From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
An article suggests that Time Series are Back. Not they have ever been gone. Used them every day in the enterprise. Yet as we gather more time stamped data...Franz Dill From The Eponymous Pickle | April 10, 2013 at 01:26 PM
In Fastcompany. Is boredom a key part of creativity? And do our new devices keep us from getting bored and thus stifle our creativity? I suggest that boredom...Franz Dill From The Eponymous Pickle | April 10, 2013 at 01:12 PM
The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...schneier From Schneier on Security | April 10, 2013 at 11:40 AM
On April 10 the House Intelligence Committee will review H.R. 624, the Cyber Intelligence Sharing and Protection Act. The Committee approved an almost identical...David B. From U.S. Public Policy Committee of the ACM | April 9, 2013 at 08:41 PM
[Mikkel Thorup graciously has offered a guest blog post, discussing what he looks for in conference papers, and possible implications for refereeing.] Results versus...Michael Mitzenmacher From My Biased Coin | April 9, 2013 at 08:28 PM
Last fall, we published a paper about augmented reality, cognitive theories, and learning. One of the tasks of the work was to specifically define what the design...Gail Carmichael From The Female Perspective of Computer Science | April 9, 2013 at 08:07 PM
IEEE Spectrum tells us that this week is Robotics week. In honor of that they are offering a free App that covers many aspects of Robotics research and application...Franz Dill From The Eponymous Pickle | April 9, 2013 at 07:42 PM
A real-world one-way function:
Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...schneier From Schneier on Security | April 9, 2013 at 06:49 PM
Reblogged from Ian Skerrett: Lots of open source projects raise money from their user communities by soliciting donations. Most open source projects will have...Simon Phipps From Wild WebMink | April 9, 2013 at 04:51 PM
In Adage: An emerging era for data driven programming. Programming media, not programming computers. Not really new, we explored this for decades, optimizing...Franz Dill From The Eponymous Pickle | April 9, 2013 at 04:41 PM
The Data 2.0 Summit will be held in San Francisco at the end of the month (April 30th 2013). Some of the speakers might interest the readers of this blog. For example...Daniel Lemire From Daniel Lemire's Blog | April 9, 2013 at 03:20 PM
In conjunction with the Simons Institute for the Theory of Computing, we are pleased to announce that registration is now open for a Symposium on Visions on the...Ann Drobnis From The Computing Community Consortium Blog | April 9, 2013 at 02:23 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Or perhaps hear, see, do? I was asked about my teaching last week. What would my ideal class period look like. It was as they say a thinker. What I have been trying...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 9, 2013 at 01:25 PM
Interesting article from the New Yorker.
I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...schneier From Schneier on Security | April 9, 2013 at 11:05 AM
Service Design by Industrial Designers By Froukje Sleeswijk Visser Technical University Delft 2013, 104 pages Design practice is changing. The applications of design...Experientia From Putting People First | April 9, 2013 at 08:23 AM
In McKinsey Quarterly: A good piece about planning for Big Data projects and value. The detailed article makes a considerable parallel to strategic planning...Franz Dill From The Eponymous Pickle | April 9, 2013 at 05:13 AM
Ayna Agarwal and Ellora Israni, Stanford University computer science students who refer to themselves as "good girls gone geek," are the founders of she++.
She... From Computer Science Teachers Association | April 8, 2013 at 07:58 PM
If you want to get better at something, should remain in your comfort zone? Or should you, rather, be exposed to ideas or techniques slightly beyond your reach?...Daniel Lemire From Daniel Lemire's Blog | April 8, 2013 at 06:31 PM
I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...schneier From Schneier on Security | April 8, 2013 at 06:30 PM
Computing Reviews (an ACM/ThinkLoud publication) has released the 2012 Best Reviews & Notable Books and Articles in Computer Science. The Best Review of 2012 is...Shar Steed From The Computing Community Consortium Blog | April 8, 2013 at 05:49 PM