From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Chris Lehmann is the principal of the Science Leadership Academy, a partnership school in Philadelphia, and a frequent speaker on educational issues. He’s a great...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 13, 2012 at 11:04 AM
Living Offline – A Qualitative Study of Internet Non-Use in Great Britain and Sweden by Bianca Christin Reisdorf (U. of Oxford, UK), Ann-Sofie Axelsson (Chalmers...Experientia From Putting People First | November 13, 2012 at 08:39 AM
Jeff Zabin via Gib Bassett on using simpler business intelligence applications. Especially for the midsize company. Yes, I agree. In fact I would take it even...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:34 AM
In GigaOm: I had always expected that plastic cards would go away once the mobile smartphone-enabled wallet took over. Here the case is made that cards will...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:19 AM
I met Joseph Kyoung-yun of Wayne State at a talk I gave last week and he was nice enough to send along some background on the work he was doing. He writes " ....Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:14 AM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
Advancing Ethnography in Corporate Environments: Challenges and Emerging Opportunities Edited by Brigitte Jordan Left Coast Press November 2012, 224 pages [Amazon...Experientia From Putting People First | November 12, 2012 at 04:55 PM
I am very grateful that I will (hopefully) be lucky enough to see my vision for my Gram's House game developed professionally with research grants. After watching...Gail Carmichael From The Female Perspective of Computer Science | November 12, 2012 at 04:19 PM
The moment I learned that CIKM 2012 would be held in Maui, I knew I had to be there. Having co-organized the CIKM 2011 industry event, I had enough karma to be...Daniel Tunkelang From The Noisy Channel | November 12, 2012 at 03:00 PM
Every year since 2007, The TED Fellows program has recognized young innovators from around the globe for their “insightful, bold ideas that have the potential to...Kenneth Hines From The Computing Community Consortium Blog | November 12, 2012 at 12:02 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I spent a little time tweaking this blog layout last week. Just trying to make it look a little less cookie cutter. I also wanted to add the share buttons at the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 12, 2012 at 09:50 AM
As a result of hijacking a few recitations in MIT's 6.005: Software Construction course to evangelize Scala, I have come into contact with numerous undergraduates...Jean From updated sporadically at best | November 12, 2012 at 04:52 AM
I was fortunate this year not only to be able to attend the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012) in Maui, but also...Daniel Tunkelang From The Noisy Channel | November 12, 2012 at 03:41 AM
David Sibbet, on the use of visualization capabilities with groups, as demonstrated by a mentor and friend at TED. "... It's a simple, inviting, clear demonstration...Franz Dill From The Eponymous Pickle | November 11, 2012 at 10:23 PM
I remember thinking about the advances in computing that year, and how the forecast of dire changes did not occur. This article surveys computing, hardware and...Franz Dill From The Eponymous Pickle | November 11, 2012 at 08:49 PM
In UX Magazine: A complaint that reading a book on a tablet is not the same as reading a physical book. I have thought that for some time, and in general only...Franz Dill From The Eponymous Pickle | November 11, 2012 at 08:37 PM
Had never heard it expressed quite this this way. So what is responsible innovation? " ... We are talking about ethics, in that ethics is responsibility-taking...Franz Dill From The Eponymous Pickle | November 11, 2012 at 08:03 PM
Alistair Sinclair asked me to post the following. For #2; note that those with existing postdoc positions are eligible (the Simons people hope they'll be able to...Michael Mitzenmacher From My Biased Coin | November 11, 2012 at 05:08 PM
From Juris Hartmanis’ Observations About the Development of Theoretical Computer Science on the research leading to his seminal 1965 paper On the Computational...Lance Fortnow From Computational Complexity | November 11, 2012 at 01:41 PM