From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It’s Martin Luther King Jr Day. A regular work day for me but I know that a lot of schools have the day off. If you do I hope you are enjoying the three day weekend...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 17, 2011 at 10:18 AM
The Ethnographic Praxis in Industry Conference (EPIC) has become the premier international forum for bringing together academics, computer scientists, designers...Experientia From Putting People First | January 17, 2011 at 09:42 AM
Is open source software is better than closed-source software? Is wikipedia better than Britannica? Is NoSQL better than Oracle and SQL Server? Are blogs better...Daniel Lemire From Daniel Lemire's Blog | January 17, 2011 at 09:28 AM
One of the key control points in enterprise software is the provisioning or IDM software. It’s the point all the threads of directory, authentication, authorisation...Simon Phipps From Wild WebMink | January 17, 2011 at 08:00 AM
Now is the time for students (and teachers) to start thinking about their summer. I know the new year just began, but it's never to early to plan.
For the last... From Computer Science Teachers Association | January 17, 2011 at 03:07 AM
In CNN Money, Your Smartphone as your most dangerous posssesson. Overplayed, yes, but each of the cautions about the security of your data and devices is worth...Franz Dill From The Eponymous Pickle | January 16, 2011 at 05:04 PM
I continue to enjoy Doug Lautzenheiser's blog: Business Intelligence Software, where he provides his insightful " ... personal opinions on the Business Intelligence...Franz Dill From The Eponymous Pickle | January 16, 2011 at 03:00 PM
This is something we wrestled with a number of times. Experience did seem to show that a team should be co located to achieve the best effectiveness. Though the...Franz Dill From The Eponymous Pickle | January 16, 2011 at 02:44 PM
In Roughtype, a good piece on literary allusion and the effect of things like Google Search on communicating. We live in a world where fewer and fewer of the classics...Franz Dill From The Eponymous Pickle | January 16, 2011 at 03:59 AM
New book on a favorite topic, Cellular Automata, by Thomas M. Li The paradigm was used in the enterprise. Too expensive to assure that I will acquire this,...Franz Dill From The Eponymous Pickle | January 15, 2011 at 02:52 PM
In the CACM: A Firm Foundation for Private Data Analysis. What does it mean to preserve privacy? There is lots to do here.Franz Dill From The Eponymous Pickle | January 14, 2011 at 11:25 PM
I have been trying to convince local participants in the Let's Talk Science program that I can connect almost any of their course material to computer science. ...Gail Carmichael From The Female Perspective of Computer Science | January 14, 2011 at 10:23 PM
Another book added to the stack: Slow Down, Sell Faster!: Understand Your Customer's Buying Process and Maximize Your Sales, by Kevin Davis. We always tried...Franz Dill From The Eponymous Pickle | January 14, 2011 at 08:25 PM
Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...schneier From Schneier on Security | January 14, 2011 at 08:11 PM
I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...schneier From Schneier on Security | January 14, 2011 at 05:03 PM
IMedia Connections interviews Donna Sturgess of Buyology Inc. about what her company does to understand the non conscious interactions of consumer to media and...Franz Dill From The Eponymous Pickle | January 14, 2011 at 04:23 PM
Almost every day I receive electronic newsletters with articles discussing STEM and robotics competitions, but I rarely see a mention of Computer Science. So,ACTE... From Computer Science Teachers Association | January 14, 2011 at 02:55 PM
Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb.
A terrorist bomb is likely to be relatively small -- possibly only a fraction...schneier From Schneier on Security | January 14, 2011 at 01:07 PM