From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I didn’t go far from home for this one. Tom Indelicato and I teach together at Bishop Guertin High School. Some years ago I hired him to be the fill a need for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 17, 2013 at 05:35 AM
The House Committee on Ways and Means is accepting public statements for the record for Thursday’s hearing on President Obama’s trade policy agenda. The deadline...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 09:06 PM
Friday, July 19 House Hearing on “Mens Rea: The Need for a Meaningful Intent Requirement in Federal Criminal Law” House Judiciary Committee Friday July 19, 9 a.m...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 08:49 PM
At the FCC today, Computer Science Professor Clayton Lewis asserted a new paradigm for accessibility is emerging and that this paradigm may require changes to public...Renee Dopplick From U.S. Public Policy Committee of the ACM | July 16, 2013 at 08:41 PM
It’s impossible to convey how great this year’s Microsoft Research Faculty Summit has been: a “who’s who” of attendees from academia; heavy participation by top...Ed Lazowska From The Computing Community Consortium Blog | July 16, 2013 at 07:09 PM
Recall from my last post:
PROBLEM 1: There are n people sitting on chairs in a row. Call them p1,...,pn. They will soon have HATS put on their heads, RED or BLUE...GASARCH From Computational Complexity | July 16, 2013 at 05:56 PM
A very good overview of what is called data virtualization:" Data virtualization allows an organization to make its enterprise data easily available to business...Franz Dill From The Eponymous Pickle | July 16, 2013 at 03:16 PM
Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...schneier From Schneier on Security | July 16, 2013 at 01:35 PM
In Bain & Company: How the cloud is reshaping the business of software. Very true. Some interesting statistics embedded. In my experience just this week I...Franz Dill From The Eponymous Pickle | July 16, 2013 at 01:23 PM
Day one of the faculty summit was a great deal of fun. Primarily, I found I enjoyed catching up with people -- I saw a number of past/current collaborators, as...Michael Mitzenmacher From My Biased Coin | July 16, 2013 at 01:00 PM
The NSF has recently issued three new program solicitations: Secure and Trustworthy Cyberspace (SaTC), Computer and Network Systems (CNS): Core Programs, and Information...Shar Steed From The Computing Community Consortium Blog | July 16, 2013 at 10:47 AM
The following entry is a special contribution to this blog from Hamidreza Chitsaz, Assistant Professor at Wayne State University. This year Hamidreza and Moslem...Kenneth Hines From The Computing Community Consortium Blog | July 16, 2013 at 10:46 AM
In the HBR Blog. (This apparently now requires a free registration) Some thoughts about how to establish a long term career. At first I had a problem with the...Franz Dill From The Eponymous Pickle | July 16, 2013 at 10:32 AM
One of my (self-assigned) tasks lately has been to go through my teaching notes before I start planning my fall courses. The latest topic I dug into was teaching...Gail Carmichael From The Female Perspective of Computer Science | July 16, 2013 at 10:13 AM
In Teradata Magazine: Agility and cost savings in the cloud. " ... Increasing the bottom line is critical for companies, and the cloud can save them money. In...Franz Dill From The Eponymous Pickle | July 16, 2013 at 09:35 AM
What recruiters know about you, whether you are looking for another job or not. And new developments in these areas. Note the combination of search with knowledge...Franz Dill From The Eponymous Pickle | July 16, 2013 at 09:24 AM
In Engadget: And it can tell what you are listening through analyzing an audio fingerprint. More data and less privacy?Franz Dill From The Eponymous Pickle | July 16, 2013 at 09:10 AM
I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents.
This particular comment...schneier From Schneier on Security | July 16, 2013 at 08:11 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This is posted on day two of the annual CSTA Conference. This afternoon I am taking part in a mobile developer throw down. Three of us are writing the same program...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 16, 2013 at 06:06 AM
July 17 Hearing: The Senate Finance Committee will hold a hearing on health information technology 10 a.m., 215 Dirksen Building Subcommittees of the House Homeland...David B. From U.S. Public Policy Committee of the ACM | July 15, 2013 at 10:27 PM