From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Google is apparently going to add 'store views' to its valuable 'street views', attached by location to its maps. More here. I am assuming with permission, but...Franz Dill From The Eponymous Pickle | February 4, 2010 at 08:15 PM
Five months ago, Peter Lee took a leave of absence as Head of the Computer Science Department at Carnegie Mellon University to begin a stint at DARPA as the Director...Ed Lazowska From The Computing Community Consortium Blog | February 4, 2010 at 07:42 PM
Another development that brings the smartphone closer to everyday use as a sensor by the consumer. I recently reviewed the updates to the Redlaser scanner and found...Franz Dill From The Eponymous Pickle | February 4, 2010 at 06:57 PM
I've been spending time on both graduate admissions and undergraduate admissions.For graduate admissions, we've moved to an all-electronic system; the applications...Michael Mitzenmacher From My Biased Coin | February 4, 2010 at 03:11 PM
There have been some articles on how much things have changed
because of technology.
One from the Washington Post Magazine, titled
Going, Going, ..., Gone
lists...GASARCH From Computational Complexity | February 4, 2010 at 03:00 PM
Security is rarely static. Technology changes both security systems and attackers. But thereschneier From Schneier on Security | February 4, 2010 at 12:35 PM
One of the things that came up from the panel I was on last week (that panel has prompted a bunch of blog and Twitter posts already) was that students like relevant...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 4, 2010 at 11:48 AM
Note: this post will also appear on BLOG@CACM.
It is my pleasure to report on the 3rd Annual Workshop on Search in Social Media (SSM 2010), a gathering of information...Daniel Tunkelang From The Noisy Channel | February 4, 2010 at 08:25 AM
Good Wired article on a number of ad biometrics studies being done during the Superbowl, which has increasingly become a laboratory for non conscious neuromarketing...Franz Dill From The Eponymous Pickle | February 4, 2010 at 05:34 AM
Game Day is an an annual event at Carleton University. It's a day full of lectures on various game industry topics, a LAN party, and one of many Global Game Jam...Gail Carmichael From The Female Perspective of Computer Science | February 3, 2010 at 10:59 PM
Evan Schuman put out a good post on channels and the effect of context. Worth a full read. My thoughts on this: The original idea of the innovation centers was...Franz Dill From The Eponymous Pickle | February 3, 2010 at 08:32 PM
Animations and creation of games really does motivate students. Doesn't every student assume they can take an introductory computer science course and get a job... From Computer Science Teachers Association | February 3, 2010 at 06:08 PM
Alison Bolen in SAScom Voices posts about Nine Optimization Lessons from Target. " ... how Target uses guest intelligence to optimize marketing and merchandising...Franz Dill From The Eponymous Pickle | February 3, 2010 at 05:54 PM
This is a real conversation between BILL and STUDENT (a Software Engineering Masters Student
who knows some theory). As such there are likely BETTER arguments BILL...GASARCH From Computational Complexity | February 3, 2010 at 04:19 PM
If you read my blog, you probably like to read in general. Thus, if you don’t own an ebook device, you will soon. The choice is growing: the Amazon Kindle, the...Daniel Lemire From Daniel Lemire's Blog | February 3, 2010 at 03:36 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Have you ever been asked a question that you have been asked time and again but suddenly decided you have a different answer for? One of the questions I hear aDon...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 3, 2010 at 10:44 AM
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...schneier From Schneier on Security | February 3, 2010 at 10:07 AM
I have been closely following scanner smartphone Apps that read barcodes by utilizing the phones's camera. In particular the Redlaser App has gone through a number...Franz Dill From The Eponymous Pickle | February 3, 2010 at 05:14 AM
I’m delighted to report that I’ll be blogging about the Search and Social Media Workshop (SSM 2010) and the Web Search and Data Mining Conference (WSDM 2010) for...Daniel Tunkelang From The Noisy Channel | February 3, 2010 at 05:07 AM