From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Now that I finally have a vehicle that can play files on a USB key, I've been able to listen to podcasts to make the most of my commuting time. I've been focusing...Gail Carmichael From The Female Perspective of Computer Science | January 29, 2013 at 08:47 PM
“The material world is a world of social potential. Social scientists should be better equipped to engage with materials and objects through ethnographic, critical...Experientia From Putting People First | January 29, 2013 at 08:42 PM
Starbucks is thinking of using its ground-breaking mobile card for payment in CPG retail. This extent of this is unclear but interesting. " ... Starbucks takes...Franz Dill From The Eponymous Pickle | January 29, 2013 at 07:07 PM
The slides from two of the presentations from last weeks UC Data Visualization Day have now been posted. Both very well done. If you would like my impressions...Franz Dill From The Eponymous Pickle | January 29, 2013 at 03:59 PM
A new idea to me, In a newly distruptuve era of analytics are we ready to be 'postdigital'? I think we are a distance from that, singularity or not. But an interesting...Franz Dill From The Eponymous Pickle | January 29, 2013 at 03:33 PM
Four computer scientists win, the film industry’s highest honor, an Academy Award, for their technical achievement in special effects. The researchers developed...Shar Steed From The Computing Community Consortium Blog | January 29, 2013 at 03:10 PM
I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this:
Results showed...schneier From Schneier on Security | January 29, 2013 at 12:32 PM
In Information Week, a very good article and statistics about the use of mobile devices to track health information, based on a recent PEW survey. " ... SevenSixty...Franz Dill From The Eponymous Pickle | January 29, 2013 at 12:28 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This is something we (Computer Science educators) have needed for a while – a general purpose mailing list to discuss a wider range of CS education topics. As this...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 29, 2013 at 09:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Started teaching again full-time today. I’m teaching at the same school I taught at 9.5 years ago when I went to work for Microsoft. There are a lot of changes....Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 28, 2013 at 10:35 PM
A good profile of colleague Michael Cavaretta at the Ford Motor Company We met a few years ago to see how our enterprises could colllaborate. " ... Cavaretta's...Franz Dill From The Eponymous Pickle | January 28, 2013 at 07:30 PM
This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...schneier From Schneier on Security | January 28, 2013 at 07:25 PM
A book review of Douglas van Praet's book. Unconscious Branding: How Neuroscience Can Empower (and Inspire) Marketing " ... In Unconscious Branding, Van Praet Based...Franz Dill From The Eponymous Pickle | January 28, 2013 at 06:44 PM
This year, for the first time, the prestigious Presidential Award for Excellence in Mathematics and Science Teaching (PAEMST) specifically include computer science... From Computer Science Teachers Association | January 28, 2013 at 05:58 PM
Newly described. Have spent time looking at image search interfaces and how they can be used to both direct search and gather images for analysis. They changes...Franz Dill From The Eponymous Pickle | January 28, 2013 at 01:29 PM
This is fascinating:
Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...schneier From Schneier on Security | January 28, 2013 at 12:07 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A couple of house keeping items to start. First off, did you know that you can get new blog posts by email? Yep, on the right side of the page is a little signTraining...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 28, 2013 at 09:51 AM
Brought to my attention by Mark J Perry. Description and link to a video. This addresses remote healthcare in an enclosed kiosk.. In the early days of our retail...Franz Dill From The Eponymous Pickle | January 28, 2013 at 03:58 AM
In GigaOM: Beyond the hype, as it says. Category examples and a number of links to the ways that companies are using game dyamics to solve problems, enagage with...Franz Dill From The Eponymous Pickle | January 27, 2013 at 08:47 PM