From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On how to onboard new users. Its harder that you think. Different users have very different expectations of how they expect to be introduced to your great idea...Franz Dill From The Eponymous Pickle | February 2, 2014 at 01:35 AM
Data Cubes came up in a meeting yesterday and though I knew in general what they were, I sought out a more general and useful definition. I found this. Comments...Franz Dill From The Eponymous Pickle | February 1, 2014 at 02:16 PM
In the HBR, where registration for full text is now required. Yes, simplify is always good to consider. " ... rebuilding your processes from the ground up with...Franz Dill From The Eponymous Pickle | February 1, 2014 at 02:06 PM
Predicting Product Launch success. We worked on this using a number of simulation based methods. Interesting case study here: " ... Back in May, Kaggle ran...Franz Dill From The Eponymous Pickle | February 1, 2014 at 12:49 PM
A T-shirt with a drawing of a squid reading.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 31, 2014 at 05:41 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
IRATEMONK
(TS//SI//REL) IRATEMONK provides software application persistence...schneier From Schneier on Security | January 31, 2014 at 03:17 PM
Where does computer science fit? At the university level I’ve seen it in Business departments/Schools of Business. I’ve seen it in various science schools – Schools...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 31, 2014 at 01:28 PM
Back on January 9th I attended the IBM announcement of its group for Watson applications. I tweeted the announcement at @FranzD #IBMWatson. Full announcement....Franz Dill From The Eponymous Pickle | January 31, 2014 at 12:25 PM
A discussion of the implication of security on the Internet of Things. If everything is connected, the path to us or our households brings insecurity yet closer...Franz Dill From The Eponymous Pickle | January 31, 2014 at 10:15 AM
Connecting the cloud and big data for business. A piece from Pneuron, which I am looking into. I was struck by this statement: " ... Data is more volatile than...Franz Dill From The Eponymous Pickle | January 31, 2014 at 10:00 AM
A discussion of systems that are meant to prevent deception and unethical behavior. In Knowledge@Wharton. A topic in any system that is meant to gather human"...Franz Dill From The Eponymous Pickle | January 31, 2014 at 09:53 AM
This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...schneier From Schneier on Security | January 31, 2014 at 07:16 AM
At the center of this kerfuffle is an anthropologist, Daniel Miller, his ethnographic research with teenagers in a small town in the UK, and a press report on a...Experientia From Putting People First | January 31, 2014 at 06:12 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
HOWLERMONKEY
(TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...schneier From Schneier on Security | January 30, 2014 at 09:38 PM
It snowed in Atlanta, and we are closed, for the foreseeable future—where is global warming? Atlanta is frozen. Here is what we looked like the other night. Today...rjlipton From Gödel's Lost Letter and P=NP | January 30, 2014 at 02:49 PM
This CW article led me to the meaning of QA ... " ... Long undervalued, quality assurance is in the limelight -- and QA pros in demand -- following the disaster...Franz Dill From The Eponymous Pickle | January 30, 2014 at 02:22 PM
Quite obvious, people are always looking at the motivation of recommendations. Can we now get at the motivation more clearly? (In Supermarket News, requires registration...Franz Dill From The Eponymous Pickle | January 30, 2014 at 01:51 PM
The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...schneier From Schneier on Security | January 30, 2014 at 01:08 PM
Charlene Li speaks on the topic, relating to a recent study: " .... Overall, we found that investment in headcount and infrastructure have steadily grown, as companies...Franz Dill From The Eponymous Pickle | January 30, 2014 at 10:48 AM