From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In a survey by Aislebuyer. " ... 57% of shoppers said retailers that use mobile devices instead of cash registers are more appealing, even though only 22% have...Franz Dill From The Eponymous Pickle | March 27, 2012 at 03:20 PM
Most database research papers use synthetic data sets. That is, they use random-number generators to create their data on the fly. A popular generator is dbgen...Daniel Lemire From Daniel Lemire's Blog | March 27, 2012 at 03:07 PM
(REMINDER- IF you are a STUDENT who wants to GOTO STOC 2012 but needs money to go
then you should GOTO the STOC 2012 homepage and click on Travel Support.
Deadline...GASARCH From Computational Complexity | March 27, 2012 at 02:50 PM
"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti:
Abstract: In recent years, a large number of data breaches...schneier From Schneier on Security | March 27, 2012 at 12:24 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I finished up last week with a trip to Western New England University where they were running a high school programming contest. I love these events because I think...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 27, 2012 at 09:56 AM
Please stop sending .DOC or .DOCX files as attachments to your e-mails. There is a better way. Send editable PDFs. I explain how in ComputerWorldUK today.Simon Phipps From Wild WebMink | March 27, 2012 at 09:29 AM
What happens when designers & manufacturers discuss the workplace & social media? Dexigner reports that IIDA has published a whitepaper summary of the IIDA Industry...Experientia From Putting People First | March 27, 2012 at 09:02 AM
Our tech saturation has reached such a critical point that some experts say it’s rewiring our brains. Research psychologist and computer educator Larry Rosen of...Experientia From Putting People First | March 27, 2012 at 08:57 AM
Who are these companies and what do they want from me? Alexis Madrigal’s voyage into the invisible business that funds the web. “This morning, if you opened your...Experientia From Putting People First | March 27, 2012 at 08:25 AM
For some time now it has been common to see Wikipedia results to come up on page 1 of a Google search. Search Engine Watch looks at a number of studies that...Franz Dill From The Eponymous Pickle | March 26, 2012 at 11:25 PM
[This post is only useful to people who can buy MP3s from Amazon US - sorry] I have previously recommended samplers from Mishara Music. They specialise in singer...Simon Phipps From Wild WebMink | March 26, 2012 at 08:53 PM
I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...schneier From Schneier on Security | March 26, 2012 at 06:02 PM
March 27 Hearing: The Technology and Innovation Subcommittee of the House Science, Space and Technology Committee will hold a hearing on the effect of federal policies...David B. From U.S. Public Policy Committee of the ACM | March 26, 2012 at 05:39 PM
In the Edge: George Dyson on self-replicating codes, the universe .... and strangely, on advertising. Or more generally as I see it 'selling' ..." ... What's...Franz Dill From The Eponymous Pickle | March 26, 2012 at 04:43 PM
I’ve been trying to work through some ideas on how fear operates in a networked society. At Webstock in New Zealand, I gave a talk called “Culture of Fear + Attention...zephoria From Apophenia | March 26, 2012 at 02:52 PM
In the CACM: Somewhat Technical, but some valuable insights: " ... Surveying a suite of algorithms that offer a solution to managing large document archives...Franz Dill From The Eponymous Pickle | March 26, 2012 at 02:08 PM
Good general piece in CIO about getting ready for Big Data. Companies will increasingly need to leverage the data within their own domains and lead rather than...Franz Dill From The Eponymous Pickle | March 26, 2012 at 01:48 PM
What is an elegant proof?
I do not know and I doubt it can be well defined; however,
we all know it when we see it.
I welcome comments on the topic; however, Ihere...GASARCH From Computational Complexity | March 26, 2012 at 01:15 PM
What is the big idea of Associative intelligence? In a back of the envelope exploration, Saffron Tech presents the idea. It is an important one. How do we save...Franz Dill From The Eponymous Pickle | March 26, 2012 at 01:06 PM