From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There are about 1800 students at Henry M. Gunn HS (Palo Alto, CA). Enrollment in CS has grown from 90 students three years ago to 110 to 130 last year to 190 this... From Computer Science Teachers Association | March 8, 2012 at 06:00 PM
This was an area we explored at length. During a visit to China in 2003 I saw a remarkable number of examples in retail spaces. Now QR codes and smartphones...Franz Dill From The Eponymous Pickle | March 8, 2012 at 05:50 PM
Via Mark Montgomery of KYield. ... Supercomputing and big data appliances. Venerable Cray take a plunge into the thirst for big data understanding and analytics...Franz Dill From The Eponymous Pickle | March 8, 2012 at 04:05 PM
In another move forward for AI-style interactions, IBM is working with Citicorp:" ... IBM and Citigroup recently announced plans to explore how America's favorite...Franz Dill From The Eponymous Pickle | March 8, 2012 at 03:44 PM
The Open Rights Conference is coming up in London on March 24 and has a glittering array of speakers including Lawrence Lessig and Cory Doctorow. Read all about...Simon Phipps From Wild WebMink | March 8, 2012 at 03:10 PM
The National Socio-Environmental Synthesis Center (SESYNC) — the newest of the national synthesis centers funded by the National Science Foundation (NSF) focused...Erwin Gianchandani From The Computing Community Consortium Blog | March 8, 2012 at 02:24 PM
This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...schneier From Schneier on Security | March 8, 2012 at 12:50 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
CSTA's Annual CS&IT Conference This is the big and best professional development event of the year for middle and high school computer science educators. The program...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 8, 2012 at 12:00 PM
Just watch the presentation, which stole the show at Strata 2012. The written word cannot do justice to Avinash’s passion and his extraordinary ability to communicate...Daniel Tunkelang From The Noisy Channel | March 8, 2012 at 07:23 AM
The NSA has released its specification for a secure Android.
One of the interesting things it's requiring is that all data be tunneled through a secure VPN:
Inter...schneier From Schneier on Security | March 7, 2012 at 07:35 PM
From DemandTec. This was precisely the approach we emphasized for many years within the enterprise. It is all about how the shopper behaves in their increasingly...Franz Dill From The Eponymous Pickle | March 7, 2012 at 05:59 PM
A new term? The term perhaps, but we have been doing this new thing for years. It deserves attention, now being lionized as the next big thing in predictive...Franz Dill From The Eponymous Pickle | March 7, 2012 at 04:42 PM
A good interview by Todd Henry with Peter Bregman. On focus and priorities. " ... In this interview, Peter describes how he came to his 18 minute methodology,...Franz Dill From The Eponymous Pickle | March 7, 2012 at 04:14 PM
Is 1+4 a harder calculation than 4+1?
It may be if you are 2+3 years old.
I asked my 7-2 year old great niece Noelle the
following sequence of questions. I include...GASARCH From Computational Complexity | March 7, 2012 at 03:52 PM
iRobot, the company that first brought practical robotics into the home, is reorganizing. Based on what they have done well, this makes sense. " ... iRobot...Franz Dill From The Eponymous Pickle | March 7, 2012 at 03:42 PM
At a press briefing featuring high-ranking Federal, state, and local officials on its Gaithersburg, MD, campus last month,Erwin Gianchandani From The Computing Community Consortium Blog | March 7, 2012 at 12:52 PM
Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...schneier From Schneier on Security | March 7, 2012 at 12:14 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I mentioned Rob Miles new Using Kinect for Windows with XNA curriculum in MondayAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 7, 2012 at 11:27 AM
Integers values are typically stored using 32 bits. Yet if you are given an array of integers between 0 and 131 072, you could store these numbers using as little...Daniel Lemire From Daniel Lemire's Blog | March 7, 2012 at 03:25 AM
Twitter as a Business Intelligence tool? I can see see the idea of tweets acting as a continuous interaction of interest and attention that can determine what...Franz Dill From The Eponymous Pickle | March 7, 2012 at 01:57 AM