From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Was just introduced to Axatra, a company that develops cloud-based solutions. See their site for more about their custom development capabilities.Franz Dill From The Eponymous Pickle | March 29, 2011 at 02:16 PM
Frans Kaashoek, a Professor of Computer Science and Engineering at the MIT Computer Science and Artificial Intelligence Laboratory (and a current member of the...Erwin Gianchandani From The Computing Community Consortium Blog | March 29, 2011 at 02:09 PM
Short HBR piece on smart energy saving in manufacturing at GM. In my own experience in manufacturing, similar things had been done for years. Yet it is good that...Franz Dill From The Eponymous Pickle | March 29, 2011 at 02:01 PM
Watch videos at home, then have limited class time for help with a teacher. A TED video. Overall not a bad idea. The social dynamics of teacher and student...Franz Dill From The Eponymous Pickle | March 29, 2011 at 01:48 PM
Amazon.com lets you play with an Android virtual machine, try apps before you buy them I’ve installed Amazon’s AppStore on my Android phone and I’m finding it much...Simon Phipps From Wild WebMink | March 29, 2011 at 01:12 PM
New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?":
There has been much academic discussion of federated authentication...schneier From Schneier on Security | March 29, 2011 at 11:43 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It seems as though teachers are always looking for new projects to use with students. Projects get stale (at least to a teacher who has been grading lots of them...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 29, 2011 at 09:53 AM
Chief Marketer dissects a recent study of smartphones for retail. The overall conclusion is they are in heavy use for information gathering. This study includes...Franz Dill From The Eponymous Pickle | March 28, 2011 at 06:54 PM
(I want to thank Bobby Kleinberg for bringing this to my attention.)
Consider the following voting scheme
Choose a random person A1.
A1 chooses a set at...GASARCH From Computational Complexity | March 28, 2011 at 06:10 PM
UPDATE: The March 29 hearing on cyber attacks has been postponed. No new date has been scheduled.
March 29
Hearing:
The Senate Commerce, Science and Transportation... From U.S. Public Policy Committee of the ACM | March 28, 2011 at 01:51 PM
U.S. Develops 'Panic Button' for Democracy Activists – NYTimes.com Amazing they can say all this without noting that the very same technique used by an individual...Simon Phipps From Wild WebMink | March 28, 2011 at 01:03 PM
What is agile data integration?, and how do you do it? Good overview in BeyeNetwork by Ralph Hughes that lists alternatives and describes directions.Franz Dill From The Eponymous Pickle | March 28, 2011 at 12:42 PM
A simple BBC site that allows you to graphicaly deal with relative sizes: " ... Dimensions takes important places, events and things, and overlays them onto a...Franz Dill From The Eponymous Pickle | March 28, 2011 at 12:29 PM
Found this Readwriteweb article on book shelf placement to be interesting. I have worked with libraries on catalog systems. It is not only libraries where things...Franz Dill From The Eponymous Pickle | March 28, 2011 at 05:36 AM
Talk is cheap, as the saying goes. That’s a good thing, since I am always overflowing with ideas that I have neither the time (I love my day job!) nor the money...Daniel Tunkelang From The Noisy Channel | March 28, 2011 at 01:05 AM
Events bookings have become busy lately and I realise I need to put more data online. I’ve been working on the About and Events Booking pages on the site and in...Simon Phipps From Wild WebMink | March 27, 2011 at 10:55 PM