From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was sitting around thinking about high school computer science curriculum last night when the idea of a programming languages survey course came to mind. I’m...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 21, 2013 at 10:28 AM
I like Thomas H Davenport's concise description of what he calls Analytics 3.0. Much as I dislike the numerical indexing of the approach. It is largely about ...Franz Dill From The Eponymous Pickle | February 21, 2013 at 03:35 AM
In the WSJ Blogs: Thomas H Davenport describes some his findings after meeting with Procter & Gamble. Exploring P&G's long time use of the analytics technology...Franz Dill From The Eponymous Pickle | February 21, 2013 at 03:32 AM
Anita's Quilt is a collection of inspiring stories from real women in technology. I wrote about its launch back in September, and wanted to draw your attention...Gail Carmichael From The Female Perspective of Computer Science | February 21, 2013 at 02:39 AM
A couple of undergraduate students here at Stanford have launched she++, an effort to get more women involved in computing at the undergraduate level.
The clever... From Computer Science Teachers Association | February 20, 2013 at 07:43 PM
Today more about features and directions of the vaunted 'Google Glass' eye wear style interface. Now including voice commands. If this becomes popular it will...Franz Dill From The Eponymous Pickle | February 20, 2013 at 07:28 PM
In Forbes: We saw it coming and it will progress. Apps are becoming part of the consumerization of data and process improvement via systems. Like the movesSee...Franz Dill From The Eponymous Pickle | February 20, 2013 at 07:18 PM
One of the things that has happened over the last few years is that I have learned what I needed on a just in time basis. That is to say that rather than trying...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 20, 2013 at 05:44 PM
The following is a special contribution to the CCC blog from Will Barkis, Project Lead, Mozilla Ignite. Mozilla, in partnership with the National Science Foundation...Shar Steed From The Computing Community Consortium Blog | February 20, 2013 at 05:07 PM
High Roman Wall, originally uploaded by webmink. We went walking yesterday around the remains of the Roman town Calleva Atrebatum in Silchester, Hampshire. This...Simon Phipps From Wild WebMink | February 20, 2013 at 03:40 PM
The politician. He will get people to collaborate on joint projects. How to recognize: He knows everyone! Pro: He makes things happen irrespective of the available...Daniel Lemire From Daniel Lemire's Blog | February 20, 2013 at 03:07 PM
How international soccer matches are fixed.
Right now, Dan Tan's programmers are busy reverse-engineering the safeguards of online betting houses. About $3 billion...schneier From Schneier on Security | February 20, 2013 at 01:29 PM
Interaction, the annual interaction design conference organized by IxDA (the global Interaction Design Association), will head to Amsterdam in in February 2014....Experientia From Putting People First | February 20, 2013 at 12:09 PM
A good overview piece. A review of some of Sherry Turkle's work. We examined this when we looked at Japanese work on robot companions and help mates. The idea...Franz Dill From The Eponymous Pickle | February 20, 2013 at 04:00 AM
In SCiam: When will the Internet reach its limit, and what are the implications? " ... The number of smartphones, tablets and other network-connected gadgets...Franz Dill From The Eponymous Pickle | February 19, 2013 at 10:58 PM
I was sent a copy of Gartner's Magic Quadrant publication for business intelligence and analytics software. A simplistic view, but always a good place to start...Franz Dill From The Eponymous Pickle | February 19, 2013 at 08:50 PM
As a non common-core subject, computer science relies on vigorous policy efforts to help our educational leaders understand the importance of including computing... From Computer Science Teachers Association | February 19, 2013 at 06:59 PM
There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...schneier From Schneier on Security | February 19, 2013 at 06:52 PM
Colleague, correspondent and former co-fellow of mine at SNCR Paul Gillin has written a book just brought to my attention. Attack of the Customers: Why Critics...Franz Dill From The Eponymous Pickle | February 19, 2013 at 03:51 PM