From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
UX Australia 2013, a 4-day user experience design conference that took place in Melbourne at the end of August, has posted a lot of presentation slides and audio...Experientia From Putting People First | November 19, 2013 at 08:55 AM
Fokirtor is a Linux Trojan that exfiltrates traffic by inserting it into SSH connections. It looks very well-designed and -constructed.schneier From Schneier on Security | November 19, 2013 at 07:32 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Since this past summer I have been a member of the CSTA Board of Directors (thanks again to all of you who voted for me). It’s been an interesting and rewarding...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 19, 2013 at 06:18 AM
Reputation Economics: Why Who You Know Is Worth More Than What You Have by Joshua Klein Palgrave Macmillan Publisher November 2013, 256 pages [Amazon link] Abstract...Experientia From Putting People First | November 19, 2013 at 05:43 AM
Kevin Simler is clearly a highly informed and engaging writer. In this essay, he argues that “UX is etiquette for computers“. “A focus on appearance is just one...Experientia From Putting People First | November 19, 2013 at 05:19 AM
Artefact Group, the Seattle based design company, has posted the first installment of its Behavior Change toolkit. “We’ve curated this selection of cards to give...Experientia From Putting People First | November 19, 2013 at 04:56 AM
Richard Heinberg, author of The End of Growth, gave the keynote address at the ‘Seoul Youth Hub Conference 2013, Reshaping the Way We Live’, held in Seoul, Korea...Experientia From Putting People First | November 19, 2013 at 04:49 AM
The more our data is used to determine our needs and desires, the less chance there is for serendipity, writes Bronwen Clune. Are we willing to make this concession...Experientia From Putting People First | November 19, 2013 at 04:30 AM
Wizard Events announces that they have been around for twenty years. I have scoped out some events with them. Congratulations! Their founder Russell Brumfield...Franz Dill From The Eponymous Pickle | November 18, 2013 at 09:13 PM
Debating a standard:Whats in a 95 percent confidence?Is there something special about a 95 percent probability? Absolutely not; a recent paper referred to it as...Franz Dill From The Eponymous Pickle | November 18, 2013 at 08:36 PM
In GigaOM: Not unexpected, have been impressed by Intel's analytical work for some time. " ... Intel is using big data to improve everything from manufacturing...Franz Dill From The Eponymous Pickle | November 18, 2013 at 08:31 PM
New way to create infographics about your competitors. The well known petal diagram. " .... The Petal Diagram drives your business model canvas ... What the...Franz Dill From The Eponymous Pickle | November 18, 2013 at 08:09 PM
One of the buzzwords in education today is the flipped classroom. I was prompted to try out this model last year when I came down with a stomach bug that prevented... From Computer Science Teachers Association | November 18, 2013 at 05:51 PM
From New Scientist and ACM: An experimental method to unmask sock-puppets (usually phony paid commenters, reviewers or contributors) based on the way they write...Franz Dill From The Eponymous Pickle | November 18, 2013 at 02:16 PM
In the past year or so, I've gotten reviews back on multiple papers with the complaint that the result was too simple. My interpretation of review: sure you might...Michael Mitzenmacher From My Biased Coin | November 18, 2013 at 01:25 PM
November 19 Hearing: The House Science, Space and Technology Committee will hold a hearing on the data security of the Healthcare.gov website. 1o a.m., 2318 Rayburn...David B. From U.S. Public Policy Committee of the ACM | November 18, 2013 at 11:33 AM
Suppose that you are researching a given issue. Maybe you have a medical condition or you are looking for the best algorithm to solve your current problem. A good...Daniel Lemire From Daniel Lemire's Blog | November 18, 2013 at 10:32 AM
This video is so beyond awesome that it deserves its own blog post. I may or may not have shed a few tears watching it. Keep on kicking butt, GoldieBlox. We need...Gail Carmichael From The Female Perspective of Computer Science | November 18, 2013 at 10:23 AM
Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...schneier From Schneier on Security | November 18, 2013 at 08:35 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I made a quick trip to Tucson AZ over the weekend for the CSTA Board meeting. Beautiful part of the country and I wish I had more time to explore it. But meeting...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 18, 2013 at 06:03 AM