From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In CACM: Excellent overview piece on the subject. The abstract itself has interest: " ... Sentiment analysis (or opinion mining) is defined as the task of finding...Franz Dill From The Eponymous Pickle | April 13, 2013 at 11:33 AM
Thursday, April 4th, 2013
Summary by Kelley Misata
As Christopher Painter, Coordinator for Cyber Issues within the US Department of State, began his keynote address...Keith Watson From CERIAS Blog | April 13, 2013 at 09:20 AM
I signed up Meshed Insights as an OIN licensee, and was amazed when I told people how few people knew it existed. That was the origin of this week’s InfoWorld column...Simon Phipps From Wild WebMink | April 13, 2013 at 08:50 AM
Sciam writes about the differences between reading on screens vs paper, provides some interesting resources, suggesting that " ... When it comes to intensivelyBut...Franz Dill From The Eponymous Pickle | April 13, 2013 at 05:22 AM
The White House is accepting applications from software developers and hands-on technology experts to participate in a day of national service at the White House...Renee Dopplick From U.S. Public Policy Committee of the ACM | April 13, 2013 at 02:10 AM
A connection pointed me to the Mayo Clinic Center for Innovation lab. A very broad mix of capability areas. Reminding me of similar work at Procter & Gamble...Franz Dill From The Eponymous Pickle | April 12, 2013 at 11:14 PM
While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...schneier From Schneier on Security | April 12, 2013 at 09:34 PM
Thursday, April 4th, 2013
Associate Professor Stephen Elliott, Industrial Technology, Purdue University
Director, Biometric Standards, Performance and Assurance...Keith Watson From CERIAS Blog | April 12, 2013 at 09:01 PM
A Wired Article reminded me of the nonprofit organization GS1, which I worked with for years. Among many other things they establish bar code standards. The work...Franz Dill From The Eponymous Pickle | April 12, 2013 at 08:53 PM
Thursday April 4, 2013
Summary by Marquita A. Moreland
During the introduction, Professor Spafford discussed Mark Weatherford's experience prior to becoming Deputy...Keith Watson From CERIAS Blog | April 12, 2013 at 08:39 PM
Thursday, April 4th, 2013
Panel Members:
Diana Burley, Associate Professor of Human and Organizational Learning, George Washington University
Melissa Dark, Professor...Keith Watson From CERIAS Blog | April 12, 2013 at 08:17 PM
There has been a lot of discussion lately about the dearth of computer scientists in the workforce, and the corollary, the need to teach computer science to help... From Computer Science Teachers Association | April 12, 2013 at 07:02 PM
Wednesday, April 3rd, 2013
Panel Members:
Cathy Tilton, VP Standards and Technology, Daon Solutions
Elisa Bertino, Professor, Computer Science and CERIAS Fellow...Keith Watson From CERIAS Blog | April 12, 2013 at 06:25 PM
Once again there is some money from ACM and from NSF for students to goto STOC, and I am the one to send the applications to. The link for info on how to apply...GASARCH From Computational Complexity | April 12, 2013 at 06:13 PM
Wednesday, April 3rd, 2013
Panel Members:
Alok Chaturvedi, Professor, Management, Purdue University
Samuel Liles, Associate Professor, Computer and Information...Keith Watson From CERIAS Blog | April 12, 2013 at 06:04 PM
A joint report of Informatics Europe and the ACM Europe Working Group on Informatics Education was recently released. The report highlights what is currently being...Ann Drobnis From The Computing Community Consortium Blog | April 12, 2013 at 05:36 PM
Interesting survey of applications. " ... While most companies intend to invest in big data technologies, a lack of human resources and know-how keeps them from...Franz Dill From The Eponymous Pickle | April 12, 2013 at 04:44 PM
Last fall, we published a paper about augmented reality, cognitive theories, and learning. I previously wrote about the design advantages of AR; these give insight...Gail Carmichael From The Female Perspective of Computer Science | April 12, 2013 at 04:15 PM
There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...schneier From Schneier on Security | April 12, 2013 at 03:50 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
VIDYA BOOKS: the book, as reimagined by video game makers is a Kickstarter project that is being spearheaded by someone I met while I was at Microsoft. Joe Booth...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 12, 2013 at 02:38 PM