From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good piece in the NYT: The Million Follower Fallacy: Audience Size Doesn't Prove Influence on Twitter Sign in to Recommend' ... A group of researchers have proven...Franz Dill From The Eponymous Pickle | March 21, 2010 at 05:02 AM
Although published late last year, this book was just brought to my attention: Total Engagement: Using Games and Virtual Worlds to Change the Way People Work and...Franz Dill From The Eponymous Pickle | March 20, 2010 at 07:56 PM
In a post on ReadWriteWeb, Sarah Perez summarizes “Measuring User In?uence in Twitter: The Million Follower Fallacy“, a recent research paper by Meeyoung Cha, Hamed...Daniel Tunkelang From The Noisy Channel | March 20, 2010 at 09:40 AM
Have recently taken a look at how to get printed data from books and manuals into a database. There are some new methods that look to make in volume operationsFrom...Franz Dill From The Eponymous Pickle | March 20, 2010 at 04:24 AM
Plastination:
For several years von Hagens and his team experimented using smaller squid, and found that the fragility of the skin needed a slower replacement...schneier From Schneier on Security | March 19, 2010 at 09:47 PM
In Sascom Magazine, at a recent conference of industry practitioners: ' ... Industry incumbents, academia and industry analysts all agreed that in the new-economy...Franz Dill From The Eponymous Pickle | March 19, 2010 at 06:46 PM
This would worry me, if the liquid ban weren't already useless.
The reporter found the security flaw in the airport's duty-free shopping system. At Schiphol airport...schneier From Schneier on Security | March 19, 2010 at 05:58 PM
Searching for extra-terrestrial intelligence. Despite extensive crowd sourced efforts there has yet to be any evidence of ET. There are some useful comments (and...Franz Dill From The Eponymous Pickle | March 19, 2010 at 05:48 PM
Jane McGonigal said at TED 2010 that the world spends 3 billion hours per week playing games, but she'd like to see that number increase to 21 billion hours. You...Gail Carmichael From The Female Perspective of Computer Science | March 19, 2010 at 04:34 PM
Intriguing paper with privacy implications:You Are Who You Know:Inferring User Profiles in Online Social NetworksIn this paper, we ask the question: given attributes...Franz Dill From The Eponymous Pickle | March 19, 2010 at 03:39 PM
With spring quarter arriving, I will take a break from book
writing on P v. NP and come back to blogging. I hit my goal of getting
past the point of no return (about...Lance From Computational Complexity | March 19, 2010 at 02:27 PM
The National Science Foundation is commencing a national search for the NSF’s Assistant Director for Computer and Information Science and Engineering (CISE) and...Ran Libeskind-Hadas From The Computing Community Consortium Blog | March 19, 2010 at 01:32 PM
Interesting research:
Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...schneier From Schneier on Security | March 19, 2010 at 11:58 AM
I don't blog about my work as an expert witness, but for those who are interested in such things, since I (currently) have nothing to do with the case, I can happily...Michael Mitzenmacher From My Biased Coin | March 19, 2010 at 01:23 AM
John Battelle makes make the case that the architecture of apps is broken. They do not each rise above the level of a single purpose and do not communicate. -Franz Dill From The Eponymous Pickle | March 19, 2010 at 01:09 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I regularly receive announcements about Microsoft events for educators. Some of them are directly of interest to computer science teachers so obviously I blog about...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 19, 2010 at 12:47 AM