From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A great story:
Yet before the demonstration could begin, the apparatus in the lecture theatre began to tap out a message. At first, it spelled out just one word...schneier From Schneier on Security | December 29, 2011 at 03:47 PM
In Japan, the home of universal vending, machines that will provide free registration-less WiFi and product. Assuming they will sell advertising for companies that...Franz Dill From The Eponymous Pickle | December 29, 2011 at 02:45 PM
We decided to submit our paper on MIC and MINE to Science it's a venue that my co-authors were familiar with and very interested in applying to. I was happy to...Michael Mitzenmacher From My Biased Coin | December 29, 2011 at 01:07 PM
…became “the center of your world.” So says technology writer/editorErwin Gianchandani From The Computing Community Consortium Blog | December 29, 2011 at 12:18 PM
An interesting result that starts to connect new ad analysis methods with classic methods:------Wall St. Journal and AdWeek Agree withFranz Dill From The Eponymous Pickle | December 29, 2011 at 03:26 AM
Telling a business story. Simple advice overall. " ... Because presentations are generally about very specific topics, companies use SlideShare for inbound marketing...Franz Dill From The Eponymous Pickle | December 28, 2011 at 07:02 PM
Here's a new biometric: how you sit:
...researchers there developed a system that can recognize a person by the backside when the person takes a seat. The system...schneier From Schneier on Security | December 28, 2011 at 05:40 PM
January: Innovating without permission Not even eventually consistent February: Taking scientific publishing to the next level Ten things Computer Science tells...Daniel Lemire From Daniel Lemire's Blog | December 28, 2011 at 04:42 PM
From The Computing Community Consortium Blog
msnbc.com’s Cosmic Log is out with its list of the top 11 scientific twists from 2011 this morning: The past year brought us the supercomputer that trouncedErwin Gianchandani From The Computing Community Consortium Blog | December 28, 2011 at 12:11 PM
Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...Greg Linden From Geeking with Greg | December 28, 2011 at 06:40 AM
A flavor network. From FlowingData. The different relationships of flavor and location. An interesting example of visual relationships.Franz Dill From The Eponymous Pickle | December 28, 2011 at 04:22 AM
One of the things I enjoy most about working in algorithms is the breadth of work I get to do. And while I've worked on a variety of things, almost all have been...Michael Mitzenmacher From My Biased Coin | December 27, 2011 at 11:17 PM
During the last few weeks I have been fondly reminded of the joys I experienced when teaching and working with a student organization and encountering that rare... From Computer Science Teachers Association | December 27, 2011 at 07:29 PM
Very common examples. I have seen variants of all of these. Still, should be well known to all saavy managers. If you see anything that is similar to these...Franz Dill From The Eponymous Pickle | December 27, 2011 at 06:01 PM
From The Computing Community Consortium Blog
The New York TimesErwin Gianchandani From The Computing Community Consortium Blog | December 27, 2011 at 02:19 PM
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.schneier From Schneier on Security | December 27, 2011 at 12:22 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 27, 2011 at 10:53 AM
Last night I was running some code for a queuing simulation related to some research I'm doing. This is the Nth time I've used this code; I wrote up the basic...Michael Mitzenmacher From My Biased Coin | December 27, 2011 at 04:24 AM
When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:36 AM
A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:19 AM