From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In ComputerWorld: What looks to be a very good set of documents and links for using the data analytics language R. Continuing to establish itself as the language...Franz Dill From The Eponymous Pickle | January 16, 2014 at 12:42 PM
From Metaio. Here using the example of a museum tour. An excellent example of the use of augmented reality. Combining physical and artificial spaces to provide...Franz Dill From The Eponymous Pickle | January 16, 2014 at 11:34 AM
Looking at the Electronic nose again. We were primarily interested in detecting engaging aromas in coffee. Now In Knowledge @ Wharton: " ... Samuel M. Khamis,...Franz Dill From The Eponymous Pickle | January 16, 2014 at 10:58 AM
Continue to make my way through this new text. Which seeks to position the three kinds of analytics: Descriptive, Predictive and Prescriptive. As I have preached...Franz Dill From The Eponymous Pickle | January 16, 2014 at 09:28 AM
I was invited to give a talk at the FST&TCS conference held in December 1994 in Madras (now Chennai). As I searched for a topic, I realized I was just finishing...Lance Fortnow From Computational Complexity | January 16, 2014 at 08:40 AM
This is interesting:
Adding credence to the theory that Brooklyn landlord Menachem Stark was kidnapped and murdered by professionals, a law enforcement source ...schneier From Schneier on Security | January 16, 2014 at 08:29 AM
A simple but useful bound on binomial coefficients Andreas von Ettingshausen was a German mathematician and physicist who lived in the early part of the 19 century...rjlipton From Gödel's Lost Letter and P=NP | January 15, 2014 at 06:21 PM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
SCHOOLMONTANA
(TS//SI//REL) SCHOOLMONTANA provides persistence for DNThere...schneier From Schneier on Security | January 15, 2014 at 03:56 PM
If you have been following some recent advances in thinking about cognition: " ... Charles Young examines what we can learn about measuring ad effectiveness byvia...Franz Dill From The Eponymous Pickle | January 15, 2014 at 11:19 AM
The latest issue of the always useful Analytics Magazine is now available. Cover articles include analytics careers and consulting. Good spread of detail and"...Franz Dill From The Eponymous Pickle | January 15, 2014 at 10:49 AM
We actively experimented with smart home systems, solutions and configuration. Google's investment in the Nest thermostat indicates a big investment in a key part...Franz Dill From The Eponymous Pickle | January 15, 2014 at 10:35 AM
Bias, or what we often saw: 'confirmation bias' is a key danger in any kind of research or decision process. This is particularly important in less defined strategy...Franz Dill From The Eponymous Pickle | January 15, 2014 at 10:27 AM
Scoping the fate of the PC. They seem to be morphing into the tablet. What aspects of devices are true requirements?Franz Dill From The Eponymous Pickle | January 15, 2014 at 10:10 AM
Designing Customer-Centric Branchless Banking Offerings Claudia McKay, Yanina Seltzer The Consultative Group to Assist the Poor (CGAP) 20 December 2013 pdf, iBook...Experientia From Putting People First | January 15, 2014 at 09:42 AM
From Ashkan Soltani's blog post:
The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the ...schneier From Schneier on Security | January 15, 2014 at 07:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Are you an active member of the Computer Science Teachers Association and looking to get more involved? The CSTA Board is a working board that develops policy for...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 15, 2014 at 05:42 AM
Are you an educator or adminstrator with skills and drive? Have you considered putting those skills and drive to work for your CSTA? There are six vacancies... From Computer Science Teachers Association | January 14, 2014 at 07:26 PM
In the Future of the CIO: Future From a Mechanical to Sociological System. Is this a digital shift? An academic view.Franz Dill From The Eponymous Pickle | January 14, 2014 at 07:17 PM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
HEADWATER
(TS//SI//REL) HEADWATER is a Persistent Backdoor (PDB) software...schneier From Schneier on Security | January 14, 2014 at 03:10 PM
I taught a 3-week summer course to High School Students called
Computer Science: A Hands Off Approach
which did some theory. One thing I did was the following...GASARCH From Computational Complexity | January 14, 2014 at 10:50 AM