From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I worry that comments about the value of software security made at the RSA Conference last week will be taken out of context. John Viega did not say that software...schneier From Schneier on Security | March 11, 2013 at 11:12 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
It’s Women’s History Month and last week was International Women’s Day. Not surprisingly that there was a lot of talk about women in computer science in particular...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 11, 2013 at 10:03 AM
In its second decade of running their Connect & Develop approach, P&G has updated their approach and website. See it here. I have worked using it to connect to...Franz Dill From The Eponymous Pickle | March 10, 2013 at 08:51 PM
Starting now you can utilize blog tags here, also called labels. They are found at the bottom of each post. These tags classify the blog post with others that...Franz Dill From The Eponymous Pickle | March 10, 2013 at 05:49 PM
Recognizing PatternsWith today’s powerful data analysis systems, users gather a ton of information—a breakdown of Wal-Mart Stores’ (WMT) sales in the U.S. or things...Franz Dill From The Eponymous Pickle | March 10, 2013 at 09:17 AM
Apply Your Experience.Saffron Technology wants to put your data to work under a completely new approach to data analytics: Experience Management. The way we see...Franz Dill From The Eponymous Pickle | March 10, 2013 at 09:09 AM
A strange offshoot of the Harvard cheating scandal -- a report in the Boston Globe that Harvard administrators decided it was OK to search through Resident Dean...Michael Mitzenmacher From My Biased Coin | March 10, 2013 at 05:42 AM
Foursquare checkins become easier, which eases the whole problem of getting loyalty credit, and also makes the implementation of location based games more powerful...Franz Dill From The Eponymous Pickle | March 10, 2013 at 03:07 AM
Good thoughts in Mashable. It is revealing that some of hints here also use Google to improve your personal brand, regardless you are a regular user of their...Franz Dill From The Eponymous Pickle | March 9, 2013 at 06:38 PM
Pointer to the advertising future via a video by James C Nelson. from 1967. I remember thinking about adaptive media not long after that, but it seemed the challenges...Franz Dill From The Eponymous Pickle | March 9, 2013 at 03:07 PM
Good IT is a magical thing that can drive employees to do new things. My reaction to the title here. Why else does everyone have a smartphone and/or a tablet,...Franz Dill From The Eponymous Pickle | March 9, 2013 at 02:48 PM
After a long hiatus, the ACM Washington Update – a newsletter of computing policy activity published by the ACM Public Policy Office – is back. Yesterday we published...David B. From U.S. Public Policy Committee of the ACM | March 9, 2013 at 03:50 AM
In Pro Publica A good overview of how personal data is currently being brokered. First time that I had seen this much information about the topic in one place....Franz Dill From The Eponymous Pickle | March 9, 2013 at 02:55 AM
Roger Dooley provides a number of examples of Coke neuromarketing. I had been sensing that there was a decrease in the use of these technologies to understand...Franz Dill From The Eponymous Pickle | March 9, 2013 at 02:26 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Years ago I worked for a company that sold computers, software, terminals and many other things. A terminal salesperson worked out of the same office I did and...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 9, 2013 at 12:46 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 8, 2013 at 10:06 PM
The second edition of Ross Anderson's fantastic book, Security Engineering, is now free online. Required reading for any security engineer.schneier From Schneier on Security | March 8, 2013 at 06:08 PM
After all the terrible controversy and the failed attempts of sabotaging her Kickstarter campaign, Anita Sarkeesian's first episode of her video series on Tropes...Gail Carmichael From The Female Perspective of Computer Science | March 8, 2013 at 04:55 PM
I've really learned to enjoy opera (the art form not the browser) and while I've come to really enjoy Atlanta, the city only has a regional opera company. So IMetropolitan...Lance Fortnow From Computational Complexity | March 8, 2013 at 04:00 PM
If you’re a US citizen, your support for the bipartisan SHIELD Act could strike a decisive blow to patent trolls by making them pay costs if they lose patent actions...Simon Phipps From Wild WebMink | March 8, 2013 at 02:42 PM