From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Hashing is a programming technique that maps objects (such as strings) to integers. It is a necessary component of hash tables, one of the most frequently used...Daniel Lemire From Daniel Lemire's Blog | January 17, 2012 at 11:58 AM
Tomorrow, from 8 am to 8 pm EDT, this site, Schneier on Security, is going on strike to protest SOPA and PIPA. In doing so, I'll be joining Wikipedia (in English)...schneier From Schneier on Security | January 17, 2012 at 09:31 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Sorry this is late today. Not a good weekend or morning either. Should be close to 100% for the workshops I am presenting in Vermont on Wednesday and Thursday though...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 17, 2012 at 02:10 AM
an interesting effort. . As the article asks, the end of multiple choice questions? This does delve into the nature of semantic meaning. A friend suggests it...Franz Dill From The Eponymous Pickle | January 17, 2012 at 12:12 AM
Larry Smith told the TEDxUW (University of Waterloo) audience that they will fail to have a great career. After all, there are ever so many excuses that crop up...Gail Carmichael From The Female Perspective of Computer Science | January 16, 2012 at 07:57 PM
This is a first:
...the McCombs allege that the bank, and the payment card industry (PCI) in general, force merchants to sign one-sided contracts that are based...schneier From Schneier on Security | January 16, 2012 at 03:58 PM
The National Institutes of Standards and Technology (NIST) — which recently posted a solicitation containing opportunities for computing researchers — is now out...Erwin Gianchandani From The Computing Community Consortium Blog | January 16, 2012 at 03:36 PM
A visualization of personal computing via graphs of units shipped, from 75 to the present. From lumbering desktops to the very fast emergence of tablets.Franz Dill From The Eponymous Pickle | January 16, 2012 at 02:29 PM
Twitter, Facebook, Google+. Information now comes to us as a faucet. If you don't drink it all it disappears forever. Try to find status updates and tweets from...Lance Fortnow From Computational Complexity | January 16, 2012 at 02:29 PM
See Ed Burghard's paper.li online paper Branding Chatter. He is a former Harley Procter Marketer at Procter & Gamble who has lots of insightful things to say on...Franz Dill From The Eponymous Pickle | January 16, 2012 at 05:21 AM
Ed Burghard sends along his blog post on developing brands about places. Thoughtful. " ... I started the article off with a definition of place branding. At the...Franz Dill From The Eponymous Pickle | January 16, 2012 at 03:04 AM
A report on research at IBM that has decreased the number of material atoms required to store a single bit of information from about a million iron atoms to only...Franz Dill From The Eponymous Pickle | January 16, 2012 at 02:23 AM
Matthew Hurst makes a good point about the ubiquity of Web search slowing the development of artificial intelligence. I saw this repeatedly in the enterprise. ...Franz Dill From The Eponymous Pickle | January 15, 2012 at 07:24 PM
In Innovation Excellence: This good article mentions the (possible) Henry Ford Quote: Franz Dill From The Eponymous Pickle | January 15, 2012 at 07:00 PM
A Robotic Convenience Store.We saw an early prototype of this idea several years ago. A device that contains hundreds of items for ready vending. Was seen as...Franz Dill From The Eponymous Pickle | January 15, 2012 at 03:35 AM
Mark Montgomery of Kyield writes. He cites a Forrester report: " ... One of the main themes in the report concerns expanding the use of BI throughout the organization...Franz Dill From The Eponymous Pickle | January 14, 2012 at 10:08 PM
In the HBR. design your own profession. Depends upon the local culture as to how successful this will be.Franz Dill From The Eponymous Pickle | January 14, 2012 at 07:24 PM
In ReadwriteWeb: Fascinating description of how Facebook is allowing the aggregate and statistical use of its data. What is described here is unstructured textual...Franz Dill From The Eponymous Pickle | January 14, 2012 at 03:52 AM
Yet another story that combines squid and security.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | January 13, 2012 at 10:19 PM