From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The people from Ethnography Matters, an ethnography group blog that is celebrating its first year anniversary today, interviewed their new regular contributor Nicolas...Experientia From Putting People First | November 13, 2012 at 03:59 PM
Pulled from store shelves after a month, the first high-profile wearable activity tracker was a humiliation for Jawbone. Now, the Up is back, and anyone vying for...Experientia From Putting People First | November 13, 2012 at 03:39 PM
I have been recently been taking a look at the broad concept of marketing mix decisions. The problem is old: how do we decide how much promotional dollars toTheir...Franz Dill From The Eponymous Pickle | November 13, 2012 at 03:36 PM
The role of UX Strategist is a relatively new one on UX design teams, and has recently addressed in two articles on UXmatters: “UX Strategy: The Heart of User-Centered...Experientia From Putting People First | November 13, 2012 at 01:25 PM
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Chris Lehmann is the principal of the Science Leadership Academy, a partnership school in Philadelphia, and a frequent speaker on educational issues. He’s a great...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 13, 2012 at 11:04 AM
Living Offline – A Qualitative Study of Internet Non-Use in Great Britain and Sweden by Bianca Christin Reisdorf (U. of Oxford, UK), Ann-Sofie Axelsson (Chalmers...Experientia From Putting People First | November 13, 2012 at 08:39 AM
Jeff Zabin via Gib Bassett on using simpler business intelligence applications. Especially for the midsize company. Yes, I agree. In fact I would take it even...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:34 AM
In GigaOm: I had always expected that plastic cards would go away once the mobile smartphone-enabled wallet took over. Here the case is made that cards will...Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:19 AM
I met Joseph Kyoung-yun of Wayne State at a talk I gave last week and he was nice enough to send along some background on the work he was doing. He writes " ....Franz Dill From The Eponymous Pickle | November 13, 2012 at 01:14 AM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
Advancing Ethnography in Corporate Environments: Challenges and Emerging Opportunities Edited by Brigitte Jordan Left Coast Press November 2012, 224 pages [Amazon...Experientia From Putting People First | November 12, 2012 at 04:55 PM
I am very grateful that I will (hopefully) be lucky enough to see my vision for my Gram's House game developed professionally with research grants. After watching...Gail Carmichael From The Female Perspective of Computer Science | November 12, 2012 at 04:19 PM
The moment I learned that CIKM 2012 would be held in Maui, I knew I had to be there. Having co-organized the CIKM 2011 industry event, I had enough karma to be...Daniel Tunkelang From The Noisy Channel | November 12, 2012 at 03:00 PM
Every year since 2007, The TED Fellows program has recognized young innovators from around the globe for their “insightful, bold ideas that have the potential to...Kenneth Hines From The Computing Community Consortium Blog | November 12, 2012 at 12:02 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I spent a little time tweaking this blog layout last week. Just trying to make it look a little less cookie cutter. I also wanted to add the share buttons at the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 12, 2012 at 09:50 AM
As a result of hijacking a few recitations in MIT's 6.005: Software Construction course to evangelize Scala, I have come into contact with numerous undergraduates...Jean From updated sporadically at best | November 12, 2012 at 04:52 AM
I was fortunate this year not only to be able to attend the 21st ACM International Conference on Information and Knowledge Management (CIKM 2012) in Maui, but also...Daniel Tunkelang From The Noisy Channel | November 12, 2012 at 03:41 AM
David Sibbet, on the use of visualization capabilities with groups, as demonstrated by a mentor and friend at TED. "... It's a simple, inviting, clear demonstration...Franz Dill From The Eponymous Pickle | November 11, 2012 at 10:23 PM