From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Cloud computing is not just disruptive to the software market; it’s also disruptive to software freedom advocacy. Software freedom has been defined as being present...Simon Phipps From Wild WebMink | May 17, 2011 at 05:00 PM
From the Harvard Blogs: Design Lessons from the Bottom of the Consumer Pyramid. " ... At the BOP, affordability is necessary but not sufficient. Tastes and aspirations...Franz Dill From The Eponymous Pickle | May 17, 2011 at 03:14 PM
ShoutOMatic. A kind of audio twitter. " ... Think of each shout as an audible status update. In between some of your regular 'text' tweets and status updates...Franz Dill From The Eponymous Pickle | May 17, 2011 at 03:04 PM
A number of solutions to the problem, imperfect, but useful. The methods I have tried in the past have not worked well.Franz Dill From The Eponymous Pickle | May 17, 2011 at 02:59 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Scanning fingerprints from six feet away.
Slightly smaller than a square tissue box, AIRprint houses two 1.3 megapixel cameras and a source of polarized light....schneier From Schneier on Security | May 17, 2011 at 12:46 PM
Getting slowly back into blogging, some happenings from the day.I've gotten a couple of nice notes from students saying they learned a lot from my class this semester...Michael Mitzenmacher From My Biased Coin | May 17, 2011 at 02:38 AM
Some experiments are showing that sharing information makes a knowledge pool less diverse and leads to worse results. In a test we saw something similar, but we...Franz Dill From The Eponymous Pickle | May 16, 2011 at 11:54 PM
At a glance, office software like Word, PowerPoint or Excel, are great time savers. Nobody would want to go back to the era before Word Processors? Unfortunately...Daniel Lemire From Daniel Lemire's Blog | May 16, 2011 at 06:38 PM
The flowers are blooming (finally) here in Massachusetts so spring has indeed arrived, which means, summer is not too far away. Some of us think, can it get here... From Computer Science Teachers Association | May 16, 2011 at 05:01 PM
May 19 Meeting: The President’s Council of Advisors on Science and Technology will meet. The meeting will be webcast. 9 a.m., Marriott Metro Center, 775 12th Street...David B. From U.S. Public Policy Committee of the ACM | May 16, 2011 at 04:05 PM
I am doing some research in the area of 'gamification' and the use of games to solve serious work processes. That and some emerging project work has led me toReality...Franz Dill From The Eponymous Pickle | May 16, 2011 at 03:45 PM
Jeff Naughton, a top database researcher from the University of Wisconsin – Madison, has made available a superb keynote that he gave at the 26th IEEE International...Ed Lazowska From The Computing Community Consortium Blog | May 16, 2011 at 03:33 PM
Cambridge Press (and others) offers PRINT-ON-DEMAND for some books.
This is a guest post by Lauren Cowles from Cambridge Books about this,
and then my commentsWhats...GASARCH From Computational Complexity | May 16, 2011 at 03:24 PM
It is not as easy as it once once. Yet is still exists. Good thoughts and software that can help. And in one sense isn't all of the Web and hyperlinks a form...Franz Dill From The Eponymous Pickle | May 16, 2011 at 01:32 PM
In the Washington Monthly, a good article on visualization guru Edward Tufte. " ... Edward Tufte occupies a revered and solitary place in the world of graphic...Franz Dill From The Eponymous Pickle | May 16, 2011 at 12:58 PM
This FBI surveillance device, designed to be attached to a car, has been taken apart and analyzed.
A recent ruling by the 9th U.S. Circuit Court of Appeals affirms...schneier From Schneier on Security | May 16, 2011 at 11:31 AM