From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
While Congress has tried to pass major cybersecurity legislation for the last few years, this week marks what could be a major step forward in finally getting a...David B. From U.S. Public Policy Committee of the ACM | April 25, 2012 at 12:35 AM
Taking a look at Cray Computer. Years ago, in 1996, when they had just combined with Silicon Graphics, also an early platform we used, I gave a talk to their...Franz Dill From The Eponymous Pickle | April 24, 2012 at 11:28 PM
Plenty on my mind this week, so to focus I’ve written a quick post on ComputerWorldUK listing some of the things I’m thinking about. A bit random; I’d be interested...Simon Phipps From Wild WebMink | April 24, 2012 at 10:59 PM
From the Wharton Customer Analytics Initiative:Intriguing data and behavior analysis opportunity:IF YOU "LIKE" WILL YOU BUY? NEW DATA ON SOCIAL MEDIA EXPOSUREA...Franz Dill From The Eponymous Pickle | April 24, 2012 at 10:37 PM
In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...schneier From Schneier on Security | April 24, 2012 at 04:44 PM
Just had an enlightening discussion with Dave Swart, of Health Chain Solutions Ltd. They address the question of how you utilize increasingly available health...Franz Dill From The Eponymous Pickle | April 24, 2012 at 03:30 PM
In a recent interesting development, Japanese hardware and software giant has proposed a software suite that addresses big data. " ... The company announced server...Franz Dill From The Eponymous Pickle | April 24, 2012 at 03:05 PM
The 2012 Imagine Cup is now history for most teams. A few are still involved as they are on their way to Sydney Australia for the world wide finals this July. So...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 24, 2012 at 10:54 AM
A graph displays the penetration of many common technologies into US households. Source at the link and larger graph at the link. See the comments in the link...Franz Dill From The Eponymous Pickle | April 24, 2012 at 04:10 AM
Intriguing webinar case study of work by Kimberly-Clark. I plan to attend. The idea of using concept development is something we are using effectively to this...Franz Dill From The Eponymous Pickle | April 24, 2012 at 01:51 AM
Harvard's CS50 class is nicely lauded -- by a column in the Yale Daily News. First, the Harvard-centric stuff:The good news is that thereMichael Mitzenmacher From My Biased Coin | April 23, 2012 at 10:37 PM
In the HBR Blogs: Although Myers Briggs tests are not technically meant to label introvert-extrovert, we did experiment with it broadly to help people understand...Franz Dill From The Eponymous Pickle | April 23, 2012 at 07:22 PM
In AdAge: A good opinion piece predicting the continuing increase of using social media to engage. Suggestion is that a battle will ensue between digital media...Franz Dill From The Eponymous Pickle | April 23, 2012 at 06:16 PM
An experimental topic for some time. It always requires a second protective layer for making sure that encounters with water or high moisture don't cause problems...Franz Dill From The Eponymous Pickle | April 23, 2012 at 06:03 PM
The House is expected to consider four cybersecurity bills on Thursday and Friday, April 26 and 27. April 24 Hearing: The Senate Commerce, Science and Transportation...David B. From U.S. Public Policy Committee of the ACM | April 23, 2012 at 03:53 PM