From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Network World is out with a list of the 25 “coolest” computer networking research projects: University labs, fueled with millions of dollars in funding and some...Erwin Gianchandani From The Computing Community Consortium Blog | September 20, 2012 at 05:53 PM
Do you know a digital diva, web chix, or coder girl? Encourage her to apply for the NCWIT Award for Aspirations in Computing!
It is time to start those applications... From Computer Science Teachers Association | September 20, 2012 at 04:01 PM
Consider the following game on a poset, each player takes turns picking an element x of a finite poset and removes all y ≥ x. First one to empty the poset wins....Lance Fortnow From Computational Complexity | September 20, 2012 at 01:20 PM
The National Science Foundation (NSF) last week issued a new solicitation for its Secure and Trustworthy Computing (SaTC) program: Cyberspace — a global “virtual”...Erwin Gianchandani From The Computing Community Consortium Blog | September 20, 2012 at 11:22 AM
Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...schneier From Schneier on Security | September 20, 2012 at 11:02 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Some years ago I had students write a program that involved managing a checkbook and balancing it. I was so proud of it. Later a student told be she linked the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 20, 2012 at 09:22 AM
Since the second world war, science has relied on what I call traditional peer review. In this form of peer review, researchers send their manuscript to journal...Daniel Lemire From Daniel Lemire's Blog | September 19, 2012 at 06:16 PM
Early registration for the FOCS conference in New Jersey is September 27th. There is some travel support available for students and postdocs, deadline is this Friday...Lance Fortnow From Computational Complexity | September 19, 2012 at 05:57 PM
From The New York Times‘s Bits Blog: Rick Smolan, the photographer and impresario of media projects, has tackled all sorts of big subjects over the years, from...Erwin Gianchandani From The Computing Community Consortium Blog | September 19, 2012 at 05:46 PM
An analysis of 3.4 million four-digit PINs. ("1234" is the most common: 10.7% of all PINs. The top 20 PINs are 26.8% of the total. "8068" is the least common...schneier From Schneier on Security | September 19, 2012 at 05:31 PM
I've been doing a lot of research lately for different projects I have at my school. Every time I research something for my unit plans or projects, I keep stumbling... From Computer Science Teachers Association | September 19, 2012 at 04:39 PM
About a year ago, I read Made by Hand: Searching for Meaning in a Throwaway World by Mark Frauenfelder. It is a simple book with a simple message. How to be happy...Daniel Lemire From Daniel Lemire's Blog | September 19, 2012 at 03:17 PM
Things are changing in advanced analytics. Simple statistics is not enough anymore. An example from Orbitz. Read the whole article:  "... I lead the...Franz Dill From The Eponymous Pickle | September 19, 2012 at 01:47 PM
Via NeuroRelay: A number of free online courses from Coursera on topics Neurological from Coursera. Not too much on the Neuromarketing side, but worth taking...Franz Dill From The Eponymous Pickle | September 19, 2012 at 12:14 PM
A recent Ars Technica article made the point that password crackers are getting better, and therefore passwords are getting weaker. It's not just computing speed...schneier From Schneier on Security | September 19, 2012 at 09:41 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I once had a conversation with Bill Gates. Yes, in person, face to face. And while I will not go into the whole meeting he said a couple of things that I continue...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 19, 2012 at 09:11 AM
In Forbes: Adam Hartung: Growth - Dealing with Market Shifts. Innovation Matters; It’s Why You Care More About Apple than Kraft ...Franz Dill From The Eponymous Pickle | September 19, 2012 at 03:18 AM
Nicely done overview, with good graphics, about the cloud and its business implications. " ... The next stage of cloud computing will require companies to turn...Franz Dill From The Eponymous Pickle | September 19, 2012 at 02:52 AM
Erwin Gianchandani joined the Computing Community Consortium as our inaugural Director in April 2010. Much of the success that the CCC has achieved is directly...Ed Lazowska From The Computing Community Consortium Blog | September 19, 2012 at 01:43 AM
Another example of the use of price optimization in retail. Many large retailers have tested the idea.Franz Dill From The Eponymous Pickle | September 18, 2012 at 10:58 PM