From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NIPS (machine learning) conference ran an interesting experiment this year. They had two separate and disjoint program committees with the submissions split...Lance Fortnow From Computational Complexity | December 18, 2014 at 07:44 AM
A simple word cloud service, data can be retrieved from pasted text, URLs or files. A number of useful features for quick generation. Their blog provides some...Franz Dill From The Eponymous Pickle | December 17, 2014 at 11:04 PM
Work and thoughts by SAP on IoT Innovation, in a Garden:" ... Within SAP, IoT has begun taking shape in the form of grassroots projects and pilot implementations...Franz Dill From The Eponymous Pickle | December 17, 2014 at 10:48 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I saw a tweet complaining to Wonder Workshop about them using Blockly to program their robots when (apparently) the Kickstarter proposal said the would...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 17, 2014 at 11:56 AM
The Computing Community Consortium (CCC) issued a call today for nominations for individuals to serve on the CCC Council for the next three years. The deadline...Helen Vasaly From The Computing Community Consortium Blog | December 17, 2014 at 11:26 AM
Oracle’s Java is a fast language… sometimes just as fast as C++. In Java, we commonly use polymorphism through interfaces, inheritance or wrapper classes to make...Daniel Lemire From Daniel Lemire's Blog | December 17, 2014 at 11:10 AM
In the HBR: Using the activity of the brain to understand purchasing and marketing decisions. We called this neuromarketing, but that term is never used in the...Franz Dill From The Eponymous Pickle | December 17, 2014 at 10:11 AM
In CWorld: " ... Already a major manufacturer of electronics, China is preparing to bolster its presence in robotics with the help of government support and investments...Franz Dill From The Eponymous Pickle | December 17, 2014 at 09:50 AM
The National Institutes of Health (NIH) Big Data to Knowledge (BD2K) program has announced two new funding opportunities for FY15 funding. NIH Big Data to Knowledge...Helen Vasaly From The Computing Community Consortium Blog | December 17, 2014 at 09:38 AM
Kevin Poulson has a good article up on Wired about how the FBI used a Metasploit variant to identity Tor users....Bruce Schneier From Schneier on Security | December 17, 2014 at 07:44 AM
In CWorld: New three dimensional design. Potential for IoT and Big Data applications." ... Stanford University researchers have built a multi-layered "high-rise"...Franz Dill From The Eponymous Pickle | December 17, 2014 at 12:30 AM
What to do when afraid to see if what you want is true Cropped from Canadian Bergler Society source Edmund Bergler coined the term in 1947, the great writers Francis...Pip From Gödel's Lost Letter and P=NP | December 16, 2014 at 05:35 PM
Colleague Kevin Ashton writes:Dear Franz, My new book, "How to Fly a Horse — The Secret History of Invention, Creation, and Discovery," comes out on January 20....Franz Dill From The Eponymous Pickle | December 16, 2014 at 01:25 PM
In Adage: On how to measure digital content. Which relates to the more general aspect of Data Assets. Which I have repeated here and given a talk about. It's...Franz Dill From The Eponymous Pickle | December 16, 2014 at 12:36 PM
In yet another example of what happens when you build an insecure communications infrastructure, fake cell phone towers have been found in Oslo. No one knows who...Bruce Schneier From Schneier on Security | December 16, 2014 at 12:35 PM
Good piece on the topic. by James MacLennan. There is lots of talk everywhere of course, but what do you do to fit his into a business? We spent years thinking...Franz Dill From The Eponymous Pickle | December 16, 2014 at 12:11 PM
An area we examined in laboratory conditions. One approach seen was the automated blurring of faces. In RetailWire: Discussion: " ... While privacy remains a...Franz Dill From The Eponymous Pickle | December 16, 2014 at 11:45 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A friend sent me a link to an interesting looking page that the White House set up to tell stories of the history of women in Science and Technology. It is a collection...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 16, 2014 at 06:32 AM
WASHINGTON, December 2, 2014 — Development policies based on new insights into how people actually think and make decisions will help governments and civil society...Experientia From Putting People First | December 16, 2014 at 05:34 AM
In Mashable: " ... iRobot builds a vacuum-free Roomba for students to hack ... " This is a successor to the iRobot Create, which we used to experiment with...Franz Dill From The Eponymous Pickle | December 16, 2014 at 04:34 AM