From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 27, 2011 at 10:53 AM
Last night I was running some code for a queuing simulation related to some research I'm doing. This is the Nth time I've used this code; I wrote up the basic...Michael Mitzenmacher From My Biased Coin | December 27, 2011 at 04:24 AM
When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:36 AM
A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:19 AM
Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details...Franz Dill From The Eponymous Pickle | December 27, 2011 at 01:04 AM
Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didnAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 26, 2011 at 10:50 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 26, 2011 at 12:52 AM
Is it of value to Tech? From Wharton. It is always useful to think about, but may not be the key measurement for all innovations. The Kindle Fire is brought...Franz Dill From The Eponymous Pickle | December 25, 2011 at 04:37 PM
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...schneier From Schneier on Security | December 25, 2011 at 04:28 PM
Good WSJ piece on Heuristics. Not random hunches, but rules of thumb that work. Not always perfectly, or optimally, but are very useful to get to a real conclusion...Franz Dill From The Eponymous Pickle | December 24, 2011 at 06:48 PM
As a long time cook this is a challenge. Some alternatives. But no, not impossible. As simple as a file folder. Or as complex as an associative memory.Franz Dill From The Eponymous Pickle | December 24, 2011 at 06:39 PM
LibreOffice Xmas, originally uploaded by elianedomingos. A very happy Christmas to everyone who reads Wild Webmink. May you find software freedom waiting for you...Simon Phipps From Wild WebMink | December 24, 2011 at 09:25 AM
It's a metaphor that will not die.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 24, 2011 at 12:10 AM
Good overall piece in GigaOM on the state of mobile smartphone payments. Have followed the idea for years, and it has been a long road. Finally in 2012? 2013...Franz Dill From The Eponymous Pickle | December 23, 2011 at 08:53 PM
At a recent family gathering, my father-in-law delighted in the accomplishments of his four year old granddaughter who effortlessly navigated her mother's iPad.... From Computer Science Teachers Association | December 23, 2011 at 08:44 PM
As we celebrate the holidays and get set to close the books on 2011 — a banner year for the CCC Blog, with more than twice as many page views as in any previous...Erwin Gianchandani From The Computing Community Consortium Blog | December 23, 2011 at 06:40 PM
In the apparel industry where RFID item level tagging has been generally successful. We commissioned a similar study years ago with MIT and the University of Arkansas...Franz Dill From The Eponymous Pickle | December 23, 2011 at 05:16 PM