From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In IEEE Computing:Social Computing: From Social Informatics to Social Intelligenceby Fei-Yue Wang, Kathleen M. Carley, Daniel Zeng, and Wenji MaoReaders are introduced...Franz Dill From The Eponymous Pickle | February 2, 2010 at 10:25 PM
You will recall I reviewed Herb Sorensen's book: Inside the Mind of the Shopper", some time ago. Highly recommended for its insight into the scientific understanding...Franz Dill From The Eponymous Pickle | February 2, 2010 at 04:01 PM
Martin Kruskal
invented Soliton Waves which were a very important concept in
Physics.
Rebecca Kruskal (Martin's Granddaughter): Daddy, how come they are not...GASARCH From Computational Complexity | February 2, 2010 at 03:14 PM
CONTENTS
[1] Newsletter Highlights
[2] First Computer Science Education Week Finishes Strong
[3] USACM Supports Expanded FCC Technical Advice
[4] FY 2010 Budgets... From U.S. Public Policy Committee of the ACM | February 2, 2010 at 03:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I attended a workshop day at Stevens Institute of Technology where Michael Kolling, University of Kent and creator of Greenfoot was the keynote speaker...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 2, 2010 at 10:53 AM
Scott Hill of Alternet looks at how technology facilitates “the human sentient understanding of how to take cruel advantage of human weakness”.
“Indeed, humans...Experientia From Putting People First | February 2, 2010 at 09:34 AM
The New York Times reports that President Obama’s proposed budget includes substantial increases for science research, including an 8% increase for the National...Ran Libeskind-Hadas From The Computing Community Consortium Blog | February 2, 2010 at 07:27 AM
In Digital Nation: Life on the Virtual Frontier, FRONTLINE presents an in-depth exploration of what it means to be human in a 21st-century digital world.
Continuing...Experientia From Putting People First | February 2, 2010 at 07:04 AM
Preliminary stats show 55 students in my algorithms course. That's probably close to the mean and slightly above the median. It's certainly not the largest course...Michael Mitzenmacher From My Biased Coin | February 2, 2010 at 06:18 AM
Mark Montgomery posts on: Systemic Failures, by Design. See also the newletter of his company: Kyield.Franz Dill From The Eponymous Pickle | February 2, 2010 at 05:10 AM
Constantine Valhouli, principal of the Massachusetts based Hammersmith Group, which consults to developers on the marketing and branding of luxury properties, and...Experientia From Putting People First | February 1, 2010 at 10:20 PM
" ... The year in flavor will be heavily influenced by bitter, warm and earthy notes," said Kevan Vetter, executive chef at McCormick. "We see America's palates...Franz Dill From The Eponymous Pickle | February 1, 2010 at 08:54 PM
On the 4th annual Data Protection day (28th January 2010) the European Commission announced the intention to reform the 1995 European Union (EU) Data Protection...Experientia From Putting People First | February 1, 2010 at 04:52 PM
If you are a grad student and want to goto STOC 2010
there is travel support money that you can apply for.
See
here
for details.
What is the best way to get...GASARCH From Computational Complexity | February 1, 2010 at 04:43 PM
Stowe Boyd arguest that the metaphors of computing user experience are holding us back from new ways of structuring our interaction through computers. “the thing...Experientia From Putting People First | February 1, 2010 at 04:34 PM
Have been members of GS1 for many years, download their excellent 34-page paper on Mobile retail below, they write:" .... We're pleased to announce the publication...Franz Dill From The Eponymous Pickle | February 1, 2010 at 04:02 PM
There will be various events all week in connection with the rollout of the President's Fiscal Year 2011 Budget Request. Check with agency websites for additional... From U.S. Public Policy Committee of the ACM | February 1, 2010 at 02:55 PM
The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made...schneier From Schneier on Security | February 1, 2010 at 12:34 PM
Ross Anderson reports:
Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified...schneier From Schneier on Security | February 1, 2010 at 12:26 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
All sorts of good things last week. Tops among them was a visit to Stevens Institute of Technology for a workshop with a great group of high school computer...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 1, 2010 at 11:09 AM