From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Rebekah Rousi, a researcher of user psychology and PhD candidate of Cognitive Science at the University of Jyväskylä, Finland, describes on EthnographyMatters how...Experientia From Putting People First | April 2, 2013 at 10:22 AM
As we move towards a quantified society, one shaped by data, we start to dismiss things that are unquantified, writes Om Malik of GigaOm. Empathy, emotion and storytelling...Experientia From Putting People First | April 2, 2013 at 09:29 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’ve been following CS education events in my old home of New York City from a distance with great interest. As the song says if you can make it in New York you...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 2, 2013 at 09:25 AM
Data and data sets are not objective, writes Kate Crawford, principal researcher at Microsoft Research, in the Harvard Business Review. They are creations of human...Experientia From Putting People First | April 2, 2013 at 08:59 AM
We live in an era of fast changes. Ten years ago, YouTube was unthinkable, social media did not exist (Facebook was founded in 2004), we got our movies on tapes...Daniel Lemire From Daniel Lemire's Blog | April 2, 2013 at 04:55 AM
Big Data analytics strategy. Still think there is too much being said here, with not enough substance. Its the same problem we worked with many years ago. And...Franz Dill From The Eponymous Pickle | April 2, 2013 at 12:35 AM
In Wired: When I first saw this headline, I thought, Oh, Longitudinal data. Which means you follow one agent or actor in a system and get data about them over...Franz Dill From The Eponymous Pickle | April 2, 2013 at 12:34 AM
When I first started graduate school, an older student told me about the importance of maintaining a feeling of incremental progress. Even if you are doing seemingly...Jean From updated sporadically at best | April 1, 2013 at 10:02 PM
The Golden Ticket: P, NP, and the Search for the Impossible, written by CCC Council and CRA board member, Lance Fortnow is now available. The inspiration for the...Shar Steed From The Computing Community Consortium Blog | April 1, 2013 at 06:39 PM
It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...schneier From Schneier on Security | April 1, 2013 at 05:38 PM
There have been several posts to this Advocate Blog that chat about the lack of diversity in computer science classes and STEM related fields. Quoting from Deborah... From Computer Science Teachers Association | April 1, 2013 at 03:57 PM
Proof from the Chelyabinsk bolide fragment source Viktor Grokhovsky is a member of the Russian Academy of Science’s Committee on Meteorites. He is on the faculty...KWRegan From Gödel's Lost Letter and P=NP | April 1, 2013 at 02:00 PM
All of the math and history in this post is elaborated on in my paper here.
Are there any interesting applications of PURE math to the Social Sciences or History...GASARCH From Computational Complexity | April 1, 2013 at 01:28 PM
Interesting claim about Search engine optimization (SEO): " ... In the past year, Google has revolutionized the game of SEO with a series of updates known as “Penguin...Franz Dill From The Eponymous Pickle | April 1, 2013 at 01:24 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It’s April First which means both the real and virtual worlds will be filled with jokes and tricks and attempts to fool people. No jokes here though. I find most...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 1, 2013 at 12:25 PM
I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...schneier From Schneier on Security | April 1, 2013 at 11:07 AM
A USB device meant to replace a password. Simple idea to use the form of a ring. We do need something new. " ... As part of research into doing away with typed...Franz Dill From The Eponymous Pickle | March 31, 2013 at 05:06 PM
I have had cause to take a look at the latest version of Tabeau Software's approach to visualization. In particular how it can be used with large columnar databases...Franz Dill From The Eponymous Pickle | March 31, 2013 at 05:01 PM
Or 1984 vs Brave new World and Amusing ourself to death. I remember the hoopla when 1984 rolled around, and we apparently had not driven ourselves to those lows...Franz Dill From The Eponymous Pickle | March 31, 2013 at 04:32 PM
In the book The Power of Habit, author Charles Duhigg explains how habits are formed and what it takes to break an ingrained habit. The book references a 2006 study...Experientia From Putting People First | March 31, 2013 at 04:09 PM