From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Next week is the CSTA Computer Science & Information Technology Conference in Irvine CA. IAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 5, 2012 at 02:40 PM
I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering...schneier From Schneier on Security | July 5, 2012 at 11:17 AM
In a long article, designer Avi Itzkovitch explains how, when connecting applications across smart devices, UX designers can create product ecosystems that dynamically...Experientia From Putting People First | July 5, 2012 at 07:47 AM
ACTA was defeated today in the European Parliament, but one British Liberal-Democrat MEP voted for it. Understanding why helps us to understand how the political...Simon Phipps From Wild WebMink | July 4, 2012 at 08:18 PM
Junaio has updated their mobile App capabilities for commercial augmented reality. Full report accessible here. Also see a short video explaining mobile augmented...Franz Dill From The Eponymous Pickle | July 4, 2012 at 04:33 PM
Dr James Paul Gee is one of gaming's best advocates by promoting the fact that good games are good for learning. But what exactly is a 'good' game? What makesGames...Gail Carmichael From The Female Perspective of Computer Science | July 4, 2012 at 03:23 PM
From Work at Rice University. Including power delivery from a surface that could be charged with solar. Not quite ready for application, but the portable delivery...Franz Dill From The Eponymous Pickle | July 4, 2012 at 01:43 PM
A third of US homes, like my own, are now cellphone only. Not unexpected, the trend has been moving quickly. Plus other revealing statistics.Franz Dill From The Eponymous Pickle | July 4, 2012 at 01:28 PM
Would George Orwell have been amused or disturbed by the development that Big Brother now knows exactly how long it takes readers to finish his novel, which parts...Experientia From Putting People First | July 4, 2012 at 12:37 PM
Washington Post publisher Katharine Weymouth announced in a memo that the paper has named Laura Evans, who has spent most of her nine years at the Post as chief...Experientia From Putting People First | July 4, 2012 at 12:30 PM
A team of engineers, anthropologists and psychologists at Intel’s Oregon lab is busy developing ways of integrating human emotion and technology in ways that will...Experientia From Putting People First | July 4, 2012 at 07:48 AM
All ideas on sale—most 50% off Asa Candler invented the coupon in 1895. Candler, a pharmacist by trade, later purchased the Coca-Cola company from the original...Pip From Gödel's Lost Letter and P=NP | July 4, 2012 at 05:01 AM
An interview with Andrea Phillips. Fascinating thoughts, especially about gamification and the continuation of expressive story in marketing. " .... Our current...Franz Dill From The Eponymous Pickle | July 3, 2012 at 11:27 PM
While many of us, and our students, are frequent users of search engines, how many of us could really call ourselves "power users", that is, users who can do more... From Computer Science Teachers Association | July 3, 2012 at 04:26 PM
Quick: what is the definition of a byte (as in two kilobytes)? If you said it is a unit of 8 bits, you failed. Correct answer (according to IEEE 1541): A byte is...Daniel Lemire From Daniel Lemire's Blog | July 3, 2012 at 03:45 PM
The ACM Turing Award represents the highest honor in the computing research community, the closest we have to a Nobel prize in computer science. In this centenary...Lance Fortnow From Computational Complexity | July 3, 2012 at 03:17 PM
A set of videos on driving conversations using Google Analytics. Nicely done. " ... This new video series features our Analytics Advocate Justin Cutroni. He...Franz Dill From The Eponymous Pickle | July 3, 2012 at 01:57 PM
Ever since being able to log into systems from home, the trend of extending the work week has progressed. Now some actual data on how data mobility as taken it...Franz Dill From The Eponymous Pickle | July 3, 2012 at 01:51 PM
It's designed to steal blueprints and send them to China.
Note that although this is circumstantial evidence that the virus is from China, it is possible that...schneier From Schneier on Security | July 3, 2012 at 11:22 AM