From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Time and time again I find that networking truly is the key to a successful career. It's amazing what kind of opportunities arise because of who you know.During...Gail Carmichael From The Female Perspective of Computer Science | February 8, 2010 at 06:09 PM
I am not opposed to the Publish or Perish mantra. I am an academic writer. I am what I publish. We all think of researchers as people wearing laboratory coats,...Daniel Lemire From Daniel Lemire's Blog | February 8, 2010 at 02:36 PM
Several reports are out about how Intel is monitoring the buzz in social networks regarding their Superbowl ads. This is hardly news, since if I had spent four...Franz Dill From The Eponymous Pickle | February 8, 2010 at 02:34 PM
February 10
Hearing:
The Senate Judiciary Committee will hold a hearing on cybercrime and identity theft.
10 a.m., 226 Dirksen Building
The House Science and... From U.S. Public Policy Committee of the ACM | February 8, 2010 at 01:13 PM
SourceForge turns off "blanket blocking"
Good to see SourceForge being responsive here and deciding to take this risk. The draconian...webmink From Wild WebMink | February 8, 2010 at 12:06 PM
Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...schneier From Schneier on Security | February 8, 2010 at 12:03 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Well did you watch the Super Bowl? I confess that I did not. IAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 8, 2010 at 10:59 AM
For the past four years, Microsoft Research (MSR) has sponsored a symposium on social computing that “brings together academic and industry researchers, developers...Experientia From Putting People First | February 8, 2010 at 10:23 AM
This blog was originally established to communicate to visitors at Procter & Gamble's Innovation Centers. I was asked during many visits that major retailers and...Franz Dill From The Eponymous Pickle | February 8, 2010 at 01:27 AM
I had thought that video had become as prevasive as it could be. Good GigaOm article on how falling prices are driving it much further. Will introduce new challenges...Franz Dill From The Eponymous Pickle | February 7, 2010 at 08:44 PM
An analysis of some recent Websense stats point to the finding that " ... 95% of User Generated Content is either malicious in nature or spam ... " . Not sureFull...Franz Dill From The Eponymous Pickle | February 7, 2010 at 08:28 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The Microsoft Corporation, NASA, the Texas Business & Education Coalition, and the State of Texas would like to invite you and your students to participate in the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 7, 2010 at 07:45 PM
Good piece on the subject, they relate some of the same problems we saw in the enterprise regarding institutionalizing knowledge ... and implementing a solution...Franz Dill From The Eponymous Pickle | February 7, 2010 at 06:51 PM
I'd like to let everyone know that the early registration deadline for SIGCSE 2010 is coming up at the end of January. While SIGCSE runs from March 11-13, there... From Computer Science Teachers Association | February 7, 2010 at 06:14 PM
Niklas Wolkert & Brad Nunnally provide their second report on Johnnyy Holland on the Interaction10 conference in Savannah, Georgia – this time focused on the second...Experientia From Putting People First | February 7, 2010 at 05:21 PM
The President released his $3.8 trillion budget on Monday setting off a flurry of activity in the Nation's Capital. The budget sets the Administration's priorities... From U.S. Public Policy Committee of the ACM | February 7, 2010 at 04:26 PM
At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...schneier From Schneier on Security | February 7, 2010 at 02:06 PM
Just letting readers know that I’ll be on vacation for the next week. If you are starved for reading materials, check out some of the blogs I read.Daniel Tunkelang From The Noisy Channel | February 6, 2010 at 10:54 PM
The Ewing Marion Kauffman Foundation is sponsoring an award for K-12, undergraduate,Ran Libeskind-Hadas From The Computing Community Consortium Blog | February 6, 2010 at 10:51 PM