From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Readwriteweb: Thinking about Twitter as a gaming platform.I am still convinced that there is real value in overlaying game incentives on serious work. See my...Franz Dill From The Eponymous Pickle | May 31, 2010 at 02:19 AM
I good piece on what you can do to make it more difficult to invade your privacy via Google tools. ' ... Bottom line? Big Brother knows a whole lot more than...Franz Dill From The Eponymous Pickle | May 31, 2010 at 12:04 AM
Good overview piece about statistics. This wont tell you how, but will position your knowledge of when stats can be used, and classic errors in their use. A good...Franz Dill From The Eponymous Pickle | May 30, 2010 at 02:30 AM
Do you know Pure Data? A way to analyze multi channel music data. Can it also be used for other kinds of real time data streams? More here, the system's site...Franz Dill From The Eponymous Pickle | May 30, 2010 at 02:13 AM
In the Freakonomics blog, regarding numeracy. Like literacy, it should be valued. From the comments a quote I had not heard: Oscar Wilde said: Franz Dill From The Eponymous Pickle | May 30, 2010 at 01:59 AM
Intriguing piece that is worth considering:" ... Tim Berry has noticed that when two strangers sit next to each other on a plane, the icebreaker that starts a conversation...Franz Dill From The Eponymous Pickle | May 29, 2010 at 02:51 PM
The SEC and The Python What does open source have to do with open data? This extremely insightful move by the SEC demonstrates that the syntax of open data is not...Simon Phipps From Wild WebMink | May 29, 2010 at 12:07 PM
We don't usually do job postings here on the CSTA Advocate blog, but this one is rather special and we want to let you know about the opportunity.
Evan Glazer.... From Computer Science Teachers Association | May 28, 2010 at 10:45 PM
Early squid:
New Canadian research into 500 million-year-old carnivore fossils has revealed an early ancestor of modern-day squids and octopuses, solving the mystery...schneier From Schneier on Security | May 28, 2010 at 09:52 PM
Nick Carr overviews his newly released book and provides some links to excerpts. ' ... The Shallows: What the Internet Is Doing to Our Brains. ... draws on,...Franz Dill From The Eponymous Pickle | May 28, 2010 at 09:24 PM
Not that interesting, really.
Preliminarily, I can tell you that within my sample, cannibalism seems to be on the rise, myctophid consumption is falling, and a...schneier From Schneier on Security | May 28, 2010 at 09:21 PM
Attached is a new DoD directive, reinforcing and clarifying the role of fundamental research at universities.Ed Lazowska From The Computing Community Consortium Blog | May 28, 2010 at 09:17 PM
In MIT Tech Review: Mobile Data: A Gold Mine for Telcos, A snapshot of our activities, cell phone data attracts both academics and industry researchers. ... 'Franz Dill From The Eponymous Pickle | May 28, 2010 at 09:07 PM
Below is a list of items with policy relevance from the May issue of Communications of the ACM. As always, much of the material in CACM is premium content, and... From U.S. Public Policy Committee of the ACM | May 28, 2010 at 08:12 PM
Are children more likely to own a phone than a book? Not sure what own means here, but I have certainly seen more children with phones than with books lately.Franz Dill From The Eponymous Pickle | May 28, 2010 at 06:07 PM
Just a reminder to all of you HCIR people out there that the submission deadline for the HCIR 2010 Workshop on Human-Computer Interaction and Information Retrieval...Daniel Tunkelang From The Noisy Channel | May 28, 2010 at 06:05 PM
The Seventh Canadian Conference on Computer and Robot Vision (CRV 2010) is being held right here in Ottawa next week, and I'll be attending at least a couple of...Gail Carmichael From The Female Perspective of Computer Science | May 28, 2010 at 05:22 PM
I've gotten to the front of the security line at a different airport, and handed a different TSA officer my ID and ticket.
TSA Officer: (Looks everything over....schneier From Schneier on Security | May 28, 2010 at 05:00 PM
Many of the various "proofs" of P≠NP follow a common theme: Define an NP problem with a certain structure. Argue that any algorithm that solves that problem must...Lance From Computational Complexity | May 28, 2010 at 04:36 PM
At the start of semester, at one point I had 48 people signed up for my extension Algorithms and Data Structures course, which I said from day one would not last...Michael Mitzenmacher From My Biased Coin | May 28, 2010 at 04:30 PM