From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In ACM: Some surprising results regarding the value of imprecise arithmetic and chips that can calculate imprecisely. Good article about potential applications...Franz Dill From The Eponymous Pickle | January 5, 2011 at 05:26 AM
The split of the 83 year old company in two pieces is seen in a number of different ways. We worked with them in the early days of RFID and they provided some...Franz Dill From The Eponymous Pickle | January 5, 2011 at 05:14 AM
CONTENTS
[1] Newsletter Highlights
[2] FCC Draws Line in the Net Neutrality Sand
[3] Computer Science Education Week Extends its Reach
[4] USACM Vice Chair Felten... From U.S. Public Policy Committee of the ACM | January 4, 2011 at 06:49 PM
Why do many press releases not include links to useful information, in particular to the release itself and the companies involved? Has always mystified me. Here...Franz Dill From The Eponymous Pickle | January 4, 2011 at 03:40 PM
Between 1990 and 2010, the cost of one megabyte of disk storage went from $9 to $0.00015. Had the human population followed a similar growth, there would be 300...Daniel Lemire From Daniel Lemire's Blog | January 4, 2011 at 03:39 PM
This feels very creepy and police-state-like. What on earth could WalMart be worried about?
schneier From Schneier on Security | January 4, 2011 at 03:34 PM
In HBR, a good article that scopes out various approaches for knowledge management. How formal do these approaches have to be? Or can they just observe in the...Franz Dill From The Eponymous Pickle | January 4, 2011 at 03:30 PM
Article about this course is dated, but worth a look as to the direction of this work. I had always seen this as the most immediately useful aspect of the semantic...Franz Dill From The Eponymous Pickle | January 4, 2011 at 03:29 PM
While many of us were enjoying time off last week, our colleagues at IBM were busy unveiling their fifth annual “Five in Five” — a list of five technology innovations...Erwin Gianchandani From The Computing Community Consortium Blog | January 4, 2011 at 01:52 PM
ACTA blog by FFII Useful reference point for information about the progress of ACTA, worth bookmarking. (tags: ACTA FFII Blog) The Ultimate Patent Troll Patent:...Simon Phipps From Wild WebMink | January 4, 2011 at 01:01 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are you back at school yet? Hope you had a good holiday break. I know I did. The other day I got the Imagine Cup newsletter via email and thought that this might...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 4, 2011 at 10:57 AM
The increasing volume of data that we generate as a species is a story so overplayed as to have become trite. Indeed, a vast amount of this data is in the public...Daniel Tunkelang From The Noisy Channel | January 4, 2011 at 10:00 AM
In the Noisy Channel: About data scientists, what they hve been doing lately and their relationships to the increasing amounts of data all of us have been generating...Franz Dill From The Eponymous Pickle | January 4, 2011 at 05:09 AM
The Algorithms and Linguistics page (http://www.education.rec.ri.cmu.edu/fire/naclo/) on The FIRE Project website is a site that introduces younger students to... From Computer Science Teachers Association | January 3, 2011 at 07:45 PM
Can you imagine a programming assignment or example where "common sense and real-world knowledge are not needed"? Math teacher (and now PhD student in education)...Gail Carmichael From The Female Perspective of Computer Science | January 3, 2011 at 06:10 PM
In 2010 this blog announced the following Breakthrough!!!! results:
(Listed chronologically.)
Better Algorithms for Unique Games,
by Arora, Barak, Steurer. (We...GASARCH From Computational Complexity | January 3, 2011 at 05:12 PM
Creek Watch. A simple Smart Water effort via IBM uses a mobile phone application to gather data about stream conditions. Simple smart sensor application. It does...Franz Dill From The Eponymous Pickle | January 3, 2011 at 03:20 PM
Watch the video.
What valuable security lessons does this teach?
EDITED TO ADD (1/3): And why aren't the polar bears destroying the hidden cameras that are...schneier From Schneier on Security | January 3, 2011 at 03:07 PM