From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Harnessing the rich detail, creativity, and individual relevance of personal narratives, Shareable.net and Latitude Research co-sponsored an innovation study to...Experientia From Putting People First | April 27, 2010 at 06:25 PM
Sometimes, I think the students are so excited about the end of classes, they don't realize that it's almost equally exciting for the faculty. While I enjoy teaching...Michael Mitzenmacher From My Biased Coin | April 27, 2010 at 03:05 PM
A fairly obvious conclusion based on just cursory observation online, In ECommerce Times: " ... B2B organizations have largely accepted online social media technologies...Franz Dill From The Eponymous Pickle | April 27, 2010 at 01:39 PM
They were afraid that they might contain pipe bombs.
This is the correct reaction:
In any case, I suspect someone somewhere just panicked at the possibility that...schneier From Schneier on Security | April 27, 2010 at 11:27 AM
Since the beginning of complexity we talked about time complexity t(n)
as a function of the input size. But it has been the inverse of this
function that we really...Lance From Computational Complexity | April 27, 2010 at 10:46 AM
For me at least the academic year is about to end; my final exam is ten days away.
And then I have to gear up full time for a June gaming institute for students... From Computer Science Teachers Association | April 27, 2010 at 02:16 AM
Lots of good things in the Boot Camp Digital Blog by Krista Neher. Including audience measurement, social media strategies, marketing your business on Facebook...Franz Dill From The Eponymous Pickle | April 26, 2010 at 10:10 PM
An Edge Special on how decision makers acted in response to the transportation crisis caused by the Icelandic ash cloud. A very good interpretation by a number...Franz Dill From The Eponymous Pickle | April 26, 2010 at 06:59 PM
This short piece questions the over-use of online training. I was involved with an analysis of face-to-face vs online methods and in-person was clearly better....Franz Dill From The Eponymous Pickle | April 26, 2010 at 06:16 PM
Nasty scam, where the user is pressured into accepting a "pre-trial settlement" for copyright violations. The level of detail is impressive.
schneier From Schneier on Security | April 26, 2010 at 05:55 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Today after keynote presentations by James Cameron (who praised Microsoft Research for helping them create a digital asset management system that made Avatar possible)...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 26, 2010 at 05:05 PM
To address global warming there must be a shift in thinking and behavior that motivates people and organizations to engage in emissions reductions and climate preparedness...Experientia From Putting People First | April 26, 2010 at 04:13 PM
The disciplines of interaction design and architecture share a number of common traitsExperientia From Putting People First | April 26, 2010 at 03:21 PM
The latest issue of Interactions Magazine is about the spread of design into new areas, write editor Jon Kolko:
“The process of design is spreading into new areas...Experientia From Putting People First | April 26, 2010 at 03:14 PM
April 28
Markup:
The House Science and Technology Committee will mark up a reauthorization of the America COMPETES Act.
10 a.m., 2318 Rayburn Building From U.S. Public Policy Committee of the ACM | April 26, 2010 at 02:42 PM
There have been a number of reports that both blog reading and writing have decreased among younger age groups. Twitter and other social media largely being blamed...Franz Dill From The Eponymous Pickle | April 26, 2010 at 02:39 PM
The editor of the Freakonomics blog asked me to write about this topic. The idea was that they would get several opinions, and publish them all. They spiked the...schneier From Schneier on Security | April 26, 2010 at 12:20 PM
If you want to find something out you can ask Google, ask an expert,
or (if you have a blog) ask your readers.
Google is the most common; however, there are times...GASARCH From Computational Complexity | April 26, 2010 at 12:06 PM