From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On Monday, November 19, at 4:00 PM EST, the National Science Foundation will hold a webinar on its Cyber-Enabled Sustainability Science and Engineering (CyberSEES)...Shar Steed From The Computing Community Consortium Blog | November 13, 2012 at 05:00 PM
Maintaining a set of integers is a common problem in programming. It can also be implemented in many different ways. Maybe the most common implementation uses a...Daniel Lemire From Daniel Lemire's Blog | November 13, 2012 at 04:18 PM
[Editor: In Part 4 of what now looks to be a 5- or 6-part series of reports from FOCS, second-year graduate student Ludwig Schmidt of MIT contributes a summaryhttp...Michael Mitzenmacher From My Biased Coin | November 13, 2012 at 04:17 PM
If I tweeted this is what I would tweet:
The problem with trying to predict who will win the election.
Prez election thought: if you run as yourself and lose (Stevenson...GASARCH From Computational Complexity | November 13, 2012 at 04:12 PM
We started to use the phrase 'wicked Problem' around the year 2000. Here is an incomplete analysis of the use of the phrase: So what is its definition? I like...Franz Dill From The Eponymous Pickle | November 13, 2012 at 04:10 PM
The people from Ethnography Matters, an ethnography group blog that is celebrating its first year anniversary today, interviewed their new regular contributor Nicolas...Experientia From Putting People First | November 13, 2012 at 03:59 PM
Pulled from store shelves after a month, the first high-profile wearable activity tracker was a humiliation for Jawbone. Now, the Up is back, and anyone vying for...Experientia From Putting People First | November 13, 2012 at 03:39 PM
I have been recently been taking a look at the broad concept of marketing mix decisions. The problem is old: how do we decide how much promotional dollars toTheir...Franz Dill From The Eponymous Pickle | November 13, 2012 at 03:36 PM
The role of UX Strategist is a relatively new one on UX design teams, and has recently addressed in two articles on UXmatters: “UX Strategy: The Heart of User-Centered...Experientia From Putting People First | November 13, 2012 at 01:25 PM
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Chris Lehmann is the principal of the Science Leadership Academy, a partnership school in Philadelphia, and a frequent speaker on educational issues. He’s a great...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 13, 2012 at 11:04 AM
Living Offline – A Qualitative Study of Internet Non-Use in Great Britain and Sweden by Bianca Christin Reisdorf (U. of Oxford, UK), Ann-Sofie Axelsson (Chalmers...Experientia From Putting People First | November 13, 2012 at 08:39 AM
Jeff Zabin via Gib Bassett on using simpler business intelligence applications. Especially for the midsize company. Yes, I agree. In fact I would take it even...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:34 AM
In GigaOm: I had always expected that plastic cards would go away once the mobile smartphone-enabled wallet took over. Here the case is made that cards will...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:19 AM
I met Joseph Kyoung-yun of Wayne State at a talk I gave last week and he was nice enough to send along some background on the work he was doing. He writes " ....Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:14 AM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
Advancing Ethnography in Corporate Environments: Challenges and Emerging Opportunities Edited by Brigitte Jordan Left Coast Press November 2012, 224 pages [Amazon...Experientia From Putting People First | November 12, 2012 at 04:55 PM
I am very grateful that I will (hopefully) be lucky enough to see my vision for my Gram's House game developed professionally with research grants. After watching...Gail Carmichael From The Female Perspective of Computer Science | November 12, 2012 at 04:19 PM
The moment I learned that CIKM 2012 would be held in Maui, I knew I had to be there. Having co-organized the CIKM 2011 industry event, I had enough karma to be...Daniel Tunkelang From The Noisy Channel | November 12, 2012 at 03:00 PM
Every year since 2007, The TED Fellows program has recognized young innovators from around the globe for their “insightful, bold ideas that have the potential to...Kenneth Hines From The Computing Community Consortium Blog | November 12, 2012 at 12:02 PM