From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
UX Best Practices – How to Achieve More Impact with User Experience Helmut Degen & Xiaowei Yuan (Eds.) McGraw-Hill Osborne Media, 2011 ISBN-10: 007175251X, ISBN...Experientia From Putting People First | August 3, 2012 at 09:14 AM
In three essays John Payne, Principal of Moment’s Experience Design practice, reflects on his workshop, Ethnography for User Experience, and their field research...Experientia From Putting People First | August 3, 2012 at 09:02 AM
Brian David Johnson gets paid to predict the future. He is the first, the one, and the only futurist at Intel, charged with envisioning how people will interact...Experientia From Putting People First | August 3, 2012 at 08:34 AM
Correspondent David Goldberg points me to the BigBeacon blog. A movement to transform engineering education ... Which also syndicates some of his writing on...Franz Dill From The Eponymous Pickle | August 3, 2012 at 03:53 AM
Lion tracks in Wolverine territory Anna Gilbert and Martin Strauss are experts in many aspects of mathematics and its relationship to fundamental questions of computer...Pip From Gödel's Lost Letter and P=NP | August 2, 2012 at 08:50 PM
Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...schneier From Schneier on Security | August 2, 2012 at 07:19 PM
Wharton examines the no-boss environment. An unachievable utopia? Or the future of a strong social, but also measurable environment?Franz Dill From The Eponymous Pickle | August 2, 2012 at 06:24 PM
MOOC's —Massive Open Online Courses — are all the rage these days. These are systems that allow hundreds of thousands of learners from around the world to take...Gail Carmichael From The Female Perspective of Computer Science | August 2, 2012 at 06:16 PM
In Fastcompany: A useful thought, which we used with regard to setting and testing contexts that changed behavior. " ... Behavior is the unknowable variable in...Franz Dill From The Eponymous Pickle | August 2, 2012 at 06:13 PM
The attack only works sometimes, but it does allow access to millions of hotel rooms worldwide that are secured by Onity brand locks. Basically, you can read the...schneier From Schneier on Security | August 2, 2012 at 06:08 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I’ve been experimenting with Construct 2 from Scirra the last few days. Construct 2 is a program from creating HTML 5 games. What really got my interest was that...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 2, 2012 at 05:37 PM
Henry Jenkins, Mimi Ito, and I have embarked on an interesting project for Polity. Through a series of dialogues, we’re hoping to produce a book that interrogates...zephoria From Apophenia | August 2, 2012 at 05:21 PM
In Google Research: Big Pictures with big messages. How do we deliver big data onto a palette that makes the the message clear? Easier with geographical maps...Franz Dill From The Eponymous Pickle | August 2, 2012 at 02:03 PM
I haven't posted in about a month. A combination of traveling, vacation, moving to Atlanta and getting started as chair. I appreciate why Michael Mitzenmacher stopped...Lance Fortnow From Computational Complexity | August 2, 2012 at 12:34 PM
Judea Pearl received the 2011 ACM A. M. Turing Award “for fundamental contributions to artificial intelligence through the development of a calculus for probabilistic...Erwin Gianchandani From The Computing Community Consortium Blog | August 2, 2012 at 12:29 PM
Wired has an interesting and comprehensive profile on Eugene Kaspersky. Especially note Kaspersky Lab's work to uncover US cyberespionage against Iran, Kaspersky's...schneier From Schneier on Security | August 2, 2012 at 11:23 AM
As a manager, I’ve found that I mostly have two jobs: bringing great people onto the team, and creating the conditions for their success. The second job is the...Daniel Tunkelang From The Noisy Channel | August 2, 2012 at 11:02 AM
Alison Bolen of the SASCom Blog aggregates a number of good thoughts and posts about the topic of big data.Franz Dill From The Eponymous Pickle | August 2, 2012 at 04:33 AM
Google Wallet now accepts many card options. We move closer to the electronic wallet. Near universal capability is key. " ... The newest version of Google Wallet...Franz Dill From The Eponymous Pickle | August 2, 2012 at 01:35 AM
The new thing about the Aurora shooting wasn't the weaponry, but the armor:
What distinguished Holmes wasn't his offense. It was his defense. At Columbine, Harris...schneier From Schneier on Security | August 1, 2012 at 06:34 PM