From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Computing Community Consortium recently prepared a white paper titled, “Information Technology Research Challenges for Healthcare: From Discovery to Delivery...Erwin Gianchandani From The Computing Community Consortium Blog | June 14, 2010 at 08:04 PM
This article from the Crimson on the state of Harvard's School of Engineering and Applied Sciences from a couple of weeks ago serves as a good primer for me on...Michael Mitzenmacher From My Biased Coin | June 14, 2010 at 07:57 PM
Ad Age piece on the trends on laundry solutions around the world. An old interest of mine from research within the enterprise.Franz Dill From The Eponymous Pickle | June 14, 2010 at 06:54 PM
From the Freakonomics blog:
At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...schneier From Schneier on Security | June 14, 2010 at 06:46 PM
(I will post about CCC 2010 later in the week.)
The word Game is used in many different contexts within
math and computer science. I list out all that a group...GASARCH From Computational Complexity | June 14, 2010 at 06:11 PM
A common advice given out to young researchers is to find a niche. (See Michael’s Branding Your Research). That is certainly good advice. Instead of being another...Daniel Lemire From Daniel Lemire's Blog | June 14, 2010 at 04:48 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Is school done for the year where you are? Here in the northeast of the US there is another week or two to go. Teachers are finishing up the year, getting their...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 14, 2010 at 03:44 PM
In Junk Charts: Oil Spills Bring out the Worst. A number of examples that just muddy up the data they are trying to deliver. I get the feeling that news organizations...Franz Dill From The Eponymous Pickle | June 14, 2010 at 02:50 PM
June 15
Hearing:
The Senate Homeland Security and Governmental Affairs Committee will hold a hearing on cyberspace as a national asset, with an emphasis on legislation... From U.S. Public Policy Committee of the ACM | June 14, 2010 at 02:38 PM
Always informative value from GS1. Have worked with them for a number of years and reported on their activities here:Tomorrow (Tuesday 15th June) is GS1 MobileCom...Franz Dill From The Eponymous Pickle | June 14, 2010 at 02:15 PM
Proprietary technology is a waste of money, says Kroes The speech by Neelie Kroes last week in Brussels was very carefully constructed and avoided almost all mention...Simon Phipps From Wild WebMink | June 14, 2010 at 12:04 PM
There's a long article in Nature on the practice:
It remains unclear what the officers found anomalous about George's behaviour, and why he was detained. The TSA's...schneier From Schneier on Security | June 14, 2010 at 11:23 AM
How much should social network based strategies depend on data from the behavior of those sites? Evan Schuman writes about this in StoreFrontBacktalk. Most social...Franz Dill From The Eponymous Pickle | June 14, 2010 at 02:46 AM
In Slashdot: Another look at the disagreement between the two Harvard associated thinkers Steven Pinker and David Carr. Does the availability of the Internet hurt...Franz Dill From The Eponymous Pickle | June 13, 2010 at 06:16 PM