From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Knowledge@Wharton: (In English and Chinese). " ... Chinese Supply Chains Reach an ‘Inflection Point’ – and Multinationals Recast Strategies ... " Precisely...Franz Dill From The Eponymous Pickle | July 18, 2013 at 04:37 PM
From the Santa Fe Institute: I used to be our representative to SFI in the 90s and we got quite a few inspirations from them, and we provided them with problems...Franz Dill From The Eponymous Pickle | July 18, 2013 at 04:20 PM
In SMB Resource: This article was brought to my attention recently. It struck home because I have been working with companies that are increasingly specifying...Franz Dill From The Eponymous Pickle | July 18, 2013 at 01:15 PM
The FCC will discuss the IP Speech-to-Speech Relay program and a report on the implementation of Twenty-First Century Communications and Video Accessibility Act...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 18, 2013 at 12:18 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
For the second year the annual CSTA Conference has had a mobile phone development “throwdown.” In this session each participant has 15 minutes to create a mobile...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 18, 2013 at 10:21 AM
Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...schneier From Schneier on Security | July 18, 2013 at 09:37 AM
This piece makes the point that I often do ... that all analytics, all business decisions, are predictive. The word 'predictive' includes the implication that...Franz Dill From The Eponymous Pickle | July 18, 2013 at 09:30 AM
Had not heard the term before, but it relates to how strongly an IT department can act as a gatekeeper to software, in this new era of 'Bring Your Own' tools. ...Franz Dill From The Eponymous Pickle | July 18, 2013 at 09:00 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
At the CSTA Conference earlier this week Hadi Partovi from Code.Org announced some plans for this year’s Computer Science Education Week. Specifically providing...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 18, 2013 at 06:15 AM
I have always enjoyed the Wharton series of papers and videos. I just noticed that they had a series of posts especially designed for High School Students.  ...Franz Dill From The Eponymous Pickle | July 17, 2013 at 11:22 PM
Day Two of the summit started with a keynote shared between Peter Lee and Jeannette Wing, who now seem to be sharing heading up Microsoft research. (Rick Rashid...Michael Mitzenmacher From My Biased Coin | July 17, 2013 at 05:07 PM
On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees:
From: xxxxx
Sent: Thursday, July...schneier From Schneier on Security | July 17, 2013 at 03:45 PM
The Library of Congress invites the public to participate in its first Legislative Data Challenge. The winning solution will provide the most effective representation...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 17, 2013 at 02:28 PM
The NSF has recently issued a new program solicitation – Computing and Communication Foundations (CCF): Core Programs. According to the solicitation, “The Division...Shar Steed From The Computing Community Consortium Blog | July 17, 2013 at 01:59 PM
Good article on the longstanding practice of secretly tapping undersea cables.
This is news right now because of a new Snowden document.schneier From Schneier on Security | July 17, 2013 at 01:03 PM
In Progressive Grocer: A good piece on how the CPG is using Big Data. " ... Retailers and consumer packaged goods companies that are applying big data analytics...Franz Dill From The Eponymous Pickle | July 17, 2013 at 12:28 PM
Brought to my attention for a project that will require more than the usual amount of malicious software security. A virtual sandbox called Sandboxie that prevents...Franz Dill From The Eponymous Pickle | July 17, 2013 at 12:14 PM
Last month I gave a talk to a large company that is actively looking for new ways to compete. They have long been seen as a lower cost, but less innovative service...Franz Dill From The Eponymous Pickle | July 17, 2013 at 11:57 AM
In GigaOM: A not unexpected development. 2014 seems to be the year for broad delivery. How will this influence the more personal uses of the smartphone? Will...Franz Dill From The Eponymous Pickle | July 17, 2013 at 09:59 AM
A simple but still incomplete view of the ROI of gamification. The same approach can be seen for many kinds of applications. " ... Measuring ROI is an elusive...Franz Dill From The Eponymous Pickle | July 17, 2013 at 09:53 AM