From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
BW reviews the status of the work by Gordon Bell with MyLifebits. Inspired in part by Vennevar Bush's unimplemented Memex idea. We saw MyLifebits presented in its...Franz Dill From The Eponymous Pickle | September 5, 2009 at 07:42 PM
Whats Really Happening to the Venture Capital Industry?. ' ... It is indeed quite likely that the venture industry is in the process of a very substantial reduction...Franz Dill From The Eponymous Pickle | September 5, 2009 at 01:35 PM
It is already time for next one. I actually can't believe how fast the time was passing by, which is probably caused by the amount of work I had to do in the past...Tobias Svensson From Return 42; | September 5, 2009 at 10:33 AM
EU fears Oracle will kill MySQL, but is that even possible?
So many speculaitive stories out there, all full of half-correct opinions...webmink From Wild WebMink | September 4, 2009 at 07:04 PM
Jilyan Landon of Mathematica points me to a post in the Wolfram Blog. There something as mundane as an error message gives a hint to how well integrated Mathematica...Franz Dill From The Eponymous Pickle | September 4, 2009 at 03:24 PM
In early August, the U.S. Department of Education released the proposed structure of the $4.5 billion Race to the Top Fund. In short, this fund will distribute... From Computer Science Teachers Association | September 4, 2009 at 03:16 PM
Event Date: September 21, 2009
The Washington DC Chapter of the Association for Computing Machinery, with support from the New America Foundation, will hold a... From U.S. Public Policy Committee of the ACM | September 4, 2009 at 02:50 PM
There are several projects keeping me busy this year. First, the Student IMPACT alternative programming contest continues (www.cs.siena.edu/~maegan/impact). The...ACMW From ACM-W supporting, celebrating and advocating for Women in Computing | September 4, 2009 at 02:36 PM
I was pleased to have been involved in some of the early use of the Internet in the testing of remote Darpanet systems. It about to be 40 years old. CW makes some...Franz Dill From The Eponymous Pickle | September 4, 2009 at 02:05 PM
Data has natural layouts:
text is written from the first to the last word,
database tables are written one row at a time,
Google presents results one document... From Daniel Lemire's Blog | September 4, 2009 at 01:33 PM
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
Dean Debiase, formerly of TNS Media, has an interesting blog at Reboot Partners. ' ... which is a Strategic Execution and Market Expansion Advisory Group Helping...Franz Dill From The Eponymous Pickle | September 4, 2009 at 04:27 AM
In Small Business Trends. ' ... People use social media for a lot of things. Personally, I use it to be as loud as I possibly can. I know that probably sounds bad...Franz Dill From The Eponymous Pickle | September 4, 2009 at 01:44 AM
Unstructured code (BASIC), structured code and procedural programming (Pascal), object-oriented code (C++ or Java). We've all been through one or more of theseComputational... From Computer Science Teachers Association | September 4, 2009 at 01:42 AM