From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Posting this a bit late today. I had a very busy weekend which included some snowboarding. That means I was much too tired and sore yesterday to get this ready....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 18, 2013 at 12:22 PM
We have been hearing reports that China is planning to use genetic engineering to make its population smarter. In fact, there are claims that China has been practicing...Daniel Lemire From Daniel Lemire's Blog | March 18, 2013 at 04:51 AM
Locally a good example of predictive text analysis. Mining a large corpus of suicide notes at Cincinnati's Children's Hospital, to model and predict when suicide...Franz Dill From The Eponymous Pickle | March 17, 2013 at 09:07 PM
At the end of 2012, after months of extreme travel, extreme work, and extreme play, I craved balance. When I went home for the holidays I dusted off the copy of...Jean From updated sporadically at best | March 17, 2013 at 07:56 PM
Gib Bassett of Teradata sends along a link to an article about Wal-Mart's use of Big Data. Nice detail that can be instructive to others in this space. If anyone...Franz Dill From The Eponymous Pickle | March 17, 2013 at 03:34 PM
Leprechauns are tricky even when they’re not Neil L. is a Leprechaun. Today I wish to share my experience with him this morning of St. Patrick’s Day. Neil L. has...Pip From Gödel's Lost Letter and P=NP | March 17, 2013 at 05:26 AM
Upcoming Informs Analytics meeting in San Antonio in early April. I have attended many, hosted a few, written speeches for them, presented at many, even received...Franz Dill From The Eponymous Pickle | March 16, 2013 at 02:15 PM
Something we did for thirty plus years. Under all sorts of regimes and priorities. Among what the article suggests, to be ready for chaos. Be agile. Be ready...Franz Dill From The Eponymous Pickle | March 16, 2013 at 02:01 PM
An interesting view. I am still skeptical about the general use of 3D printing for manufacturing. But there are some broadening thoughts here. The designs have...Franz Dill From The Eponymous Pickle | March 16, 2013 at 01:49 PM
I just returned from my first SIGCSE conference inspired and renewed. After listening to Dr. Margolis' closing keynote session, where she confirmed that computer... From Computer Science Teachers Association | March 15, 2013 at 07:14 PM
The politics around codecs are complex and the incumbents are prone to deceptive feints, like in 2010 when MPEG-LA claimed that H.264 was available “free” for web...Simon Phipps From Wild WebMink | March 15, 2013 at 07:07 PM
Tonight is the deadline for the 2013 edition of the Grace Hopper Celebration of Women in Computing's Call for Participation. Although I wasn't sure I was going...Gail Carmichael From The Female Perspective of Computer Science | March 15, 2013 at 06:53 PM
On Wednesday, March 20, a new Robotics roadmap will be presented to the Congressional Caucus on Robotics. The presentation program will include: • Overview – Henrik...Shar Steed From The Computing Community Consortium Blog | March 15, 2013 at 06:14 PM
More on the Procter - Verix partnership , from CEO magazine. Delivering easier to apply Business Intelligence: " ... After a year of intensive teamwork between...Franz Dill From The Eponymous Pickle | March 15, 2013 at 05:51 PM
We had two terrible losses this week. Not people but websites, Intrade and Google Reader.
The corporate auditors for the real-money Irish prediction markets...Lance Fortnow From Computational Complexity | March 15, 2013 at 03:06 PM
Flowing data describes an App that provides a 3D representation of the infrastructure of the Internet. No specific value, except the knowledge that we are riding...Franz Dill From The Eponymous Pickle | March 15, 2013 at 11:32 AM
Symantec has found evidence of Stuxnet variants from way back in 2005. That's much older than the 2009 creation date we originally thought it had. More here and...schneier From Schneier on Security | March 15, 2013 at 10:46 AM