From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Had not heard the term before, but it relates to how strongly an IT department can act as a gatekeeper to software, in this new era of 'Bring Your Own' tools. ...Franz Dill From The Eponymous Pickle | July 18, 2013 at 09:00 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
At the CSTA Conference earlier this week Hadi Partovi from Code.Org announced some plans for this year’s Computer Science Education Week. Specifically providing...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 18, 2013 at 06:15 AM
I have always enjoyed the Wharton series of papers and videos. I just noticed that they had a series of posts especially designed for High School Students.  ...Franz Dill From The Eponymous Pickle | July 17, 2013 at 11:22 PM
Day Two of the summit started with a keynote shared between Peter Lee and Jeannette Wing, who now seem to be sharing heading up Microsoft research. (Rick Rashid...Michael Mitzenmacher From My Biased Coin | July 17, 2013 at 05:07 PM
On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees:
From: xxxxx
Sent: Thursday, July...schneier From Schneier on Security | July 17, 2013 at 03:45 PM
The Library of Congress invites the public to participate in its first Legislative Data Challenge. The winning solution will provide the most effective representation...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 17, 2013 at 02:28 PM
The NSF has recently issued a new program solicitation – Computing and Communication Foundations (CCF): Core Programs. According to the solicitation, “The Division...Shar Steed From The Computing Community Consortium Blog | July 17, 2013 at 01:59 PM
Good article on the longstanding practice of secretly tapping undersea cables.
This is news right now because of a new Snowden document.schneier From Schneier on Security | July 17, 2013 at 01:03 PM
In Progressive Grocer: A good piece on how the CPG is using Big Data. " ... Retailers and consumer packaged goods companies that are applying big data analytics...Franz Dill From The Eponymous Pickle | July 17, 2013 at 12:28 PM
Brought to my attention for a project that will require more than the usual amount of malicious software security. A virtual sandbox called Sandboxie that prevents...Franz Dill From The Eponymous Pickle | July 17, 2013 at 12:14 PM
Last month I gave a talk to a large company that is actively looking for new ways to compete. They have long been seen as a lower cost, but less innovative service...Franz Dill From The Eponymous Pickle | July 17, 2013 at 11:57 AM
In GigaOM: A not unexpected development. 2014 seems to be the year for broad delivery. How will this influence the more personal uses of the smartphone? Will...Franz Dill From The Eponymous Pickle | July 17, 2013 at 09:59 AM
A simple but still incomplete view of the ROI of gamification. The same approach can be seen for many kinds of applications. " ... Measuring ROI is an elusive...Franz Dill From The Eponymous Pickle | July 17, 2013 at 09:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I didn’t go far from home for this one. Tom Indelicato and I teach together at Bishop Guertin High School. Some years ago I hired him to be the fill a need for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 17, 2013 at 05:35 AM
The House Committee on Ways and Means is accepting public statements for the record for Thursday’s hearing on President Obama’s trade policy agenda. The deadline...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 09:06 PM
Friday, July 19 House Hearing on “Mens Rea: The Need for a Meaningful Intent Requirement in Federal Criminal Law” House Judiciary Committee Friday July 19, 9 a.m...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 08:49 PM
At the FCC today, Computer Science Professor Clayton Lewis asserted a new paradigm for accessibility is emerging and that this paradigm may require changes to public...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 08:41 PM
It’s impossible to convey how great this year’s Microsoft Research Faculty Summit has been: a “who’s who” of attendees from academia; heavy participation by top...Ed Lazowska From The Computing Community Consortium Blog | July 16, 2013 at 07:09 PM
Recall from my last post:
PROBLEM 1: There are n people sitting on chairs in a row. Call them p1,...,pn. They will soon have HATS put on their heads, RED or BLUE...GASARCH From Computational Complexity | July 16, 2013 at 05:56 PM
A very good overview of what is called data virtualization:" Data virtualization allows an organization to make its enterprise data easily available to business...Franz Dill From The Eponymous Pickle | July 16, 2013 at 03:16 PM