From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
We were part of the media lab for a few years and I led a number of tours through the facility. It was good to hear of the changes. Anything that could bring...Franz Dill From The Eponymous Pickle | April 27, 2011 at 01:02 AM
AT&T has started to sell what is being called a 'cell tower in a suitcase'. At a cost of between $15-45K, plus monthly fees. We examined something similar for...Franz Dill From The Eponymous Pickle | April 27, 2011 at 12:28 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
So are your graduating high school seniors bored? or perhaps you are still looking for things to do after the AP CS exam. or maybe you know college or high school...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 26, 2011 at 10:16 PM
Ravi Kannan will receive the 2011 Knuth Prize for his algorithmic work, including approximating volumes of high-dimensional convex objects, computing the Frobenius...Lance From Computational Complexity | April 26, 2011 at 07:37 PM
Many people have contributed striking logos for the Polymath wiki. It seems to me that there’s now enough suggestions to have a good conversation about which logo...Michael Nielsen From Michael Nielsen | April 26, 2011 at 07:34 PM
Today, CS Sock Monkey launched an important initiative to support and promote computer science education in K-12.
In this role, Sock Monkey will have the opportunity... From Computer Science Teachers Association | April 26, 2011 at 06:50 PM
The following is a special contribution to this blog by Deborah Estrin, Professor of Computer Science and Founding Director of the NSF-funded Center for Embedded...Erwin Gianchandani From The Computing Community Consortium Blog | April 26, 2011 at 01:32 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM
A good introduction to QR codes by Angie Schottmuller in Search Engine Watch. Pointers to basic considerations, vendors. mobile use and cases. Well done.Franz Dill From The Eponymous Pickle | April 26, 2011 at 11:48 AM
Covered broadly in the last few days. The first consumer packaged goods company to try this. This is an example of a manufacturer going around retailers alsoAlso...Franz Dill From The Eponymous Pickle | April 26, 2011 at 02:02 AM
Stan Dyck, colleague and correspondent, sends this along. The implications for modeling behavior are very great. Quoted from the WSJ below. Nathan Eaglewas mentioned...Franz Dill From The Eponymous Pickle | April 25, 2011 at 09:34 PM
I love the aspect of automatically building interactions. The first step in artificial intelligence. But caution is always important. Here is an example of building...Franz Dill From The Eponymous Pickle | April 25, 2011 at 09:10 PM
Ways to liven up twitter feed, with a number of business examples. Fairly good. Though still I think mostly playing to the weaknesses of Twitter itself.Franz Dill From The Eponymous Pickle | April 25, 2011 at 09:02 PM
There has been a lot of news about personalization and recommendations of information in the last week.Google News launched additional implicit personalizationFindory...Greg Linden From Geeking with Greg | April 25, 2011 at 06:12 PM
There has been an increased interest in educational games lately — especially those that truly give the player a deeper understanding of a topic but are still fun...Gail Carmichael From The Female Perspective of Computer Science | April 25, 2011 at 04:03 PM
We visited Nokia's innovation group back in the 90s and were very impressed. They were the big disrupters then. Yet today they have been unable to credibly respond...Franz Dill From The Eponymous Pickle | April 25, 2011 at 01:45 PM
The Interagency Multiscale Modeling and Analysis Group (IMAG) — comprising program staff from NIH, NSF, DoE, DoD, NASA, USDA, and the VA — announced earlier this...Erwin Gianchandani From The Computing Community Consortium Blog | April 25, 2011 at 12:54 PM
Clever:
Khan and his colleagues have written software that ensures clusters of a file, rather than being positioned at the whim of the disc drive controller chip...schneier From Schneier on Security | April 25, 2011 at 10:24 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Apparently some people actually do read this blog. I have talked to a couple of people recently who say they keep up with what IAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 25, 2011 at 09:48 AM