From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The history of coded messages in postage-stamp placement. I wonder how prevalent this actually was. My guess is that it was more a clever idea than an actual...schneier From Schneier on Security | January 4, 2012 at 02:37 PM
From The Computing Community Consortium Blog
Last March, we noted that the National Science Foundation (NSF), together with 7 other international funders, was launching the second round of an international...Erwin Gianchandani From The Computing Community Consortium Blog | January 4, 2012 at 02:04 PM
An Algorithm that estimates who is in control based on speech patterns. Sounds obvious, but there are likely subtle semantic details involved.Franz Dill From The Eponymous Pickle | January 4, 2012 at 10:41 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Registration for the Microsoft Bliink 2012 Illinois Web Design Competition is now open. Bliink (http://bit.ly/Bliink) is open to Illinois students ages 13-19 participating...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 4, 2012 at 10:32 AM
Techdirt Post on how public domain laws are preventing access to works that should surely be available to all by now. A situation that needs to be corrected soon...Franz Dill From The Eponymous Pickle | January 4, 2012 at 02:35 AM
Polls say no. we examined this for years. Paper will always be here, but in reduced amounts. I think tablets will push the gap closer than it had been.Franz Dill From The Eponymous Pickle | January 3, 2012 at 10:14 PM
Most work is akin to construction jobs: you work until the house is built. You just have to keep the servers running day after day. You keep writing code day after...Daniel Lemire From Daniel Lemire's Blog | January 3, 2012 at 09:54 PM
While not the latest trend, I find that more of the teachers in one district I serve are using 'smart' phones among their educational tools for learning. One teacher... From Computer Science Teachers Association | January 3, 2012 at 05:17 PM
(I have already posted this question on CS Theory Stack Exchange.)
If you know that 3-COL is NPC then you can prove that PLANAR 3-COL
is NPC by a NICE gadget...GASARCH From Computational Complexity | January 3, 2012 at 04:40 PM
Data will be a defining Tech Trend. Based on several trips I took in December to clients, it is clear that companies are looking for ways to leverage their huge...Franz Dill From The Eponymous Pickle | January 3, 2012 at 03:04 PM
From The Computing Community Consortium Blog
Happy New Year, everyone! As we kick off 2012,Erwin Gianchandani From The Computing Community Consortium Blog | January 3, 2012 at 01:34 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I had a conversation with one one of the senior managers of the FIRST Lego League challenge. FIRST Lego League or FLL is a robot related competition for students...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 3, 2012 at 10:53 AM
I'm disturbed to find that nobody is offering to pay me large sums just to have me affiliated with them for the purposes of raising their citation count. WhatCrooked...Michael Mitzenmacher From My Biased Coin | January 3, 2012 at 05:00 AM
In Flowingdata: An interesting map that shows the interrelationships of scientific fields based on published papers. This kind of visualization is more useful for...Franz Dill From The Eponymous Pickle | January 2, 2012 at 07:53 PM
Will AI do this?. An Intel director comments. Yes I have believed that since our work in the area in the 80s. It is a matter of timing. We were too optimistic...Franz Dill From The Eponymous Pickle | January 2, 2012 at 06:54 PM
Alan T. Murray and Tony H. Grubesic, "Critical Infrastructure Protection: The Vulnerability Conundrum," Telematics & Informatics, 29 (February 2012): 56schneier From Schneier on Security | January 2, 2012 at 06:33 PM
It’s increasingly clear that we live in collaborative times. Many of the most interesting innovations of recent years have at their heart ideas of sharing, bartering...Experientia From Putting People First | January 2, 2012 at 06:22 PM
Behzad Zare Moayedi, Mohammad Abdollahi Azgomi, "A Game Theoretic Framework for Evaluation of the Impacts of Hackers Diversity on Security Measures," Reliability...schneier From Schneier on Security | January 2, 2012 at 12:15 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Happy New Year! My best wishes for a healthy, happy and prosperous New Year to all my readers. Today is technically the last day of y vacation. Back to a full day...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 2, 2012 at 10:26 AM
Genevieve Bell, interaction and experience research director at Intel Labs, has published a guest post on the BBC website on how artificial intelligence will change...Experientia From Putting People First | January 2, 2012 at 10:00 AM