From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Someone recently shared this Popular Science article about an augmented reality app that 'translates' newspapers for children. The main idea is to simplify the...Gail Carmichael From The Female Perspective of Computer Science | February 14, 2013 at 09:22 PM
Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...schneier From Schneier on Security | February 14, 2013 at 05:42 PM
The Intel Collaborative Research Institute for Sustainable Connected Cities – a cooperation between University College London (UCL), Imperial College London and...Experientia From Putting People First | February 14, 2013 at 04:05 PM
Congratulations to CCC Council member Anita Jones for being named the recipient of the 2012 Philip Hauge Ableson Award. The Ableson award is the highest award conferred...Shar Steed From The Computing Community Consortium Blog | February 14, 2013 at 03:38 PM
Long article.
With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...schneier From Schneier on Security | February 14, 2013 at 12:32 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This year I am experimenting with scaffolding to help students get started with projects. For example I started one group with a project to calculate BMI (BodyDescaffolding...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 14, 2013 at 10:37 AM
For Valentine’s Day, here’s a song about real love. That’s Who Are We Fooling, by Brooke Fraser and Aqualung. Amazon UK will give you £1 to buy any track if you...Simon Phipps From Wild WebMink | February 14, 2013 at 08:00 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
There is some good news from the UK in that Computer Science is going to be part of English Baccalaureate (secondary school) program there. The Ministry of Education...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 14, 2013 at 01:59 AM
1) Sharon Goldberg and Nick Feamster asked me to announce the following:In the tradition of CAEC, NYCE, and etc, we are holding a "Day" on online censorship at...Michael Mitzenmacher From My Biased Coin | February 14, 2013 at 01:21 AM
This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...schneier From Schneier on Security | February 13, 2013 at 07:39 PM
From a specialty in Complex Analysis Rolf Nevanlinna was one of the top complex analysts of the last century, and is widely cited as the most famous Finnish mathematician...rjlipton From Gödel's Lost Letter and P=NP | February 13, 2013 at 07:28 PM
STOC and Complexity are co-located this July in beautiful Palo Alto, California. Both conferences have just announced their accepted papers: STOC (with PDF links...Lance Fortnow From Computational Complexity | February 13, 2013 at 05:42 PM
Divided Brain, Divided World; Why the best part of us struggles to be heard is an RSA report that explores the practical significance of the scientific fact that...Experientia From Putting People First | February 13, 2013 at 04:15 PM
Nicolas Nova went skiing and saw a lot of GoPro cameras on people’s heads. He got intrigued, and wrote an Ethnography Matters column where he questions informal...Experientia From Putting People First | February 13, 2013 at 03:36 PM
How seriously should we (as researchers, practitioners, users, and members of society) seek to understand and factor in the intentions of the designers who made...Experientia From Putting People First | February 13, 2013 at 03:31 PM
There's not a lot of information -- and quite a lot of hyperbole -- in this article:
With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...schneier From Schneier on Security | February 13, 2013 at 12:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I found this very interesting info graphic (OK Doug Peterson tweeted the link so really he found it first) from Seattle University at Training in Technology: The...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 13, 2013 at 10:14 AM
Think of your favourite games that are about a particular character. Do you actually play that character, or are you just the coach? That is, are you able to fully...Gail Carmichael From The Female Perspective of Computer Science | February 12, 2013 at 08:33 PM
This is an amazing story. I urge you to read the whole thing, but here's the basics:
A November car chase ended in a "full blown-out" firefight, with glass and...schneier From Schneier on Security | February 12, 2013 at 06:55 PM
The other day I was reading () Desire2Learn Acquires Course-Suggestion Software Inspired by Netflix and Amazon. The article discusses a program that uses information... From Computer Science Teachers Association | February 12, 2013 at 05:28 PM