From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This tree in San Mateo, CA, has been turned into a giant blue squid.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | November 8, 2013 at 05:10 PM
Part 2 of my "Why are we learning this?" guide for arts and social science students is a set of testimonials from people in the field that learned to code. I'd...Gail Carmichael From The Female Perspective of Computer Science | November 8, 2013 at 03:53 PM
In Mediapost:" ... Procter & Gamble and Unilever are in the top spots among marketers of consumer packaged goods, and Wal-Mart Stores and Target are the most effective...Franz Dill From The Eponymous Pickle | November 8, 2013 at 03:42 PM
There's a story that Edward Snowden successfully socially engineered other NSA employees into giving him their passwords.schneier From Schneier on Security | November 8, 2013 at 02:06 PM
In the HBR: From a group we used a number of times. For more on that click on the IDEO tag below. We practiced by setting up context creating locations. For...Franz Dill From The Eponymous Pickle | November 8, 2013 at 12:42 PM
When I first read this I thought this it gave the impression that Tableau and Powerpoint were competing for the same purpose. I see them having the same operational...Franz Dill From The Eponymous Pickle | November 8, 2013 at 12:34 PM
Whether you are or will be teaching Exploring Computer Science (ECS) or Computer Science Principles (CSP), the topic of data will begin to permeate your course.... From Computer Science Teachers Association | November 8, 2013 at 12:04 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I'm passing this along for Code.org who I am helping organize tutorials for an Hour of Code during CS education week. We need help evaluating the tutorials we have...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 8, 2013 at 10:12 AM
In the Information Age, it's easier than ever to steal and publish data. Corporations and governments have to adjust to their secrets being exposed, regularly.
...schneier From Schneier on Security | November 8, 2013 at 07:58 AM
Devices once only in the hands of doctors, such as heart or blood pressure monitors, are now in the pockets of consumers, putting them in charge of their health...Experientia From Putting People First | November 8, 2013 at 07:25 AM
Journalism and anthropology both purport to observe and analyse human behaviour and experience, albeit in different ways and over extremely divergent timescales...Experientia From Putting People First | November 8, 2013 at 06:27 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Received this update email from Code.org last night. Looks like an Hour of Code for CS Education week is getting real! And of course it is getting close. Now though...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 8, 2013 at 05:03 AM
These are some of the best known examples of mistakes often made in machine learning i.e. predictive analytics projects. Well stated, the examples are good,...Franz Dill From The Eponymous Pickle | November 7, 2013 at 03:45 PM
The Informs Outreach magazine this month has as its emphasis text analytics. Always interesting, business solution oriented, not heavily technical. I read every...Franz Dill From The Eponymous Pickle | November 7, 2013 at 01:17 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
My friend and fellow teacher Tom Indelicato and I are teaching a new course this year. We are calling to Explorations in Computer Science and it is patterned somewhat...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 7, 2013 at 12:13 PM
Colleague and correspondent Herb Sorensen writes about the shopper from the view of a scientist. He helped us formulate some of the key concepts we used in the...Franz Dill From The Eponymous Pickle | November 7, 2013 at 11:29 AM
Are we making it too easy for machines to take over? In ReadwriteWeb. Do we see early symptoms when we listen for every smartphone ring? I have been reading...Franz Dill From The Eponymous Pickle | November 7, 2013 at 11:05 AM
I have a confession to make. I am one of these people who can’t watch a TV show like Games of throne because there is too much evil. In fact, I generally cringe...Daniel Lemire From Daniel Lemire's Blog | November 7, 2013 at 10:48 AM
Chalking up a terrific talk on bit compression Winsor McCay was a cartoonist and animator in the early part of the twentieth century, and authored the comic strip...rjlipton From Gödel's Lost Letter and P=NP | November 7, 2013 at 10:08 AM
Monday I attended the 24th Symposium on Operating Systems Principles, the lead conference for computer systems research. Why would a nice theorist go to SOSP? Trying...Lance Fortnow From Computational Complexity | November 7, 2013 at 09:57 AM