From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Over the last six weeks, I’ve posted various opportunities for students, academics, and other scholars that I’m co-directing/hosting, many of which have deadlines...zephoria From Apophenia | December 8, 2011 at 07:46 PM
It’s computer science education week and that has me thinking about what I’d like to tell students about computer science. So I decided to record something on the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 8, 2011 at 04:39 PM
CSEdWeek is all about the celebration. We celebrate the teachers who share the challenge and the excitement of the discipline with their students, we celebrateDecember... From Computer Science Teachers Association | December 8, 2011 at 04:10 PM
In addition to Tuesday’s special Science Times describing the future of computing, The New York TimesErwin Gianchandani From The Computing Community Consortium Blog | December 8, 2011 at 01:44 PM
DARPA held an unshredding contest, and there's a winner:
"Lots of experts were skeptical that a solution could be produced at all let alone within the short time...schneier From Schneier on Security | December 8, 2011 at 12:12 PM
Rohan Gunatillake, the lead producer of festivalslab (the Edinburgh Festival Innovations Lab) gives four reasons why new thinking and tools can produce better experiences...Experientia From Putting People First | December 8, 2011 at 10:27 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’m a firm believer that blogs are a great way for teachers to share ideas and builds community. Supporting that sort of community is why I have many blogs listed...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 8, 2011 at 10:03 AM
I have been hearing this term used more and more. It has a Wikipedia entry. I am still old school on this, but can see some of the symptoms. It is likely better...Franz Dill From The Eponymous Pickle | December 8, 2011 at 05:44 AM
Received, interesting thoughts. " ... We at Onlinecollege.org recently came across your blog and were excited to share with you an article Franz Dill From The Eponymous Pickle | December 7, 2011 at 09:48 PM
A very good article on the innovation funnel. We actively used the concept in new business development efforts to think about work planned and underway. I like...Franz Dill From The Eponymous Pickle | December 7, 2011 at 09:10 PM
Things are about to get really nutty, and I expect I won't be able to post to the blog too much in the next 6-8 weeks (though I will still try to get some content...Gail Carmichael From The Female Perspective of Computer Science | December 7, 2011 at 07:10 PM
Just announced:
The researchers found several properties of Skype that can track not only users' locations over time, but also their peer-to-peer (P2P) file-sharing...schneier From Schneier on Security | December 7, 2011 at 06:49 PM
During CS Ed Week I thought I would find some things that may not be what I normally "teach" in CS. I thought I would find things that would make my students think... From Computer Science Teachers Association | December 7, 2011 at 05:31 PM
The recent discussion on Matrix Mult inspires the general
question of WHAT IS A BREAKTHROUGH?
Last year I tried to get an intelligent
discussion on this topic but...GASARCH From Computational Complexity | December 7, 2011 at 03:22 PM
So what does the concept of 'data temperature' mean? Summarized here, with links to more detail:- Hot = accessed all the time, or extremely important data requiring...Franz Dill From The Eponymous Pickle | December 7, 2011 at 03:00 PM
If you haven’t already, be sure to check out the Science Times in yesterday’sErwin Gianchandani From The Computing Community Consortium Blog | December 7, 2011 at 01:44 PM
In Montreal, police marked protesters with invisible ink to be able to identify them later. The next step is going to be a spray that marks people surreptitiously...schneier From Schneier on Security | December 7, 2011 at 12:13 PM