From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...schneier From Schneier on Security | February 15, 2013 at 06:52 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Anyone who has spent time in a classroom knows that there are some students, usually a small number, to take up most of the class participation. It’s not that they...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 15, 2013 at 05:51 PM
LibreOffice is built from a large legacy codebase that dates back over 20 years. It includes millions of lines of code, can be compiled for a wide range of platforms...Simon Phipps From Wild WebMink | February 15, 2013 at 02:30 PM
"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith.
Abstract: Modern smartphonesArticle...schneier From Schneier on Security | February 15, 2013 at 12:48 PM
Christopher Shea wrote a recent Chronicle Review article Is Scientific Truth Always Beautiful? I would argue the answer is yes, and it boils down to Occam's Razor...Lance Fortnow From Computational Complexity | February 15, 2013 at 12:46 PM
In September 2011, I posted about how much I like App Inventor as a tool to get students excited about computer science along with believing that they have the... From Computer Science Teachers Association | February 15, 2013 at 12:15 AM
Given the loud outcry regarding the STOC 2013 formatting, which gave you 10 double-column pages to work with (at the cost of, you know, having to turn your paper...Michael Mitzenmacher From My Biased Coin | February 15, 2013 at 12:04 AM
Someone recently shared this Popular Science article about an augmented reality app that 'translates' newspapers for children. The main idea is to simplify the...Gail Carmichael From The Female Perspective of Computer Science | February 14, 2013 at 09:22 PM
Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...schneier From Schneier on Security | February 14, 2013 at 05:42 PM
The Intel Collaborative Research Institute for Sustainable Connected Cities – a cooperation between University College London (UCL), Imperial College London and...Experientia From Putting People First | February 14, 2013 at 04:05 PM
Congratulations to CCC Council member Anita Jones for being named the recipient of the 2012 Philip Hauge Ableson Award. The Ableson award is the highest award conferred...Shar Steed From The Computing Community Consortium Blog | February 14, 2013 at 03:38 PM
Long article.
With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...schneier From Schneier on Security | February 14, 2013 at 12:32 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This year I am experimenting with scaffolding to help students get started with projects. For example I started one group with a project to calculate BMI (BodyDescaffolding...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 14, 2013 at 10:37 AM
For Valentine’s Day, here’s a song about real love. That’s Who Are We Fooling, by Brooke Fraser and Aqualung. Amazon UK will give you £1 to buy any track if you...Simon Phipps From Wild WebMink | February 14, 2013 at 08:00 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
There is some good news from the UK in that Computer Science is going to be part of English Baccalaureate (secondary school) program there. The Ministry of Education...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 14, 2013 at 01:59 AM
1) Sharon Goldberg and Nick Feamster asked me to announce the following:In the tradition of CAEC, NYCE, and etc, we are holding a "Day" on online censorship at...Michael Mitzenmacher From My Biased Coin | February 14, 2013 at 01:21 AM
This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...schneier From Schneier on Security | February 13, 2013 at 07:39 PM
From a specialty in Complex Analysis Rolf Nevanlinna was one of the top complex analysts of the last century, and is widely cited as the most famous Finnish mathematician...rjlipton From Gödel's Lost Letter and P=NP | February 13, 2013 at 07:28 PM
STOC and Complexity are co-located this July in beautiful Palo Alto, California. Both conferences have just announced their accepted papers: STOC (with PDF links...Lance Fortnow From Computational Complexity | February 13, 2013 at 05:42 PM
Divided Brain, Divided World; Why the best part of us struggles to be heard is an RSA report that explores the practical significance of the scientific fact that...Experientia From Putting People First | February 13, 2013 at 04:15 PM