From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I was reading through a couple of blog posts by Garth Flint earlier today. IAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 21, 2011 at 02:47 PM
From The Computing Community Consortium Blog
An excellent example of how novel data-driven methods can advance science and society: In February 2012, the journalErwin Gianchandani From The Computing Community Consortium Blog | December 21, 2011 at 01:59 PM
Despite a panic caused by a misleading headline, not only is Java not being removed from Ubuntu, but the Java reference implementation is actually a package in...Simon Phipps From Wild WebMink | December 21, 2011 at 12:49 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This is one of several recent Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 21, 2011 at 10:54 AM
From MIT News: Thanks to a new online toolkit developed at MIT and the Lawrence Berkeley National Laboratory, any researcher who needs to find a material with...Franz Dill From The Eponymous Pickle | December 21, 2011 at 01:56 AM
In InformationWeek: Ultimately not only to read, but to link with other sources of health expertise.Franz Dill From The Eponymous Pickle | December 21, 2011 at 01:50 AM
A considerable description of how P&G used a tournament method to address this problem:Procter & Gamble CEO Bob McDonald is a man with a plan. Last year, he and...Franz Dill From The Eponymous Pickle | December 20, 2011 at 09:36 PM
The U.S. Patent and Trademark Office (USPTO), together with the recently createdErwin Gianchandani From The Computing Community Consortium Blog | December 20, 2011 at 06:46 PM
Chris Herbert of Mi6 Agency sends along this news article about Silicon Halton near Toronto. Startups via social connections. How can social connections be best...Franz Dill From The Eponymous Pickle | December 20, 2011 at 06:12 PM
In GigaOm: A good piece on the increasing use of Paywalls on the Web. Should we be penalizing the loyalty of customers while we are exposing them to paying...Franz Dill From The Eponymous Pickle | December 20, 2011 at 06:10 PM
A business intelligence mind map that covers most of the territory typically included in BI and its implications. Informative.Franz Dill From The Eponymous Pickle | December 20, 2011 at 03:13 PM
Another step forward for big and bigger data:" On the same day that IBM passed Microsoft in market cap, Big Blue showed how it will ride the growth of big data...Franz Dill From The Eponymous Pickle | December 20, 2011 at 03:04 PM
From The Computing Community Consortium Blog
In the December 2011 Communications of the ACM, CCC Council member and MIT Professor of Electrical Engineering & Computer Science Frans Kaashoek discusses multicore...Erwin Gianchandani From The Computing Community Consortium Blog | December 20, 2011 at 01:09 PM
In 1997, I wrote about something called a chosen-protocol attack, where an attacker can use one protocol to break another. Here's an example of the same thing...schneier From Schneier on Security | December 20, 2011 at 12:24 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A number of universities around the US are piloting courses to fit the proposed Advanced Placement CS Principles course. At the University of Washington Bothell...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 20, 2011 at 10:37 AM
Just brought to my attention: 10-xelerator or "10x" is the newest New Venture Accelerator in Columbus, Ohio. 10x is a mentorship-driven investment program designed...Franz Dill From The Eponymous Pickle | December 20, 2011 at 04:36 AM
In IBM's A Smarterplanet Blog: They predict a number of expected things. One is that mind control will take over a number of computer interfaces such as cursor...Franz Dill From The Eponymous Pickle | December 20, 2011 at 03:23 AM
In GigaOM: A revision of their previous online course system. " ... Next spring, MIT will launch a pilot of MITx online-only courses geared to reach prospective...Franz Dill From The Eponymous Pickle | December 19, 2011 at 08:12 PM
The space utilization of relational databases can be estimated quickly. If you create a table made of three columns, each containing an integer, you can expect...Daniel Lemire From Daniel Lemire's Blog | December 19, 2011 at 05:24 PM