From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
An interesting new report from Anita Borg Institute, CSTA and the University of Arizona called Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 8, 2010 at 09:16 AM
Some books I've read recently have a lot of applicability to education in general and computer science education in specific. So I thought I'd share...
The Mathematician's... From Computer Science Teachers Association | April 8, 2010 at 01:00 AM
I haven’t talked much about TunkRank in the past months, largely because Jason Adams, who stepped up to the TunkRank Implementation Challenge last year, has been...Daniel Tunkelang From The Noisy Channel | April 8, 2010 at 12:48 AM
Yesterday a federal appeals court ruled in a case involving the Federal Communications Commission's (FCC) efforts to sanction Comcast for violating the FCC's net... From U.S. Public Policy Committee of the ACM | April 8, 2010 at 12:20 AM
Any ideas?
At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...schneier From Schneier on Security | April 7, 2010 at 06:37 PM
An interview with Stanford Prof Byron Reeves of Seriosity. " ... On Leadership: Stanford professor Byron Reeves on how online multiplayer games like 'World of Warcraft'...Franz Dill From The Eponymous Pickle | April 7, 2010 at 06:31 PM
Progressive Grocer reports on the continuation of fewer shopping trips and fewer purchases per trip. Interesting statistics.Franz Dill From The Eponymous Pickle | April 7, 2010 at 05:42 PM
Wednesday, March 31, 2010
Panel Members:
David Bell
Joe Pekny, Purdue University
Kenneth Brancik, Northrop Grumman
Petros Mouchtaris, Telcordia
Summary by...Keith Watson From CERIAS Blog | April 7, 2010 at 03:42 PM
I recently posted about P&G doing franchising of product oriented processes. Well known products like Tide and Mr Clean. As part of the Procter alumni networkYou...Franz Dill From The Eponymous Pickle | April 7, 2010 at 03:24 PM
Wednesday, March 31, 2010
Summary by Robert Winkworth
“Everything I Needed to Know About Security I Learned in 1974”
Security luminary David Bell concluded this...Keith Watson From CERIAS Blog | April 7, 2010 at 03:17 PM
Wednesday, March 31, 2010
Summary by Gaspar Modelo-Howard
Day two opened with a keynote from Under Secretary Beers, who has had a long and interesting career3...Keith Watson From CERIAS Blog | April 7, 2010 at 03:15 PM
Tuesday, March 30, 2010
Panel Members:
Mike McConnell, Booz Allen Hamilton
Rand Beers, DHS
Eugene H. Spafford, CERIAS
Summary by Derril Lucci
The fireside...Keith Watson From CERIAS Blog | April 7, 2010 at 03:13 PM
Tuesday, March 30, 2010
Panel Members:
Nicolas Christin, Carnegie Mellon University
Cassio Goldschmidt, Symantec Corporation
Aaron Massey, North Carolina State...Keith Watson From CERIAS Blog | April 7, 2010 at 03:06 PM
Tuesday, March 30, 2010
Panel Members:
Donald Robinson, Northrop Grumman
Ross Maciejewski, Purdue
Alok Chaturvedi, Purdue
Summary by Ryan Poyar
The first...Keith Watson From CERIAS Blog | April 7, 2010 at 03:02 PM
Tuesday, March 30, 2010
Summary by Jason Ortiz
Mike McConnell, retired Admiral of the Navy, former Director of NSA and former Director of National Intelligence...Keith Watson From CERIAS Blog | April 7, 2010 at 02:58 PM
An interview with long time connection Sundar Kadayam about his very innovative search and knowledge system Zakta. We used some of Sundar's previous systems. Also...Franz Dill From The Eponymous Pickle | April 7, 2010 at 02:17 PM
Regular readers may recall hearing about the New York Times Annotated Corpus (which is the basis for the HCIR Challenge), and decision to publish their tags as Linked...Daniel Tunkelang From The Noisy Channel | April 7, 2010 at 02:17 PM
In my
April Fools Day Post
I said the following:
Here are problems that I believe can be solved with
current techniques.
That was indeed true- since they were...GASARCH From Computational Complexity | April 7, 2010 at 02:15 PM
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM