From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In CACM: Recent Progress in Quantum Algorithms: What quantum algorithms outperform classical computation and how do they do it?. The early parts of this article...Franz Dill From The Eponymous Pickle | February 12, 2010 at 02:50 PM
In the Enterprise a key goal was intimately understanding the needs of the consumer. It can be done in part by talking to many of them in contextual environments...Franz Dill From The Eponymous Pickle | February 12, 2010 at 01:43 PM
This< is neat:
The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...schneier From Schneier on Security | February 12, 2010 at 12:23 PM
New flaws in chip and pin system revealed
Watch the video and see this entirely straightforward attack being carried out. There...webmink From Wild WebMink | February 12, 2010 at 12:07 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I posted about some professional development opportunities for teachers this summer. I expect to post most in the days to come. But for now the otheriD...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 12, 2010 at 10:27 AM
Earlier this month the Administration released its budget request for the 2011 Fiscal Year, which will start October 1 (whether or not Congress finishes the budget... From U.S. Public Policy Committee of the ACM | February 12, 2010 at 02:35 AM
The attendees at the CCC-supported workshop on Free/Open Source Software met today at UC Irvine’s Bren School of Information and Computer Sciences to work in break...John L King From The Computing Community Consortium Blog | February 12, 2010 at 01:09 AM
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
(Univ of MD at College Park had Monday, Tuesday, Wed, Thursday all off.
I've spend most of that time shoveling snow, so I am tired. Hence I am glad
to have a SHORT...GASARCH From Computational Complexity | February 11, 2010 at 08:18 PM
This is the first in a three-part series of design proposals for augmented reality learning applications. These are from a paper I wrote in my computers and cognition...Gail Carmichael From The Female Perspective of Computer Science | February 11, 2010 at 04:20 PM
Luca Trevisan sent me the link for the call for FOCS 2010. Key points: The deadline is April 7. And, in a move that I approve of, there's no page limit on submissions...Michael Mitzenmacher From My Biased Coin | February 11, 2010 at 02:37 PM
The author of the always interesting Junk Chart Blog, Kaiser Fung, now has a book out. Described in the blog and now available: Numbers Rule Your World: The hidden...Franz Dill From The Eponymous Pickle | February 11, 2010 at 02:33 PM
Paul Gillin has a good post on the emergence of a site-less web. An evolution is occurring, though I think that there will always have to be anchoring points like...Franz Dill From The Eponymous Pickle | February 11, 2010 at 01:22 PM
Really interesting reading.
Scam-Detective: How did you find victims for your scams?
John: First you need to understand how the gangs work. At the bottom are...schneier From Schneier on Security | February 11, 2010 at 01:19 PM
In Forbes: Smart phones as payment systems. Considerable implications because smartphone acting as a wallet is also a communications device at the point of sale...Franz Dill From The Eponymous Pickle | February 11, 2010 at 01:10 PM
Copyrights and wrongs
While Matthew's discussion is good (and the links are very useful), he misses the key point: that communities...webmink From Wild WebMink | February 11, 2010 at 12:05 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
In various contexts the subject of programming contests has come up in conversations I have been having with both teachers and friends in industry. There are, to...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 11, 2010 at 10:43 AM
Forty-five people met today in Newport Beach, CA for the first day of a three-day workshop supported by the CCC on Free/Open Source Software.John L King From The Computing Community Consortium Blog | February 10, 2010 at 11:24 PM
I am now signed into Google Buzz and understand generally how it works. I have also attached this blog to Buzz to see how that works. It also integrates location...Franz Dill From The Eponymous Pickle | February 10, 2010 at 08:12 PM