From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Did you know that January is (US) National Clean Up Your Computer month? I didn't manage to clean up my computer, but I did clean up my blog subscriptions, by deleting... From Computer Science Teachers Association | February 13, 2010 at 07:32 AM
I don't know which is more exciting: that someone is trying to break the squid record, or that there is a squid record in the first place.
An Auckland scientist...schneier From Schneier on Security | February 12, 2010 at 10:32 PM
A good case study in StorefrontBackTalk on the ROI from mobile marketing efforts by Pizza-Hut.-Franz Dill From The Eponymous Pickle | February 12, 2010 at 09:28 PM
This looks to be very interesting, if you are in the Cincinnati area consider attending: Sixth Annual Workshop on Hot Topics in Supply Chain Analytics, Practice...Franz Dill From The Eponymous Pickle | February 12, 2010 at 08:25 PM
One of the upsides of working for a university are the stimulating academic discussions. Yesterday, a philosopher challenged me a question:
Beyond the fact that...Daniel Lemire From Daniel Lemire's Blog | February 12, 2010 at 04:46 PM
In CACM: Recent Progress in Quantum Algorithms: What quantum algorithms outperform classical computation and how do they do it?. The early parts of this article...Franz Dill From The Eponymous Pickle | February 12, 2010 at 02:50 PM
In the Enterprise a key goal was intimately understanding the needs of the consumer. It can be done in part by talking to many of them in contextual environments...Franz Dill From The Eponymous Pickle | February 12, 2010 at 01:43 PM
This< is neat:
The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...schneier From Schneier on Security | February 12, 2010 at 12:23 PM
New flaws in chip and pin system revealed
Watch the video and see this entirely straightforward attack being carried out. There...webmink From Wild WebMink | February 12, 2010 at 12:07 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I posted about some professional development opportunities for teachers this summer. I expect to post most in the days to come. But for now the otheriD...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 12, 2010 at 10:27 AM
Earlier this month the Administration released its budget request for the 2011 Fiscal Year, which will start October 1 (whether or not Congress finishes the budget... From U.S. Public Policy Committee of the ACM | February 12, 2010 at 02:35 AM
The attendees at the CCC-supported workshop on Free/Open Source Software met today at UC Irvine’s Bren School of Information and Computer Sciences to work in break...John L King From The Computing Community Consortium Blog | February 12, 2010 at 01:09 AM
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
(Univ of MD at College Park had Monday, Tuesday, Wed, Thursday all off.
I've spend most of that time shoveling snow, so I am tired. Hence I am glad
to have a SHORT...GASARCH From Computational Complexity | February 11, 2010 at 08:18 PM
This is the first in a three-part series of design proposals for augmented reality learning applications. These are from a paper I wrote in my computers and cognition...Gail Carmichael From The Female Perspective of Computer Science | February 11, 2010 at 04:20 PM
Luca Trevisan sent me the link for the call for FOCS 2010. Key points: The deadline is April 7. And, in a move that I approve of, there's no page limit on submissions...Michael Mitzenmacher From My Biased Coin | February 11, 2010 at 02:37 PM