From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Used to commonly work with Autodesk. They were the first company to provide PC based drawing management. More mentions in this blog about Autodesk. Later weIn...Franz Dill From The Eponymous Pickle | February 22, 2014 at 12:59 PM
Do We Live In A Simulation? René Descartes is famous for countless things in mathematics—Cartesian products, Cartesian coordinates, Descartes’ rule of signs, the...rjlipton From Gödel's Lost Letter and P=NP | February 22, 2014 at 11:05 AM
Swarms of drones as emergency responders. See some of my previous writings about swarms. How do we install cooperative intelligence? How is cooperative intelligence...Franz Dill From The Eponymous Pickle | February 22, 2014 at 10:22 AM
SNCR Supported Study .... (Society of New Consumer Research)Millennials are leading the social commerce movement. They are more likely than any other group toKey...Franz Dill From The Eponymous Pickle | February 21, 2014 at 07:46 PM
This video is pretty fantastic:
The narrator does a great job at explaining what's going on here, blow by gross blow, but here are the highlights:
Black-eyed...schneier From Schneier on Security | February 21, 2014 at 05:33 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
CROSSBEAM
(TS//SI//REL) CROSSBEAM is a GSM module that mates a modified commercial...schneier From Schneier on Security | February 21, 2014 at 03:41 PM
Co3 Systems is going to be at the RSA Conference. We don't have our own booth on the show floor, but there are four ways you can find us. Monday, we're at the...schneier From Schneier on Security | February 21, 2014 at 03:06 PM
I like this take on the hospitality industry. And its relationship to Big Data. The industry is an example where it makes much sense to utilize real time data...Franz Dill From The Eponymous Pickle | February 21, 2014 at 11:03 AM
In the Harvard Business Review Blogs: May require registration. Good thoughts. When I taught forecasting it was always about understanding how the forecast was...Franz Dill From The Eponymous Pickle | February 21, 2014 at 11:00 AM
A good, free 15 page pamphlet about Big Data. Co Sponsored by Teradata. Looks to be a set of objective observations about the opportunities and cautions. Integration...Franz Dill From The Eponymous Pickle | February 21, 2014 at 10:50 AM
We like to have an idealized view of the scientist. He or she is someone who chose against a high-paying career to pursue the ideals of science and academia. Unlike...Daniel Lemire From Daniel Lemire's Blog | February 21, 2014 at 10:31 AM
There's an interesting project to detect false rumors on the Internet.
The EU-funded project aims to classify online rumours into four types: speculation -- such...schneier From Schneier on Security | February 21, 2014 at 09:34 AM
The Defense Advanced Research Projects Agency (DARPA) announced the launch of the Big Mechanism program to develop automated technologies that will help explain...Ann Drobnis From The Computing Community Consortium Blog | February 21, 2014 at 09:32 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
An interesting looking summer program. One has to get there on their own from what I can tell but no cost other than that. Open to 11th/12th graders. TECHNOLOGY...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 21, 2014 at 05:39 AM
In Mashable: Project Tango from Google. Quite an interesting effort. Relates to a number of our indoor navigation experiments. Ready here to do a retail store...Franz Dill From The Eponymous Pickle | February 20, 2014 at 09:34 PM
My son pointed me to this iPhone App, that twists a phone on its long axis, to enable automated panorama images. It was featured recently on Shark Tank. An example...Franz Dill From The Eponymous Pickle | February 20, 2014 at 07:05 PM
Nice profile of Brian Krebs, cybersecurity journalist:
Russian criminals routinely feed Mr. Krebs information about their rivals that they obtained through hacks...schneier From Schneier on Security | February 20, 2014 at 05:09 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
CANDYGRAM
(S//SI//REL) Mimics GSM cell tower of a target network. Capable(S...schneier From Schneier on Security | February 20, 2014 at 03:11 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Patrice Gans has a great post on the CSTA blog about Creating a Professional Learning Network that I wanted to share. Normally I would just include a link on my...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 20, 2014 at 02:59 PM
I see that two friends I worked with at Sun — most notably creating blogs.sun.com — are on the move. Danese Cooper has decided that she can take on one more corporation’s...Simon Phipps From Wild WebMink | February 20, 2014 at 02:12 PM