From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Social networking sites make it very difficult, if not impossible, to have undercover police officers:
"The results found that 90 per cent of female officers were...schneier From Schneier on Security | August 31, 2011 at 12:21 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A lot of people are looking into using Python in computer science education these days. Of course a lot of people are also using Visual Studio for Visual BasicPython...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 31, 2011 at 09:12 AM
The latest issue of Informs Analytics Magazine. News and topical articles on analytical methodologies from the premier business analysis and marketing science professional...Franz Dill From The Eponymous Pickle | August 31, 2011 at 01:45 AM
I blogged for the Institute for the Future for several years. They consulted with our C-suite and we were often asked to follow up. The are always saying some...Franz Dill From The Eponymous Pickle | August 30, 2011 at 07:58 PM
We met computer scientist Jaron Lanier while doing work with the Institute for the Future. In the Edge he talks about the local global flip. Quite a long rant...Franz Dill From The Eponymous Pickle | August 30, 2011 at 07:46 PM
It's actually pretty good.
Also note that the site is redesigning its privacy. As we learned from Microsoft, nothing motivates a company to improve its security...schneier From Schneier on Security | August 30, 2011 at 05:24 PM
We finally have some, even though the company isn't talking:
So just how well crafted was the e-mail that got RSA hacked? Not very, judging by what F-Secure found...schneier From Schneier on Security | August 30, 2011 at 03:52 PM
It has happened before:
In the WSJ: How a Grocer Bagged Profits
At its peak, the chain had nearly 16,000 stores. Critics charged it with competing unfairly by...Franz Dill From The Eponymous Pickle | August 30, 2011 at 03:37 PM
The NSF’s CISE Directorate has issued a call for white papers for the new US Ignite initiative: The National Science Foundation invites white papers from individuals...Erwin Gianchandani From The Computing Community Consortium Blog | August 30, 2011 at 03:15 PM
Been following the acquisition of the Kosmix search solution by Wal-Mart for some time.Now ReadWriteWeb has an article with some speculation about what it is all...Franz Dill From The Eponymous Pickle | August 30, 2011 at 01:22 PM
Nym Wars I'm not sure what offends me most about Google's idiotic approach here; the patronising parochialism that says they are the arbiters of what a "real" name...Simon Phipps From Wild WebMink | August 30, 2011 at 01:03 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Interested in programming competitions for your students but travel is not in the budget? You may want to look into the ACSL contests. This announcement came via...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 30, 2011 at 09:51 AM
Just completed a review copy of : Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade us to Buy by Martin Lindstrom. To be available September...Franz Dill From The Eponymous Pickle | August 30, 2011 at 01:22 AM
I attended the hackers convention in Las Vegas this month which was officially called DEFCON (DEFCON is military speak for Defense Condition) #19 (in its 19th year)... From Computer Science Teachers Association | August 29, 2011 at 11:13 PM
Some good examples from Ad-Age. " ... More consumers are turning to tablets and smartphones to shop, but this back-to-school season major retailers are using mobile...Franz Dill From The Eponymous Pickle | August 29, 2011 at 08:44 PM
An interesting press release from Junaio. Note in particular the ability to use multiple capabilities, beyond the now becoming common QR codes. As mentioned
...Franz Dill From The Eponymous Pickle | August 29, 2011 at 03:38 PM
Patrick Fischer, founder of STOC and SIGACT, passed away Friday at the age of 75. Fischer's research spanned from studying the relative power of different machine...Lance From Computational Complexity | August 29, 2011 at 02:26 PM
One of the most common data structuring in Computer Science is the hash table. It is used to store key-value pairs. For example, it is a good data structure to...Daniel Lemire From Daniel Lemire's Blog | August 29, 2011 at 02:00 PM
Mostly born based on personality tests, says an article in the Harvard Review. We showed this years ago with something as simplistic as Myers-Briggs tests.
Franz Dill From The Eponymous Pickle | August 29, 2011 at 01:34 PM