From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Post-touch hasn’t found the killer use case that the mouse found with GUIs and the touchscreen found with mobile web browsing and apps — but it’s not for lack of...Experientia From Putting People First | September 21, 2012 at 03:55 PM
In this guest post for Ethnography Matters, Mike Gotta from Cisco Systems, makes the case for bringing the human back into enterprise software design and development...Experientia From Putting People First | September 21, 2012 at 03:47 PM
Sampling views from a panel representing Imperial College London, the Massachusetts Institute of Technology (MIT), the University of Washington, other international...Experientia From Putting People First | September 21, 2012 at 03:27 PM
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation by Richard Caddick and Steve Cable Wiley 2011, 352 pages ISBN 978-1119971108...Experientia From Putting People First | September 21, 2012 at 03:11 PM
In New Scientist: When we explored a number of methods of identity recognition, the one that surprised me then was the ability to recognize people by the pattern...Franz Dill From The Eponymous Pickle | September 21, 2012 at 01:27 PM
You’ll never guess who’s bankrolling open source. In my column in InfoWorld this week, I look at an initiative to get some crucial software written for America’s...Simon Phipps From Wild WebMink | September 21, 2012 at 01:04 PM
It’s the event you’ve been waiting for: the Sixth Symposium on Human-Computer Interaction and Information Retrieval! HCIR 2012 will take place October 4th and 5th...Daniel Tunkelang From The Noisy Channel | September 21, 2012 at 01:00 PM
In PEW Internet on the future of smart systems. Read all of it. " ... By 2020, experts think tech-enhanced homes, appliances, and utilities will spread, but many...Franz Dill From The Eponymous Pickle | September 21, 2012 at 12:41 PM
The Center for Advanced Technology is a great program at Lakewood Senior High School in Florida. Students in this program learn and use technology in interesting...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 21, 2012 at 09:04 AM
A short piece on 'extra sensory' means of understanding the consumer. Along the way some new mentions of work being done I had not seen before that is worth aVia...Franz Dill From The Eponymous Pickle | September 21, 2012 at 04:44 AM
Kevin Judd sends this notice of a one day conference on Technology in retail. Combining speakers from a number of companies. On September 24 in Cambridge Mass...Franz Dill From The Eponymous Pickle | September 20, 2012 at 10:53 PM
An interesting example of how a mid market company can gather and integrate and leverage data. here transforming the way that it does business. It seems like...Franz Dill From The Eponymous Pickle | September 20, 2012 at 10:44 PM
Kroger experimenting with more general merchandise, like clothing, in Ohio. A natural,higher profitability approach for the grocery retailer.Franz Dill From The Eponymous Pickle | September 20, 2012 at 08:57 PM
I'm pleased to say that my work on cognitive theories and augmented reality is finally going to be published. 'Understanding the Power of Augmented Reality for2012...Gail Carmichael From The Female Perspective of Computer Science | September 20, 2012 at 08:21 PM
Network World is out with a list of the 25 “coolest” computer networking research projects: University labs, fueled with millions of dollars in funding and some...Erwin Gianchandani From The Computing Community Consortium Blog | September 20, 2012 at 05:53 PM
Do you know a digital diva, web chix, or coder girl? Encourage her to apply for the NCWIT Award for Aspirations in Computing!
It is time to start those applications... From Computer Science Teachers Association | September 20, 2012 at 04:01 PM
Consider the following game on a poset, each player takes turns picking an element x of a finite poset and removes all y ≥ x. First one to empty the poset wins....Lance Fortnow From Computational Complexity | September 20, 2012 at 01:20 PM
The National Science Foundation (NSF) last week issued a new solicitation for its Secure and Trustworthy Computing (SaTC) program: Cyberspace — a global “virtual”...Erwin Gianchandani From The Computing Community Consortium Blog | September 20, 2012 at 11:22 AM
Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...schneier From Schneier on Security | September 20, 2012 at 11:02 AM