From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Game Day is an an annual event at Carleton University. It's a day full of lectures on various game industry topics, a LAN party, and one of many Global Game Jam...Gail Carmichael From The Female Perspective of Computer Science | February 3, 2010 at 10:59 PM
Evan Schuman put out a good post on channels and the effect of context. Worth a full read. My thoughts on this: The original idea of the innovation centers was...Franz Dill From The Eponymous Pickle | February 3, 2010 at 08:32 PM
Animations and creation of games really does motivate students. Doesn't every student assume they can take an introductory computer science course and get a job... From Computer Science Teachers Association | February 3, 2010 at 06:08 PM
Alison Bolen in SAScom Voices posts about Nine Optimization Lessons from Target. " ... how Target uses guest intelligence to optimize marketing and merchandising...Franz Dill From The Eponymous Pickle | February 3, 2010 at 05:54 PM
This is a real conversation between BILL and STUDENT (a Software Engineering Masters Student
who knows some theory). As such there are likely BETTER arguments BILL...GASARCH From Computational Complexity | February 3, 2010 at 04:19 PM
If you read my blog, you probably like to read in general. Thus, if you don’t own an ebook device, you will soon. The choice is growing: the Amazon Kindle, the...Daniel Lemire From Daniel Lemire's Blog | February 3, 2010 at 03:36 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Have you ever been asked a question that you have been asked time and again but suddenly decided you have a different answer for? One of the questions I hear aDon...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 3, 2010 at 10:44 AM
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...schneier From Schneier on Security | February 3, 2010 at 10:07 AM
I have been closely following scanner smartphone Apps that read barcodes by utilizing the phones's camera. In particular the Redlaser App has gone through a number...Franz Dill From The Eponymous Pickle | February 3, 2010 at 05:14 AM
I’m delighted to report that I’ll be blogging about the Search and Social Media Workshop (SSM 2010) and the Web Search and Data Mining Conference (WSDM 2010) for...Daniel Tunkelang From The Noisy Channel | February 3, 2010 at 05:07 AM
In IEEE Computing:Social Computing: From Social Informatics to Social Intelligenceby Fei-Yue Wang, Kathleen M. Carley, Daniel Zeng, and Wenji MaoReaders are introduced...Franz Dill From The Eponymous Pickle | February 2, 2010 at 10:25 PM
You will recall I reviewed Herb Sorensen's book: Inside the Mind of the Shopper", some time ago. Highly recommended for its insight into the scientific understanding...Franz Dill From The Eponymous Pickle | February 2, 2010 at 04:01 PM
Martin Kruskal
invented Soliton Waves which were a very important concept in
Physics.
Rebecca Kruskal (Martin's Granddaughter): Daddy, how come they are not...GASARCH From Computational Complexity | February 2, 2010 at 03:14 PM
CONTENTS
[1] Newsletter Highlights
[2] First Computer Science Education Week Finishes Strong
[3] USACM Supports Expanded FCC Technical Advice
[4] FY 2010 Budgets... From U.S. Public Policy Committee of the ACM | February 2, 2010 at 03:13 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week I attended a workshop day at Stevens Institute of Technology where Michael Kolling, University of Kent and creator of Greenfoot was the keynote speaker...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 2, 2010 at 10:53 AM
Scott Hill of Alternet looks at how technology facilitates “the human sentient understanding of how to take cruel advantage of human weakness”.
“Indeed, humans...Experientia From Putting People First | February 2, 2010 at 09:34 AM
The New York Times reports that President Obama’s proposed budget includes substantial increases for science research, including an 8% increase for the National...Ran Libeskind-Hadas From The Computing Community Consortium Blog | February 2, 2010 at 07:27 AM
In Digital Nation: Life on the Virtual Frontier, FRONTLINE presents an in-depth exploration of what it means to be human in a 21st-century digital world.
Continuing...Experientia From Putting People First | February 2, 2010 at 07:04 AM
Preliminary stats show 55 students in my algorithms course. That's probably close to the mean and slightly above the median. It's certainly not the largest course...Michael Mitzenmacher From My Biased Coin | February 2, 2010 at 06:18 AM
Mark Montgomery posts on: Systemic Failures, by Design. See also the newletter of his company: Kyield.Franz Dill From The Eponymous Pickle | February 2, 2010 at 05:10 AM