From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On April 1, I announced the Fifth Annual Movie Plot Threat Contest:
Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...schneier From Schneier on Security | June 15, 2010 at 11:02 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The location based location activity-game Foursquare has developed a base of both lovers of the concept and haters. I have tested it for some time now. This CW...Franz Dill From The Eponymous Pickle | June 15, 2010 at 05:10 AM
Please see the new NSF/CISE FY11 cross-cutting program, Smart Health and Wellbeing, which we announced on Friday, June 11: http://www.nsf.gov/pubs/2010/nsf10575...Erwin Gianchandani From The Computing Community Consortium Blog | June 15, 2010 at 02:05 AM
Good article from the VentureLab newsletter:Will LEDs Replace Your Standard House Lightbulb? Definitely MaybeNew solutions in the LED space are clearing the way...Franz Dill From The Eponymous Pickle | June 14, 2010 at 08:32 PM
The Computing Community Consortium recently prepared a white paper titled, “Information Technology Research Challenges for Healthcare: From Discovery to Delivery...Erwin Gianchandani From The Computing Community Consortium Blog | June 14, 2010 at 08:04 PM
This article from the Crimson on the state of Harvard's School of Engineering and Applied Sciences from a couple of weeks ago serves as a good primer for me on...Michael Mitzenmacher From My Biased Coin | June 14, 2010 at 07:57 PM
Ad Age piece on the trends on laundry solutions around the world. An old interest of mine from research within the enterprise.Franz Dill From The Eponymous Pickle | June 14, 2010 at 06:54 PM
From the Freakonomics blog:
At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...schneier From Schneier on Security | June 14, 2010 at 06:46 PM
(I will post about CCC 2010 later in the week.)
The word Game is used in many different contexts within
math and computer science. I list out all that a group...GASARCH From Computational Complexity | June 14, 2010 at 06:11 PM
A common advice given out to young researchers is to find a niche. (See Michael’s Branding Your Research). That is certainly good advice. Instead of being another...Daniel Lemire From Daniel Lemire's Blog | June 14, 2010 at 04:48 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Is school done for the year where you are? Here in the northeast of the US there is another week or two to go. Teachers are finishing up the year, getting their...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 14, 2010 at 03:44 PM
In Junk Charts: Oil Spills Bring out the Worst. A number of examples that just muddy up the data they are trying to deliver. I get the feeling that news organizations...Franz Dill From The Eponymous Pickle | June 14, 2010 at 02:50 PM
June 15
Hearing:
The Senate Homeland Security and Governmental Affairs Committee will hold a hearing on cyberspace as a national asset, with an emphasis on legislation... From U.S. Public Policy Committee of the ACM | June 14, 2010 at 02:38 PM
Always informative value from GS1. Have worked with them for a number of years and reported on their activities here:Tomorrow (Tuesday 15th June) is GS1 MobileCom...Franz Dill From The Eponymous Pickle | June 14, 2010 at 02:15 PM