From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
For those of you not following the Apple-Samsung case going on right now, it's fascinating. Since I do expert witness work, it's interesting to me from that perspective...Michael Mitzenmacher From My Biased Coin | August 16, 2012 at 03:22 PM
Cheap printable chips have always been mentioned as solutions for making RFID ubiquitous. Now a cheap chips example for the 'wave and pay' revolution, that isIn...Franz Dill From The Eponymous Pickle | August 16, 2012 at 03:17 PM
In early 2009, the Computing Community Consortium (CCC), with the support of the National Science Foundation (NSF), launched the Computing Innovation Fellows Project...Erwin Gianchandani From The Computing Community Consortium Blog | August 16, 2012 at 12:43 PM
This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....schneier From Schneier on Security | August 16, 2012 at 11:49 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
We don’t teach students how to read code. Actually we don’t event teach them that they should read code for the most part. The closest we get is sample code inprettyprint...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 16, 2012 at 09:11 AM
I worked on several large scale expert systems applications during the AI drive of the 1990s. One of the areas we specifically examined was the configuration of...Franz Dill From The Eponymous Pickle | August 16, 2012 at 04:21 AM
In CWorld: Continued progress in retail payment networks. " ... More that a dozen retailers including Best Buy, Walmart, Target and 7-Eleven have joined forces...Franz Dill From The Eponymous Pickle | August 15, 2012 at 11:22 PM
University of Southern California computer scientist and neuroscientist Maja Matarić is the subject of an interview appearing in today’s Nature. On the eve of the...Erwin Gianchandani From The Computing Community Consortium Blog | August 15, 2012 at 10:30 PM
Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.schneier From Schneier on Security | August 15, 2012 at 07:23 PM
In recent months the federal government has expressed increasing concern about our cybersecurity, that is, with our ability to protect the complex computing and... From Computer Science Teachers Association | August 15, 2012 at 06:03 PM
For the last year, I’ve been trying to get my head around different aspects of human trafficking and the commercial sexual exploitation of minors. I’ve been meeting...zephoria From Apophenia | August 15, 2012 at 05:25 PM
From TDWI: Optimal pricing is a classical problem, used in retail in some form since the 1960s. Having more data can make it more accurate and useful.Franz Dill From The Eponymous Pickle | August 15, 2012 at 05:04 PM
A kind of linkage we explored as far back as the introduction of SimCity. Now Johnson & Johnson links products with The Sims. A good example of product - game...Franz Dill From The Eponymous Pickle | August 15, 2012 at 04:37 PM
Just brought to my attention. The Business Expert Press. Which publishes short, inexpensive, practical and accessible books on key business topics. In E-book...Franz Dill From The Eponymous Pickle | August 15, 2012 at 04:18 PM
This GigaOM piece made me think more broadly about how social networks can be passively recruited. It used to be that it was always better to get more about you...Franz Dill From The Eponymous Pickle | August 15, 2012 at 03:58 PM
Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...schneier From Schneier on Security | August 15, 2012 at 01:57 PM
Last month at the Computing Research Association’s (CRA) biennial Snowbird Conference, a session titled “Reflections on Teaching Massive Online Open Courses” featured...Kenneth Hines From The Computing Community Consortium Blog | August 15, 2012 at 12:04 PM
Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...schneier From Schneier on Security | August 15, 2012 at 10:59 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Capturing students' interest...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 15, 2012 at 09:19 AM
The much talked about Kahn Academy now has a Computer Science Curriculum. With code examples: " ... All of the code in the Khan Academy Computer Science platform...Franz Dill From The Eponymous Pickle | August 15, 2012 at 04:42 AM