought to my attention recently. It struck home because I have been working with companies that are increasingly specifying...Franz Dill From The Eponymous Pickle | July 18, 2013 at 01:15 PM
The FCC will discuss the IP Speech-to-Speech Relay program and a report on the implementation of Twenty-First Century Communications and Video Accessibility Act...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 18, 2013 at 12:18 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
For the second year the annual CSTA Conference has had a mobile phone development “throwdown.” In this session each participant has 15 minutes to create a mobile...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 18, 2013 at 10:21 AM
Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...schneier From Schneier on Security | July 18, 2013 at 09:37 AM
This piece makes the point that I often do ... that all analytics, all business decisions, are predictive. The word 'predictive' includes the implication that...Franz Dill From The Eponymous Pickle | July 18, 2013 at 09:30 AM
Had not heard the term before, but it relates to how strongly an IT department can act as a gatekeeper to software, in this new era of 'Bring Your Own' tools. ...Franz Dill From The Eponymous Pickle | July 18, 2013 at 09:00 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
At the CSTA Conference earlier this week Hadi Partovi from Code.Org announced some plans for this year’s Computer Science Education Week. Specifically providing...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 18, 2013 at 06:15 AM
I have always enjoyed the Wharton series of papers and videos. I just noticed that they had a series of posts especially designed for High School Students.  ...Franz Dill From The Eponymous Pickle | July 17, 2013 at 11:22 PM
Day Two of the summit started with a keynote shared between Peter Lee and Jeannette Wing, who now seem to be sharing heading up Microsoft research. (Rick Rashid...Michael Mitzenmacher From My Biased Coin | July 17, 2013 at 05:07 PM
On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees:
From: xxxxx
Sent: Thursday, July...schneier From Schneier on Security | July 17, 2013 at 03:45 PM
The Library of Congress invites the public to participate in its first Legislative Data Challenge. The winning solution will provide the most effective representation...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 17, 2013 at 02:28 PM
The NSF has recently issued a new program solicitation – Computing and Communication Foundations (CCF): Core Programs. According to the solicitation, “The Division...Shar Steed From The Computing Community Consortium Blog | July 17, 2013 at 01:59 PM
Good article on the longstanding practice of secretly tapping undersea cables.
This is news right now because of a new Snowden document.schneier From Schneier on Security | July 17, 2013 at 01:03 PM