Nicola Morelli (blog), an associate professor at the School of Architecture and Design at Aalborg University in Denmark, reflects on the two inspirations for a...Experientia From Putting People First | November 26, 2009 at 05:54 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Professor and Head of Computer Science of the School of Computing at the National University of Singapore. Before that, he was the Deputy Executive Director for...Tobias Svensson From Return 42; | November 26, 2009 at 12:08 PM
I have written before about the "Verified by VISA" program. While shopping for Thanksgiving online this year, I noticed that Verified by Visa scripts were blocked... From CERIAS Blog | November 26, 2009 at 11:49 AM
The end of the year brings upon us the celebrations that come with the holidays. This year, we have extra reason to celebrate with an added holiday.
The week of... From Computer Science Teachers Association | November 25, 2009 at 10:15 PM
PASS ID, S. 1261, is a bill introduced in June as an attempt to break through the impasse over REAL ID. That law, passed as part of a budget bill in 2005, was... From U.S. Public Policy Committee of the ACM | November 25, 2009 at 08:55 PM
A BNet article that looks at P&G past acquisitions, and speculates about future M&A in terms of retail space coverage. I like the idea of understanding products...Franz Dill From The Eponymous Pickle | November 25, 2009 at 07:57 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM
On learning through games and simulations. ' ... Karl Kapp, professor, author and speaker, understands the value of games and simulations in learning. In this...Franz Dill From The Eponymous Pickle | November 25, 2009 at 07:31 PM
First a message from David Johnson for proposals on locations for SODA 2012 both in and outside the US.
Here's an interesting approach to the birthday paradox...Lance From Computational Complexity | November 25, 2009 at 11:31 AM
A timely piece in [email protected] on choosing innovations. Something we and all enterprises struggled with under the topic of knowledge management and portfolio...Franz Dill From The Eponymous Pickle | November 25, 2009 at 10:45 AM
If you allow players in an online world to penalize each other, you open the door to extortion:
One of the features that supported user socialization in the game...schneier From Schneier on Security | November 25, 2009 at 10:11 AM
Having just personally experienced my first fMRI, this caught my eye. Apparently the first time that this has been done in a courtroom. Not that the method is being...Franz Dill From The Eponymous Pickle | November 24, 2009 at 05:44 PM
Reading John Harrison's blog of November 3 got me thinking about what I am trying to teach my students in my third-semester (university) course about the development... From Computer Science Teachers Association | November 24, 2009 at 05:06 PM
This paper, by Cormac Herley at Microsoft Research, sounds like me:
Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...schneier From Schneier on Security | November 24, 2009 at 04:06 PM