From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting, technical discussion of Wolfram Alpha's API. Dealing in particular with its openness.Franz Dill From The Eponymous Pickle | January 22, 2011 at 02:05 PM
ReadWriteWeb presents some links about blogs that discuss data. Some I had not seen yet. Franz Dill From The Eponymous Pickle | January 21, 2011 at 09:58 PM
The disconnect between intelligence and analytics? " .... Being analytics savvy is no longer an option for most businesses but a matter of survival. If a company...Franz Dill From The Eponymous Pickle | January 21, 2011 at 09:47 PM
This screen shot is from the movie "Good Time Max." 17 minutes and 52 seconds into the movie, it shows Blowfish being used as an encryption algorithm.
schneier From Schneier on Security | January 21, 2011 at 08:36 PM
Legacy procurement rules that insist on indemnity from open source subscription suppliers are an unnecessary barrier to open source adoption. Read about this on...Simon Phipps From Wild WebMink | January 21, 2011 at 07:00 PM
A new report from the OECD says the threat of cyberwar has been grossly exaggerated. (Hey, that's what I said.)
There are lots of news articles.
Also worth...schneier From Schneier on Security | January 21, 2011 at 05:59 PM
How many of you were formally taught how to research? I'm guessing that for many of you, like me, there was never a class or workshop available to show you howWho...Gail Carmichael From The Female Perspective of Computer Science | January 21, 2011 at 04:33 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Computer science education in 1972 was a lot different from what it is today. Back then most computers were huge, expensive, intimidating and kept locked away in...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 21, 2011 at 03:09 PM
Interesting research:
We looked at the standard legal documents issued by the certificate authorities or "CAs," including exemplar Subscriber Agreements (agreements...schneier From Schneier on Security | January 21, 2011 at 11:31 AM
Mashable reports that Google is about to launch a Groupon competitor. A pretty obvious direction, finally happening. More detail at link.Franz Dill From The Eponymous Pickle | January 21, 2011 at 03:02 AM
I see that the Association of Computing Machinery has created a concept they call Tech Packs. You have to be a member of ACM to get access to these. Most recently...Franz Dill From The Eponymous Pickle | January 21, 2011 at 01:25 AM
Paul Gillin posts on how B2B abd B2C Marketing differ. He also covers this in his new book: Social Marketing to the Business Customer. You can download a free...Franz Dill From The Eponymous Pickle | January 20, 2011 at 09:42 PM
Research paper from Mark Stewart and John Mueller:
The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...schneier From Schneier on Security | January 20, 2011 at 07:39 PM
In
prior
blogs
I noted that the terms
Turing Test
and
Prisoner's Dilemma
have been used in articles for non-math people.
In the age of Google people can look...GASARCH From Computational Complexity | January 20, 2011 at 04:30 PM
The federal government asks for advice about education fairly regularly. But it isn't often that it asks specifically what is needed to advance K-12 computer science... From Computer Science Teachers Association | January 20, 2011 at 04:20 PM
A teaser for a review of Sherry Turkels book: Along Together in Kurzwel AI. I anticipate reading the book. " ... Sherry Turkle, the widely noted MIT professor...Franz Dill From The Eponymous Pickle | January 20, 2011 at 03:48 PM
Essay on who will pay for content. Advertisers or the consumer? Will the emergence of new devices start a move away from the free Web content model? If the...Franz Dill From The Eponymous Pickle | January 20, 2011 at 03:36 PM
I have worked with many o the technologies mentioned here. They include a number that I would call analytical, but serve to analyze proposed innovations. These...Franz Dill From The Eponymous Pickle | January 20, 2011 at 03:04 PM
This week, the U.S. Supreme Court will hear arguments about whether or not corporations have the same rights to "personal privacy" that individuals do.
Thisbrief...schneier From Schneier on Security | January 20, 2011 at 12:44 PM