From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Says Alan Kay, who we met a number of times at Xerox PARC in the day. We used his Smalltalk and Logo languages for AI projects. We respected his thoughts about...Franz Dill From The Eponymous Pickle | March 28, 2013 at 03:23 AM
I just caught this article in the Insiders Group blog and thought I would comment about our demand forecasting experiences and how they can be applied to the midsize...Franz Dill From The Eponymous Pickle | March 28, 2013 at 02:51 AM
In two articles in Science – the flagship publication of the American Association for the Advancement of Science – CCC Chair Ed Lazowska is interviewed on career...Ed Lazowska From The Computing Community Consortium Blog | March 27, 2013 at 03:44 PM
Another example, in Progressive Grocer, of how Wal-Mart is active in analytical methods. " ... A new service from Plano, Texas-based sales and marketing services...Franz Dill From The Eponymous Pickle | March 27, 2013 at 03:33 PM
Stephen Few on the problems with too much analytics before you get the data right. Getting the data right. And visualizing it to make sure you understand it ....Franz Dill From The Eponymous Pickle | March 27, 2013 at 02:17 PM
Neurorelay summarizes the yearly Sands Research Super Bowl advertisement study. Well done overview of method and results. A few years ago I had a chance to statistically...Franz Dill From The Eponymous Pickle | March 27, 2013 at 01:47 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the problems with teaching students how to tell the computer how to do calculations is that they have to learn a new way of expressing formulas. For example...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 27, 2013 at 01:19 PM
I probably receive 50 emails a day, not counting spam. Give it a week, and I could easily end up with 200 unread emails in my inbox. When that happens, it feels...Daniel Lemire From Daniel Lemire's Blog | March 27, 2013 at 01:02 PM
Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...schneier From Schneier on Security | March 27, 2013 at 11:47 AM
I have been playing with Flipboard for some time. On the iPhone and Pad. A very nice, image-oriented way to organize and deliver information. A more sophisticated...Franz Dill From The Eponymous Pickle | March 27, 2013 at 02:55 AM
From the NSF: This seems to be an overreach based on current capabilities. Though you can't argue with the goal. " ... The U.S. National Science Foundation...Franz Dill From The Eponymous Pickle | March 26, 2013 at 09:14 PM
Scientific breakthroughs are no longer happening only in the field or in scientific labs. Rather, they are occurring on computers. This is due in large part to...Ann Drobnis From The Computing Community Consortium Blog | March 26, 2013 at 07:16 PM
The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...schneier From Schneier on Security | March 26, 2013 at 07:15 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Earlier this week I introduced a simple Turtle graphics program. The program itself (written in Visual Basic) was created by one of the teachers I work with. It...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 26, 2013 at 03:21 PM
I love science and tech museums, so while visiting Montreal this past weekend, I made sure to stop by the Montreal Science Centre. They have some really cool stuff...Gail Carmichael From The Female Perspective of Computer Science | March 26, 2013 at 02:36 PM
In Digiday: short pieces on the use of data by companies. It is always useful to see a number of examples of systems using data. But then all systems use data...Franz Dill From The Eponymous Pickle | March 26, 2013 at 02:29 PM
Turns out that it's pretty easy:
Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...schneier From Schneier on Security | March 26, 2013 at 02:29 PM
The great Hungarian combinatorialist Paul Erdős was born one hundred years ago today. The big celebration will happen in Budapest in July.
It's hard to say more...Lance Fortnow From Computational Complexity | March 26, 2013 at 02:19 PM
This HBR article suggests it is not. I suggest that stealth is one tool to get innovation done. It creates a startup style atmosphere that does not look to get...Franz Dill From The Eponymous Pickle | March 26, 2013 at 01:53 PM
In February, I had the pleasure of attending Mayor Michael Bloomberg's announcement of the new Software Engineering Pilot Program for New York City schools. This... From Computer Science Teachers Association | March 25, 2013 at 11:29 PM