From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Project Euler is a simple and surprisingly good educational tool for a blend of computer science and math. Highly recommended. You are given a problem (good examples...Greg Linden From Geeking with Greg | June 4, 2014 at 10:31 AM
In the CACM: On animation, rately used, but can be powerful for making points with process and data. Or for producing a story board of human behavior (abstract)...Franz Dill From The Eponymous Pickle | June 4, 2014 at 10:25 AM
In the HBR: Fundamental question, with an interesting discussion. " ... Does Internet Technology Threaten Brand Loyalty? ... Does the ability of consumers to...Franz Dill From The Eponymous Pickle | June 4, 2014 at 10:20 AM
The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece...Bruce Schneier From Schneier on Security | June 4, 2014 at 07:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
My students are wrapping up the year with final projects. For the most part these are great learning experiences. Sometimes though students get hung up on the wrong...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 4, 2014 at 06:14 AM
A long followed topic. Doing common home tasks is very difficult to do robotically. The classic 'robotic butler' task has been much talked, but rarely delivered...Franz Dill From The Eponymous Pickle | June 3, 2014 at 12:58 PM
MJ Perry describes an example where an individual has been much more efficient than the government. Here scanning documents. Many more examples like this exist...Franz Dill From The Eponymous Pickle | June 3, 2014 at 12:43 PM
Today marks the start of the Cyber Grand Challenge, organized by the Defense Advanced Research Projects Agency (DARPA). The New York Times has a lengthy article...David B. From U.S. Public Policy Committee of the ACM | June 3, 2014 at 12:00 PM
Have seen this idea tried many times. Give consumers the ability to have a mirror that shoes how cosmetics will look on their face. 'The 'magic mirror' idea.Here...Franz Dill From The Eponymous Pickle | June 3, 2014 at 11:48 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’ve had some fun with a line from the movie The Princess Bride and meme generator below inspired by working with students. Programming is so non intuitive for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 3, 2014 at 06:21 AM
Had not heard the term 'dark stores' for some time, but experimented with the concept some years ago. It also allows experimentation with the structure of the store...Franz Dill From The Eponymous Pickle | June 2, 2014 at 08:31 PM
June 4 The Privacy, Technology and the Law subcommittee of the Senate Judiciary Committee will hold a hearing on a location privacy bill. 2:30 p.m., 226 Dirksen...David B. From U.S. Public Policy Committee of the ACM | June 2, 2014 at 05:13 PM
The Directorate for Education and Human Resources (EHR) along with the Directorate for Computer and Information Science and Engineering (CISE) at the National Science...Helen Vasaly From The Computing Community Consortium Blog | June 2, 2014 at 11:16 AM
Augmenting walls to create enabled office spaces is something we experimented with. Had innovation sessions with office furniture makers. Fastcompany relates ...Franz Dill From The Eponymous Pickle | June 2, 2014 at 11:02 AM
Nathan Gilliatt connected and mentioned he runs a blog on social media analysis that I had missed. " ... The Business of Monitoring, Measuring and Understanding...Franz Dill From The Eponymous Pickle | June 2, 2014 at 10:34 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I used to tell people that I liked to blog because I knew that classroom teachers didn’t have a lot of time to look for things. As the school year comes to a close...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 2, 2014 at 09:33 AM
In Knowledge@Wharton. Video podcast and transcript.As social media grows more popular, it’s increasingly becoming a way for industries, companies and brands to...Franz Dill From The Eponymous Pickle | June 2, 2014 at 09:11 AM
Chinese hacking of American computer networks is old news. For years we've known about their attacks against U.S. government and corporate targets. We've seen detailed...Bruce Schneier From Schneier on Security | June 2, 2014 at 07:37 AM
Vincent Granville in Data Science Central: Data Science Has Been Using Rebel Statistics for a Long Time. Makes some fascinating comparisons between data science...Franz Dill From The Eponymous Pickle | June 2, 2014 at 12:59 AM
The law of small numbers is that there are not enough small numbers for all of the tasks that are assigned to them. That makes some math cranks find patterns which...GASARCH From Computational Complexity | June 1, 2014 at 09:22 PM