From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
One of the great things about working in a top-10 computer science department is that I get to see which fields are really hot. At the University of Washington... From Computer Science Teachers Association | August 28, 2013 at 10:45 AM
A Challenge: Just because a study contains numbers or big data or statistics does not mean it is correct. So you should not completely trust any scientist for business...Franz Dill From The Eponymous Pickle | August 28, 2013 at 10:05 AM
In the HBR Blog Network: An anonymous, large network of commenters can lead to some nasty and self serving behavior. We all read customer reviews with an element...Franz Dill From The Eponymous Pickle | August 28, 2013 at 09:57 AM
Did you know that the Grace Hopper Celebration of Women in Computing has a strong online presence? From Tweeting to blogging to note taking, we've got you covered...Gail Carmichael From The Female Perspective of Computer Science | August 28, 2013 at 09:53 AM
Examining the breadth of Data Activation: The Data Management PlatformOne vendor, BlueKai, defines DMP as:" ... A DMP is a centralized data management platform...Franz Dill From The Eponymous Pickle | August 28, 2013 at 09:31 AM
I have this theory that everybody's notion of "recent history" starts not from their memories but from their birth date. Case in point: Billy Joel's We Didn't Start...Lance Fortnow From Computational Complexity | August 28, 2013 at 08:09 AM
This research project by Brandon Wiley -- the tool is called "Dust" -- looks really interesting. Here's the description of his Defcon talk:
Abstract: The greatest...schneier From Schneier on Security | August 28, 2013 at 08:07 AM
I haven't posted for a while, primarily because I started by sabbatical by going to Copenhagen for most of August. I was primarily visiting the IT University of...Michael Mitzenmacher From My Biased Coin | August 28, 2013 at 08:06 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
June Lin from Play-I sent me this infographic which I found interesting enough to share. Play-i is building educational, programmable robots for kids. Not sure...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 28, 2013 at 06:21 AM
MindShift, a service by KQED and NPR, has published a four-part series to explore the four dimensions of using tablets in educational settings, examining how teachers...Experientia From Putting People First | August 28, 2013 at 04:28 AM
In GigaOM: Not unexpected, though I was a little surprised seeing Nokia here. A good overview of that this might look like: " ... Nokia believes its can useRumors...Franz Dill From The Eponymous Pickle | August 27, 2013 at 08:44 PM
There's an article from Wednesday's Wall Street Journal that gives more details about the NSA's data collection efforts.
The system has the capacity to reach roughly...schneier From Schneier on Security | August 27, 2013 at 02:19 PM
A good description of how McDonald's is using mobile augmented reality for corporate sustainability PR and positioning in Europe using games. Via Metaio. " ... The...Franz Dill From The Eponymous Pickle | August 27, 2013 at 10:58 AM
In Fast Company: Linea Photosharing. A great idea, simple design, a sort of Facebook without all the other complexity. I also often used images to record and...Franz Dill From The Eponymous Pickle | August 27, 2013 at 09:57 AM
The Office of Science and Technology Policy is currently accepting applications for its Spring 2014 Internship Program. The application deadline is 11:59pm Friday...Ann Drobnis From The Computing Community Consortium Blog | August 27, 2013 at 09:48 AM
An article in Junk Charts talks about hating the defaults in data visualization packages. Well, you should at least consider what the defaults are and be sure...Franz Dill From The Eponymous Pickle | August 27, 2013 at 09:07 AM
Design has recently been brought to my close attention. Tim Brown writes about his book in Linkedin: " ... In my book, Change By Design, I chronicle the end of...Franz Dill From The Eponymous Pickle | August 27, 2013 at 08:42 AM
Last Sunday, David Miranda was detained while changing planes at London Heathrow Airport by British authorities for nine hours under a controversial British law...schneier From Schneier on Security | August 27, 2013 at 07:39 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’m a big fan of the NCWIT Award for Aspirations in Computing program. This program recognizes high school young women for their interest and aptitude in technology...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 27, 2013 at 06:18 AM
UX consultant Thomas Wendt argues that the arguments in favor of invisible interfaces are making a few key mistakes, namely: Many are assuming that invisibility...Experientia From Putting People First | August 27, 2013 at 05:00 AM