From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Newly discovered company. Note the emphasis on letting experts discover hidden patterns. That's useful, but I think it better to let experts and less-than-expert...Franz Dill From The Eponymous Pickle | April 18, 2010 at 01:21 PM
Economist article on the superabundance of data. The value and the complexity it produces. New techniques, hardware and pushing the manipulation of this data down...Franz Dill From The Eponymous Pickle | April 18, 2010 at 01:06 PM
From the CACM:Recipe for Efficiency: Principles of Power-Aware ComputingPrior work on power management reflects recurring themes that can be leveraged to make future...Franz Dill From The Eponymous Pickle | April 18, 2010 at 12:57 PM
ACTA opens up at last; password changes pointless; crowdsourcing is not open source; and more.Simon Phipps From Wild WebMink | April 18, 2010 at 12:03 PM
Scott Golder recently wrote blog post at Cloudera entitled “Scaling Social Science with Hadoop” where he accounts for “how social scientists are using large scale...zephoria From Apophenia | April 18, 2010 at 03:02 AM
This is the text for some brief remarks I made about open architecture democracy at the beginning of a panel on the subject, moderated by Tad Homer-Dixon...Michael Nielsen From Michael Nielsen | April 17, 2010 at 10:47 PM
An excellent paper by Lawrence Lessig leads to the question why we are criminalizing the next generation in protection of the past.Simon Phipps From Wild WebMink | April 17, 2010 at 10:29 PM
A recent experience brought to us by a school within our local CSTA chapter drives home some of the unusual difficulties we have in developing Computer Science... From Computer Science Teachers Association | April 17, 2010 at 10:20 PM
A recent experience brought to us by a school within our local CSTA chapter drives home some of the unusual difficulties we have in developing Computer Science... From Computer Science Teachers Association | April 17, 2010 at 10:20 PM
I am informed that Big Japan is offering a free software developer kit (SDK) for their smartphone bar code scanner. Much more here. A number of Apps includingmy...Franz Dill From The Eponymous Pickle | April 17, 2010 at 08:32 PM
At the end of the month, Barabasi's new book, entitled Bursts: The Hidden Pattern Behind Everything We Do, will be released. Here's the pre-order Amazon link,a...Michael Mitzenmacher From My Biased Coin | April 17, 2010 at 04:28 PM
The idea of having a medical testing chip in every home reminds me of a number of ideas floated for a biometric toilet, floated by a number of Japanese firms in...Franz Dill From The Eponymous Pickle | April 17, 2010 at 05:11 AM
I'm very fortunate to be attending my second CRA-W Grad Cohort next week. I also went last year when it was held near San Francisco. This year it will be near...Gail Carmichael From The Female Perspective of Computer Science | April 16, 2010 at 10:49 PM
We looked at the free social networking service Ning, created by Marc Andreesen. Now is has gone to a pay service, though users can migrate to alternative networks...Franz Dill From The Eponymous Pickle | April 16, 2010 at 10:35 PM
The Internet is as the same time one of the great distractions and great spontaneously learning environments in history. As I looked at my twitter stream I sawTEDxSeattle...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 16, 2010 at 07:12 PM
Tales of Things is a new tool that allows people to attach memories to their objects in the form of video, text or audio, thus “exploring the implications of The...Experientia From Putting People First | April 16, 2010 at 07:07 PM
CCTV cameras in Moscow have been accused of streaming prerecorded video instead of live images.
What I can't figure out is why? To me, it seems easier for the...schneier From Schneier on Security | April 16, 2010 at 05:46 PM