From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Some of what has caught my attention recently:Security guru Bruce Schneier predicts "smart phones are going to become the primary platform of attack for cybercriminals"...Greg Linden From Geeking with Greg | December 28, 2011 at 06:40 AM
A flavor network. From FlowingData. The different relationships of flavor and location. An interesting example of visual relationships.Franz Dill From The Eponymous Pickle | December 28, 2011 at 04:22 AM
One of the things I enjoy most about working in algorithms is the breadth of work I get to do. And while I've worked on a variety of things, almost all have been...Michael Mitzenmacher From My Biased Coin | December 27, 2011 at 11:17 PM
During the last few weeks I have been fondly reminded of the joys I experienced when teaching and working with a student organization and encountering that rare... From Computer Science Teachers Association | December 27, 2011 at 07:29 PM
Very common examples. I have seen variants of all of these. Still, should be well known to all saavy managers. If you see anything that is similar to these...Franz Dill From The Eponymous Pickle | December 27, 2011 at 06:01 PM
From The Computing Community Consortium Blog
The New York TimesErwin Gianchandani From The Computing Community Consortium Blog | December 27, 2011 at 02:19 PM
Really interesting story of the collar-bomb robbery -- and subsequent investigation -- from 2003.schneier From Schneier on Security | December 27, 2011 at 12:22 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It may be a little early to post this but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 27, 2011 at 10:53 AM
Last night I was running some code for a queuing simulation related to some research I'm doing. This is the Nth time I've used this code; I wrote up the basic...Michael Mitzenmacher From My Biased Coin | December 27, 2011 at 04:24 AM
When should you consider the use of game methods for business? This should be carefully considered for applications alternatively in and outside the company,...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:36 AM
A Challenge to Google. A non charging means via OpenStreetMaps to deliver complex frequently updated global maps. It appears that Google is finally aiming to...Franz Dill From The Eponymous Pickle | December 27, 2011 at 02:19 AM
Another example of a teaching language. Here it is Kid's Ruby program development. A quick look makes it appear to be fairly easy to use. The more complex details...Franz Dill From The Eponymous Pickle | December 27, 2011 at 01:04 AM
Well I spent more time on the computer in general and blogging last week then I intended. I may have a problem. I managed to ignore a lot of email and didnAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 26, 2011 at 10:50 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It may be a little early but not much. At this point it would be a big surprise if some other post made it into this list. These fifteen posts were far and away...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 26, 2011 at 12:52 AM
Is it of value to Tech? From Wharton. It is always useful to think about, but may not be the key measurement for all innovations. The Kindle Fire is brought...Franz Dill From The Eponymous Pickle | December 25, 2011 at 04:37 PM
Cupcakes deemed security threat:
Rebecca Hains says she was going through security at the airport in Las Vegas when a TSA agent pulled her aside and said the cupcake...schneier From Schneier on Security | December 25, 2011 at 04:28 PM
Good WSJ piece on Heuristics. Not random hunches, but rules of thumb that work. Not always perfectly, or optimally, but are very useful to get to a real conclusion...Franz Dill From The Eponymous Pickle | December 24, 2011 at 06:48 PM
As a long time cook this is a challenge. Some alternatives. But no, not impossible. As simple as a file folder. Or as complex as an associative memory.Franz Dill From The Eponymous Pickle | December 24, 2011 at 06:39 PM