From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I have mentioned Clario in this space several times and have done some simple tests, they have published a new White paper on Analytics integration, short but useful...Franz Dill From The Eponymous Pickle | April 28, 2010 at 10:24 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
As promised here are a bunch more links that I hope you will find interesting and useful. The CSTA blog had a couple of recent posts of interest: Preparing...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 28, 2010 at 07:40 PM
Hiding your valuables in common household containers is an old trick.
Diversion safes look like containers designed to hide your valuables in plain sight. Common...schneier From Schneier on Security | April 28, 2010 at 06:21 PM
An upcoming conference on using game play for serious ends. In September 2010, Created by Thought Bank LLC. They are looking for sponsors.The Power of Play.......Franz Dill From The Eponymous Pickle | April 28, 2010 at 06:09 PM
What makes a good oral presentation? According to Prof. Sandhya Dwarkadas (University of Rochester) and Ana Pop (Princeton University), there are three main areas...Gail Carmichael From The Female Perspective of Computer Science | April 28, 2010 at 05:23 PM
(REMINDERS:
STOC
Early Registration closes on April 30.
CCC
Early Registration closes May 3.
EC
Early Registration closes on May 6.
)
Here is a problem whose...GASARCH From Computational Complexity | April 28, 2010 at 03:00 PM
I'm spending the morning registering for conferences. STOC early deadline is April 30, ISIT is May 1, and EC is May 6. I'm sure there are others coming up. Remember...Michael Mitzenmacher From My Biased Coin | April 28, 2010 at 01:49 PM
From Lance Spitzner:
In January of this year the National Highway Traffic Safety Administration released a report called "Analyzing the First Years Of the Ticket...schneier From Schneier on Security | April 28, 2010 at 12:39 PM
Final Network.com servers/staff gone Network.Com was the (great) domain name that Sun used for its cloud computing initiatives. Seems it’s finally been decommissioned...Simon Phipps From Wild WebMink | April 28, 2010 at 12:07 PM
Plagiarism has turned out to be a major problem this year in my Computer Science class. I have had five separate situations where I caught students handing in copied... From Computer Science Teachers Association | April 28, 2010 at 03:16 AM
I have not covered this topic for some time. We visited Beijing Hualian in 2000 to help with the early consulting for the Chinese Retailer's innovation Center.some...Franz Dill From The Eponymous Pickle | April 28, 2010 at 01:44 AM
Another piece akin to Tufte's view of Powerpoint. My view of Powerpoint has softened over the years, but using it for everything can be mind-numbing.Franz Dill From The Eponymous Pickle | April 28, 2010 at 01:27 AM
I twittered up quite a storm last week. Much of it was because of the US Imagine Cup which I was also blogging a lot about. I was also putting updates on theU...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 27, 2010 at 10:24 PM
The Computing Community Consortium (CCC) and the Computing Research Association (CRA), with anticipated funding from the National Science Foundation, are pleased...Erwin Gianchandani From The Computing Community Consortium Blog | April 27, 2010 at 08:03 PM
Tim Macer of Research reviews Revelation, an online qualitative research environment for depth interviewing, discussions and ethnographic studies.
“Online qualitative...Experientia From Putting People First | April 27, 2010 at 06:45 PM
This blog entry should serve as a model for open and transparent security self-reporting. I'm impressed.
More news reports.
schneier From Schneier on Security | April 27, 2010 at 06:26 PM