From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A recent report on the quality of teacher training has stirred up a lot of discussion about how teachers should be prepared. With the ongoing shortage of qualified...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 21, 2013 at 09:33 AM
When you are a Computer Science teacher there is a universe of knowledge that you can transfer to your students, depending on the interest they show. You can teach... From Computer Science Teachers Association | June 21, 2013 at 12:43 AM
The Informs Analytics e-Newsletter. Always informative. Subscribe. Latest articles:- Continuing education for analytics professionals- Big data paying off for...Franz Dill From The Eponymous Pickle | June 21, 2013 at 12:15 AM
Is a key to polynomial versus exponential complexity lurking here? Cropped from Abel Prize source Mikhail Gromov is a French-Russian mathematician who has made...Pip From Gödel's Lost Letter and P=NP | June 20, 2013 at 09:21 PM
Thinking about real time processing. Getting more important every day. We addressed this for complex high speed manufacturing lines. Linking advanced analytics...Franz Dill From The Eponymous Pickle | June 20, 2013 at 09:17 PM
In IEEE Spectrum: An energy savings idea, but one that does increase the complexity of the smart home. Visited Corning some years ago and enjoyed their approaches...Franz Dill From The Eponymous Pickle | June 20, 2013 at 08:54 PM
This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...schneier From Schneier on Security | June 20, 2013 at 07:42 PM
An economist friend asked me if there were still productivity gains to be had for office workers (like us). After all, we have email, social networks, skype and...Lance Fortnow From Computational Complexity | June 20, 2013 at 06:10 PM
A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity."
A similar sentiment is expressed in this video.schneier From Schneier on Security | June 20, 2013 at 05:19 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A recent interview in the New York Times with Laszlo Bock, senior vice president of people operations at Google had some interesting things to say about the value...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 20, 2013 at 03:03 PM
A long time interest of mine is covered in the current Knowledge @ Wharton, why and when do people balk in a queue? What are the dynamics involved and how can...Franz Dill From The Eponymous Pickle | June 20, 2013 at 02:38 PM
In Ad Age: Insightful, thinking now how about the interaction of privacy and big data. Are the algorithms involved also privacy sensitive?  " ... In addition...Franz Dill From The Eponymous Pickle | June 20, 2013 at 02:28 PM
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...schneier From Schneier on Security | June 20, 2013 at 11:04 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week there was an announcement of a multi-year $5.2 million grant from the NSF to fund creation of a new Advanced Placement Computer Science course calledCS...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 19, 2013 at 10:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Mark Guzdial is one of the people I most respect in the area of computer science education so when he says something is good or bad I tend to take it very seriously...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 19, 2013 at 10:29 PM
Trust is a Choice – Prolegomena of Anthropology of Trust(s) by Stephanie A. Krawinkler 189 pages, 2013 Carl-Auer Verlag (Publisher) [Amazon link] [Extract] Trust...Experientia From Putting People First | June 19, 2013 at 10:27 PM
We invite you to take a few minutes to complete a brief survey by the Computing Research Association (CRA). Your feedback is important to us and helps improve our...Shar Steed From The Computing Community Consortium Blog | June 19, 2013 at 07:50 PM
I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on:
In a request today...schneier From Schneier on Security | June 19, 2013 at 07:18 PM
On Friday the Presidential Commission on Election Administration, established earlier this year by Executive Order, will hold its first public meeting in Washington...David B. From U.S. Public Policy Committee of the ACM | June 19, 2013 at 05:58 PM
Short piece on the use of innovation and digital marketing to improve CPG sales. " ... A new report by the GMA and PwC found that despite lagging sales in 2012...Franz Dill From The Eponymous Pickle | June 19, 2013 at 05:24 PM