From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Learning how people make mistakes and using that mined information to determine the best way to teach them.Franz Dill From The Eponymous Pickle | November 12, 2010 at 02:06 AM
I was an early user of Spotfire in the enterprise. Now it is good to see that they have modified it to the point that it can be used on an iPad. I have been hearing...Franz Dill From The Eponymous Pickle | November 12, 2010 at 01:35 AM
Microsoft Research New England (MSRNE) is looking for PhD interns to join the social media collective for Spring and Summer 2011. For these positions, we are looking...zephoria From Apophenia | November 11, 2010 at 10:57 PM
From Brian Krebs:
Hacked and malicious sites designed to steal data from unsuspecting users via malware and phishing are a dime a dozen, often located in the United...schneier From Schneier on Security | November 11, 2010 at 06:45 PM
From ECairn, which I have followed for some time:" ... Our joint case study with Adobe illustrates the highly differentiated benefits of a very targeted approach...Franz Dill From The Eponymous Pickle | November 11, 2010 at 05:48 PM
The idea of putting an microchip in a pill has been around for some time. This is the first time I have seen the implementation getting close. There is concern...Franz Dill From The Eponymous Pickle | November 11, 2010 at 05:42 PM
I have a friend who is an architect (the kind that designs buildings instead of software). I was reminded recently of a conversation my husband and I had withThe...Gail Carmichael From The Female Perspective of Computer Science | November 11, 2010 at 04:59 PM
(There are TWO theory day events in NY this semsester:
Nov 11, 2010
and
Nov 12, 2010.
The first one has likely already started as you read this.)
I searched...GASARCH From Computational Complexity | November 11, 2010 at 02:22 PM
Continuum launched of a new division within its organization, known as Continuum Advanced Systems. Focused on the intersection of technology, systems and human-centered...Experientia From Putting People First | November 11, 2010 at 12:10 PM
In a very general overview article published in Newsweek, Ravi Somaiya reports on how the impact of the ubiquitous device extends from politics to business, medicine...Experientia From Putting People First | November 11, 2010 at 12:09 PM
In a long blog post, designer and developer Alexander Dawson discusses some important privacy-related concerns Experientia From Putting People First | November 11, 2010 at 12:04 PM
James Glasnapp, who manages PARC‘s Workscapes and Organization team, has written his second article in a series on ethnography (you can read the first one here)...Experientia From Putting People First | November 11, 2010 at 11:59 AM
How often should you change your password? I get asked that question a lot, usually by people annoyed at their employer's or bank's password expiration policy:choose...schneier From Schneier on Security | November 11, 2010 at 11:02 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last summer I helped present two talks at the CSTA CS & IT Symposium. In both cases I had small rolls with Pat Philips doing almost all of the talking on the talk...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 11, 2010 at 10:38 AM
The news is out that WS-I will now be absorbed by OASIS according to their PDF release. They told us back in July that it was going to happen. As far as I can tell...Simon Phipps From Wild WebMink | November 11, 2010 at 07:30 AM
I got a note the other day that announced my local library was starting to lend e-books, and even loaning out e-readers. That made me think, what do the publishers...Franz Dill From The Eponymous Pickle | November 11, 2010 at 12:55 AM
The TSA is making us remove our belts even when we don't have to.
European airports have made us remove our belts for years. My normal tactic is to pull my shirt...schneier From Schneier on Security | November 10, 2010 at 07:41 PM
I have looked at aspects of retail checkout for some time. Examining methods like RFID tagging, in store hand held scanning, carts that scan their contents and...Franz Dill From The Eponymous Pickle | November 10, 2010 at 06:34 PM
Fellow blogger Scott Aaronson was chosen as one of 19 NSF PECASE awardees and wins a trip to the White House. Congrats to Scott! He received the award "for pushing...Lance From Computational Complexity | November 10, 2010 at 03:58 PM
Many dedicated and resourceful individuals have been working on inspiring the public school system to adopt a computer science friendly curriculum in grades k-12... From Computer Science Teachers Association | November 10, 2010 at 03:49 PM