From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Scoping the fate of the PC. They seem to be morphing into the tablet. What aspects of devices are true requirements?Franz Dill From The Eponymous Pickle | January 15, 2014 at 10:10 AM
Designing Customer-Centric Branchless Banking Offerings Claudia McKay, Yanina Seltzer The Consultative Group to Assist the Poor (CGAP) 20 December 2013 pdf, iBook...Experientia From Putting People First | January 15, 2014 at 09:42 AM
From Ashkan Soltani's blog post:
The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...schneier From Schneier on Security | January 15, 2014 at 07:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are you an active member of the Computer Science Teachers Association and looking to get more involved? The CSTA Board is a working board that develops policy for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 15, 2014 at 05:42 AM
Are you an educator or adminstrator with skills and drive? Have you considered putting those skills and drive to work for your CSTA? There are six vacancies... From Computer Science Teachers Association | January 14, 2014 at 07:26 PM
In the Future of the CIO: Future From a Mechanical to Sociological System. Is this a digital shift? An academic view.Franz Dill From The Eponymous Pickle | January 14, 2014 at 07:17 PM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
HEADWATER
(TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...schneier From Schneier on Security | January 14, 2014 at 03:10 PM
I taught a 3-week summer course to High School Students called
Computer Science: A Hands Off Approach
which did some theory. One thing I did was the following...GASARCH From Computational Complexity | January 14, 2014 at 10:50 AM
My brother pointed me to this article on a great exchange of tweets about the origins of Netscape. The two highlights, for me at least. First, Andreessen expressed...Michael Mitzenmacher From My Biased Coin | January 14, 2014 at 09:27 AM
A relatively non technical article in the WSJ on the state of Quantum computing, An interview about what it is, what it might be good for, and where it may be going...Franz Dill From The Eponymous Pickle | January 14, 2014 at 08:44 AM
Recent events have made this more difficult, but the solutions and behavior needed are still there. What is the particular nature of the Smartphone that makesConvincing...Franz Dill From The Eponymous Pickle | January 14, 2014 at 08:27 AM
Gartner says it will grow 30 time to 26 billion by 2020. My guess that it will grow even larger, as more devices, some that we were not expecting, come online...Franz Dill From The Eponymous Pickle | January 14, 2014 at 08:26 AM
It's something that we're hearing a lot, both from NSA Director General Keith Alexander and others: the NSA's mass surveillance programs could have stopped 9/11...schneier From Schneier on Security | January 14, 2014 at 08:15 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
There was an interesting bit of chatting going on over Twitter about the importance of teachers as role models over the weekend. A lot of people think that having...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 14, 2014 at 05:35 AM
In Innovation Excellence: A kind of designer vs analytics argument that is interesting. We dealt with this when we added a design function. But like in this...Franz Dill From The Eponymous Pickle | January 13, 2014 at 04:37 PM
I'm currently teaching a third year course on programming paradigms. For functional programming we look at Scheme, and for logic programming, Prolog. I took this...Gail Carmichael From The Female Perspective of Computer Science | January 13, 2014 at 03:46 PM
One of the top secret NSA documents published by Der Spiegel is a 50-page catalog of "implants" from the NSA's Tailored Access Group. Because the individual implants...schneier From Schneier on Security | January 13, 2014 at 03:45 PM
The Hour of Code was a great success and you may have had more interest than ever before in computer science, but what do you do with all that momentum? How do... From Computer Science Teachers Association | January 13, 2014 at 12:44 PM
Back when I was giving talks at our innovation centers, the most frequently mentioned media was the move 'Minority Report'. Then just out and portraying an advertising...Franz Dill From The Eponymous Pickle | January 13, 2014 at 12:36 PM
Good overview of the topic. Examples like 'word clouds' are typical. And semantic nets that we used to represent the interaction between terms. Concept maps...Franz Dill From The Eponymous Pickle | January 13, 2014 at 09:56 AM