From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Embedded system vulnerabilities in prisons:
Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...schneier From Schneier on Security | August 2, 2011 at 11:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
There were nine winners in the Partners in Learning 2011 U.S. Innovative Education Forum, four second place winners and five first place winners (one of these was...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 2, 2011 at 09:53 AM
One fun aspect of being on Google+ is occasionally a link comes along worth further notice.The first, from David Karger, is a link to a report (by Democrats, says...Michael Mitzenmacher From My Biased Coin | August 2, 2011 at 01:03 AM
Kiva is a project that allows you to make tiny loans, together with many other people, that accumulate to make a larger loan that will prove huge for an otherwise...Simon Phipps From Wild WebMink | August 1, 2011 at 10:54 PM
Many of us who teach college level computer science have been happy with the latest news about computing and IT related jobs. With the promise of fast growth in... From Computer Science Teachers Association | August 1, 2011 at 10:43 PM
The NSF’s Science Nation has a great feature today on the “Science of Shopping,” describing how computer scientists Rajeev Sharma and Satish Mummareddy have developed...Erwin Gianchandani From The Computing Community Consortium Blog | August 1, 2011 at 08:51 PM
Fascinating Fastcompany article about scavenging power from waste paper and data. Must be some sort of energy conservation involved, though we will always have...Franz Dill From The Eponymous Pickle | August 1, 2011 at 06:40 PM
It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...schneier From Schneier on Security | August 1, 2011 at 05:29 PM
In e-commerce Times: '... In-content ad delivery is tightly integrated with the content a consumer is most interested in -- e.g., a post in a forum, an article...Franz Dill From The Eponymous Pickle | August 1, 2011 at 04:48 PM
Yes, there is more to Washington right now than negotiations and voting on the results. August 2 Briefing: The Strategic Forces Subcommittee of the Senate Armed...David B. From U.S. Public Policy Committee of the ACM | August 1, 2011 at 04:31 PM
Overconfident individuals often win by claiming more resources than they could defend (Johnson and Fowler). If nobody knows who is strongest, whoever thinks he...Daniel Lemire From Daniel Lemire's Blog | August 1, 2011 at 02:55 PM
WRITTEN AUG 1,2011:
It has been said that simple innovative ideas to not get into STOC/FOCS and only
hard technical improvements do. This is one of the motivations...GASARCH From Computational Complexity | August 1, 2011 at 02:18 PM
From The Computing Community Consortium Blog
A few months ago, we announcedErwin Gianchandani From The Computing Community Consortium Blog | August 1, 2011 at 01:07 PM
Interesting paper: "Science Fiction Prototyping and Security Education: Cultivating Contextual and Societal Thinking in Computer Security Education and Beyond,"...schneier From Schneier on Security | August 1, 2011 at 11:03 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week was incredible at the US Innovative Education Forum. IAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 1, 2011 at 08:55 AM
I hope everyone who attended the recent SIGIR 2011 in Beijing had an excellent experience. I didn’t manage to make it to that side of the globe myself, but I’m...Daniel Tunkelang From The Noisy Channel | July 31, 2011 at 09:11 PM
Good piece on neural prosthetics, prompted by military injuries, considerable progress is being made.Franz Dill From The Eponymous Pickle | July 31, 2011 at 05:40 PM
I have been reading Eric J Chaisson's Book: The Hubble Wars, a detailed view of the launch and operation of the Hubble Space Telescope. My background is in astrophysics...Franz Dill From The Eponymous Pickle | July 31, 2011 at 12:24 PM
in GigaOm. Good example of using Google maps based mashups to visualize data. I have seen a number of good examples of this. Simple representations.Franz Dill From The Eponymous Pickle | July 30, 2011 at 05:32 PM
How many friends they have. Obvious answer but the piece makes a reasonable justification.Franz Dill From The Eponymous Pickle | July 30, 2011 at 05:25 PM