From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Adding a remote kill switch to cell phones would deter theft.
Here we can see how the rise of the surveillance state permeates everything about computer security...schneier From Schneier on Security | June 28, 2013 at 02:37 PM
The following is a special contribution to this blog from Christos Papadimitriou, C. Lester Hogan Professor of Electrical Engineering and Computer Science at the...Ann Drobnis From The Computing Community Consortium Blog | June 28, 2013 at 02:19 PM
It's finally official: I get to teach for a year!Teach Your Heart Out / Krissy.Venosdale I've had this post bottled up for a while now, waiting for the papers to...Gail Carmichael From The Female Perspective of Computer Science | June 28, 2013 at 02:04 PM
Open source Foundations have a great track record for good governance of open source projects – think of the Apache Software Foundation, the Document Foundation...Simon Phipps From Wild WebMink | June 28, 2013 at 01:38 PM
Out of Carnegie Mellon, new research about how brain activities link to emotions. Further research into nonconscious activity of the brain. Depends strongly...Franz Dill From The Eponymous Pickle | June 28, 2013 at 12:39 PM
A fairly detailed article on work MS is doing to track the mood of people using a smartphone. Called MoodScope. Of interest to enterprises that would like another...Franz Dill From The Eponymous Pickle | June 28, 2013 at 11:41 AM
Another good example of time forward looking search. From a company I have followed for some time: Recorded Future. Good understanding of possible futures has...Franz Dill From The Eponymous Pickle | June 28, 2013 at 10:53 AM
Good examples of the MOOC educational process in progress. Will this be our future education process? How will it be layered with more traditional methods? Efficiencies...Franz Dill From The Eponymous Pickle | June 28, 2013 at 07:39 AM
This is an interesting article about a new breed of malware that also hijack's the victim's phone text messaging system, to intercept one-time passwords sent via...schneier From Schneier on Security | June 28, 2013 at 06:31 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
For the second in my series of blog interviews with computer science educators I present Kathleen Weaver from Hillcrest High School in Dallas Texas. Texas is a...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 28, 2013 at 06:10 AM
GS1's newly redesigned Standards Page. With loads of information on the management of standards in many domains. " ... GS1 develops global standards using the...Franz Dill From The Eponymous Pickle | June 27, 2013 at 08:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This looks like a very good piece of legislation. The basic idea is not to create new programs or additional spending but to reduce barriers to creating more computer...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 27, 2013 at 06:52 PM
An instructive survey by a data scientist of how they use packages in R, the open source statistics, graphics and modeling environment. (analytics productivity)...Franz Dill From The Eponymous Pickle | June 27, 2013 at 04:44 PM
This quote is from the Spring 1997 issue of CRYPTOLOG, the internal NSA newsletter. The writer is William J. Black, Jr., the Director's Special Assistant for Information...schneier From Schneier on Security | June 27, 2013 at 12:49 PM
In our innovation center we featured a number of technologies to engage with the consumer in retail. Digital signage was a common application. We invited companies...Franz Dill From The Eponymous Pickle | June 27, 2013 at 09:58 AM
More on Intel's wireless display aggregating system, dubbed DaaS, or Display as a Service. A friend who knows this space well cautions me that the effort is from...Franz Dill From The Eponymous Pickle | June 27, 2013 at 09:21 AM
The AAA foundation measured cognitive distraction while driving and reported that having a passenger in the car is as dangerous as using a cell phone. On a scale...Lance Fortnow From Computational Complexity | June 27, 2013 at 08:55 AM
Nice essay:
The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...schneier From Schneier on Security | June 27, 2013 at 07:34 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of my summer projects is to collect stories from different computer science teachers. There are many teachers in many types of schools and many of them often...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 27, 2013 at 05:53 AM
In CN Now: Don't know much about the specifics of this topic, but the article provides a good but technical overview. I have been a user of personal and company...Franz Dill From The Eponymous Pickle | June 27, 2013 at 01:33 AM