From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph:
Despite...schneier From Schneier on Security | March 30, 2011 at 12:14 PM
On a whim, I entered the Carleton Nicol Challenge and was thrilled to make it to the Top 8. I pitched my idea in front of a panel of judges (apparently in Dragon's...Gail Carmichael From The Female Perspective of Computer Science | March 30, 2011 at 09:19 AM
Short piece on the opportunity of using GPS check-ins for disaster relief and location. Nice idea I had been thinking about. But at the same time showing the ease...Franz Dill From The Eponymous Pickle | March 30, 2011 at 02:59 AM
The calendar has now reached the beginning of spring. With the arrival of the birds singing and flowers blooming also comes eighth graders and high school students... From Computer Science Teachers Association | March 30, 2011 at 01:13 AM
The National Science Board (NSB) held an Expert Panel Discussion on Data Policies at the National Science Foundation yesterday & today, exploring the opportunities...Erwin Gianchandani From The Computing Community Consortium Blog | March 29, 2011 at 09:25 PM
In a previous post I mentioned an RFID name tag being marketing by Wizard Studios that aids in interest match-making at conferences. . Here is more about that...Franz Dill From The Eponymous Pickle | March 29, 2011 at 08:39 PM
This month's IEEE Computer emphasizes Cloud Computing. A number of useful articles including some freely accessible. Franz Dill From The Eponymous Pickle | March 29, 2011 at 08:15 PM
Today I read on
Lipton's Blog
that Phillipe Flajolet passed away (1948-2011).
Flajolet worked in Analytic Combinatorics.
His book with Sedgewick on the field
(see...GASARCH From Computational Complexity | March 29, 2011 at 04:28 PM
Was just introduced to Axatra, a company that develops cloud-based solutions. See their site for more about their custom development capabilities.Franz Dill From The Eponymous Pickle | March 29, 2011 at 02:16 PM
Frans Kaashoek, a Professor of Computer Science and Engineering at the MIT Computer Science and Artificial Intelligence Laboratory (and a current member of the...Erwin Gianchandani From The Computing Community Consortium Blog | March 29, 2011 at 02:09 PM
Short HBR piece on smart energy saving in manufacturing at GM. In my own experience in manufacturing, similar things had been done for years. Yet it is good that...Franz Dill From The Eponymous Pickle | March 29, 2011 at 02:01 PM
Watch videos at home, then have limited class time for help with a teacher. A TED video. Overall not a bad idea. The social dynamics of teacher and student...Franz Dill From The Eponymous Pickle | March 29, 2011 at 01:48 PM
Amazon.com lets you play with an Android virtual machine, try apps before you buy them I’ve installed Amazon’s AppStore on my Android phone and I’m finding it much...Simon Phipps From Wild WebMink | March 29, 2011 at 01:12 PM
New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?":
There has been much academic discussion of federated authentication...schneier From Schneier on Security | March 29, 2011 at 11:43 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It seems as though teachers are always looking for new projects to use with students. Projects get stale (at least to a teacher who has been grading lots of them...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 29, 2011 at 09:53 AM
Chief Marketer dissects a recent study of smartphones for retail. The overall conclusion is they are in heavy use for information gathering. This study includes...Franz Dill From The Eponymous Pickle | March 28, 2011 at 06:54 PM
(I want to thank Bobby Kleinberg for bringing this to my attention.)
Consider the following voting scheme
Choose a random person A1.
A1 chooses a set at...GASARCH From Computational Complexity | March 28, 2011 at 06:10 PM
UPDATE: The March 29 hearing on cyber attacks has been postponed. No new date has been scheduled.
March 29
Hearing:
The Senate Commerce, Science and Transportation... From U.S. Public Policy Committee of the ACM | March 28, 2011 at 01:51 PM