From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'd like to share with you some of the opportunities and barriers we encountered while implementing a dual credit CS course in high schools across New Mexico.... From Computer Science Teachers Association | February 4, 2014 at 12:07 PM
In Innovation Excellence: Why Innovation programs fail. Good elements to consider. " ... Program managers who don’t establish clear goals, identify key stakeholders...Franz Dill From The Eponymous Pickle | February 4, 2014 at 11:14 AM
This year the Computing Community Consortium (CCC) is sponsoring a Blue Sky Ideas Track at AAMAS, the Thirteenth International Conference on Autonomous Agents and...Kenneth Hines From The Computing Community Consortium Blog | February 4, 2014 at 09:14 AM
I think this is a great hack:
A man bought a first-class ticket and used it to have free meals and drinks at the airport's VIP lounge almost every day for nearly...schneier From Schneier on Security | February 4, 2014 at 07:45 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Microsoft ran their first ever Super Bowl commercial over the weekend. While it is obviously a advertisement for Microsoft and Microsoft products I see it as an...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 4, 2014 at 06:26 AM
Also brought to my attention in the area of employee engagement, training and compliance: iTacit." ... iTacit is a next-generation technology company that builds...Franz Dill From The Eponymous Pickle | February 4, 2014 at 12:40 AM
A new look at the process of conversion. Good thoughts. " ... As Peter Drucker elegantly said, “the purpose of a business is to create and keep a customer”. ....Franz Dill From The Eponymous Pickle | February 4, 2014 at 12:18 AM
Should you ever compress your data to reduce memory usage? We are in 2050. Nobody uses tapes or disks anymore. The NSA has 1 billion servers. It needs so many to...Daniel Lemire From Daniel Lemire's Blog | February 3, 2014 at 10:57 PM
A systems developer kit for the Chromecast. Had cause to look at devices like the Google Chromecast recently for potential retail display applications. This...Franz Dill From The Eponymous Pickle | February 3, 2014 at 08:30 PM
A project to which I am connected started last week. Will continue to provide updates in this space as I can.Adam Russell: IARPA Explores Methods to Build Human...Franz Dill From The Eponymous Pickle | February 3, 2014 at 05:53 PM
In May of 2013, we reported that the National Science Foundation (NSF) and the National Institute of Information and Communications Technology (NICT) of Japan signed...Ann Drobnis From The Computing Community Consortium Blog | February 3, 2014 at 03:44 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
JUNIORMINT
(TS//SI//REL) JUNIORMINT is a digital core packaged in both a mini...schneier From Schneier on Security | February 3, 2014 at 03:09 PM
The National Science Foundation (NSF) Directorate for Computer and Information Science and Engineering (CISE) is pleased to announce a Distinguished Lecture on...Ann Drobnis From The Computing Community Consortium Blog | February 3, 2014 at 02:13 PM
In Data Science Central, a post by Peter Higdon about a number of resources for the beginning data scientist. Courses, videos, definitions, etc. Usefully done...Franz Dill From The Eponymous Pickle | February 3, 2014 at 01:43 PM
February 4 Hearing: The Senate Judiciary Committee will hold a hearing on data breaches and cybercrime. 10:15 a.m., 226 Dirksen Building February 5 The Commerce...David B. From U.S. Public Policy Committee of the ACM | February 3, 2014 at 01:03 PM
On evaluating product pricing, a long time analytics methodology for retail and CPG. How can pricing be disruptive and what are the long term and short term...Franz Dill From The Eponymous Pickle | February 3, 2014 at 11:16 AM
How far can trivial ideas go? Klaus Roth is famous for many results, but two stand out above all others. One sets limits on Diophantine approximations to algebraic...rjlipton From Gödel's Lost Letter and P=NP | February 3, 2014 at 09:50 AM
Dana Richards emailed us about a place to write how Martin Gardner influenced you. You can leave such comments here. I left a comment there, but I expand it for...GASARCH From Computational Complexity | February 3, 2014 at 08:02 AM
The most recent story from the Snowden documents is from Canada: it claims the CSEC (Communications Security Establishment Canada) used airport Wi-Fi information...schneier From Schneier on Security | February 3, 2014 at 06:09 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Starting the second week of a new semester today. Last week was interesting. It was a major adjustment because with a new group of students I had to reset my expectations...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 3, 2014 at 05:59 AM