From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I worked for some time on using business analytics methods to create coffee flavors. Here CBS 60 Minutes talks about creating flavors. As might be expected...Franz Dill From The Eponymous Pickle | November 30, 2011 at 07:50 PM
After working for a number of years as a commercial programmer, I decided to become a teacher here in New Zealand. As part of my teacher training, I had to chose... From Computer Science Teachers Association | November 30, 2011 at 07:23 PM
Google giving business tours. Stepping inside from just giving the street view. I like the general idea.Franz Dill From The Eponymous Pickle | November 30, 2011 at 07:09 PM
I mentioned in a previous post P&G building virtual retail spaces and using this idea to better understand the shopping consumer. Now an article about how they...Franz Dill From The Eponymous Pickle | November 30, 2011 at 06:37 PM
The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology:
The virus...schneier From Schneier on Security | November 30, 2011 at 06:28 PM
I recently met with Brian Moon of Perigean Technology, practitioner of the what is called 'Concept Mapping', an advanced form of what is also called mind mapping...Franz Dill From The Eponymous Pickle | November 30, 2011 at 01:27 PM
Two relevant challenges announced recently that are placing emphasis on prize-based innovation: DEBUT Challenge (for undergraduate students): The National Institute...Erwin Gianchandani From The Computing Community Consortium Blog | November 30, 2011 at 01:12 PM
I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied:
But others inside the American intelligence...schneier From Schneier on Security | November 30, 2011 at 12:57 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I had the following question via Twitter the other day Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 30, 2011 at 12:47 PM
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves...schneier From Schneier on Security | November 29, 2011 at 08:13 PM
Steve Sands of SandsResearch reports on neuromarketing activity in China. The link below constains considerable detail: It's the fastest growing market and neuromarketing's...Franz Dill From The Eponymous Pickle | November 29, 2011 at 06:16 PM
I like doing things artfully, but I always prioritize being able to objectively understand and interact with data first beyond sheer 'Form'. Nevertheless the following...Franz Dill From The Eponymous Pickle | November 29, 2011 at 05:53 PM
Apache has been criticised for preventing new Incubator projects using Git. In its defence, some have claimed this is a criticism of the idea of the Foundation....Simon Phipps From Wild WebMink | November 29, 2011 at 04:12 PM
Gamification is certainly a hot topic these days. Jesse Schell opened Pandora's Box with his Visions of the Gamepocalypse talk. Sebastian Deterding discussedpromises...Gail Carmichael From The Female Perspective of Computer Science | November 29, 2011 at 04:06 PM
From The Computing Community Consortium Blog
An interesting computer security research result making news this morning — and stirring some controversy — courtesy of msnbc.com: Could a hacker from half-way...Erwin Gianchandani From The Computing Community Consortium Blog | November 29, 2011 at 01:11 PM
Electronic surveillance is becoming so easy that even marketers can do it:
The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...schneier From Schneier on Security | November 29, 2011 at 01:01 PM
Aileen Lee, partner at venture firm Kleiner Perkins Caufield & Byers, believes that the best way to cost-effectively attract valuable users is harnessing a concept...Experientia From Putting People First | November 29, 2011 at 09:54 AM