From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Local company ThinkVine, who I have have talked to now for a number of years, has been a leader in marketing mix and promotion analysis work,using unique simulation...Franz Dill From The Eponymous Pickle | September 23, 2011 at 04:20 PM
For those of you wondering what the heck I've been up to lately research-wise, wonder no longer! Here's a snapshot of what I've been working on lately and planCognitive...Gail Carmichael From The Female Perspective of Computer Science | September 23, 2011 at 02:56 PM
In E-Commerce Times: A good look at what is called marketing automation. Is it science or not? Or just a way to push for attention.Franz Dill From The Eponymous Pickle | September 23, 2011 at 02:27 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the big issues with computer science education is that it is not an integral part of the curriculum It is almost always an elective and doesnAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 23, 2011 at 01:55 PM
Getting closer to practical computing. " ... Physicists find quantum versions of both feedback control and classical computer architecture ... " Franz Dill From The Eponymous Pickle | September 23, 2011 at 01:54 PM
Bill has a lot of posts where he questions whether to teach Mahaney's theorem in a graduate complexity class. Since it is one of my favorite theorems and most of...Lance From Computational Complexity | September 23, 2011 at 01:07 PM
The National Science Foundation has issued a solicitation for its East Asia and Pacific Summer Institutes (EAPSI), providing U.S. science and engineering graduate...Erwin Gianchandani From The Computing Community Consortium Blog | September 23, 2011 at 12:21 PM
We all know that teen bullying – both online and offline – has devastating consequences. Jamey Rodemeyer’s suicide is a tragedy. He was tormented for being gay....zephoria From Apophenia | September 23, 2011 at 11:21 AM
On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...schneier From Schneier on Security | September 23, 2011 at 11:17 AM
This proposal is worth thinking about.
Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...schneier From Schneier on Security | September 23, 2011 at 10:22 AM
Just received from notable gamification vendor Bunchball. Some nice ideas embedded here, and where better to try gamification than with a heavily extroverted...Franz Dill From The Eponymous Pickle | September 23, 2011 at 08:27 AM
Khoi Vinh reflects on the fact (and the user experience) that almost everything on all of his computers and all of his mobile devices can only be accessed with...Experientia From Putting People First | September 23, 2011 at 06:26 AM
The internet of things and yet another revolution The “internet of things” is viewed as the next big thing, but when will it allow people to create their own stuff...Experientia From Putting People First | September 23, 2011 at 05:26 AM
Dr. Robert Schnabel, Dean of the School of Informatics at the University of Indiana and Chair of ACM’s Education Policy Committee, testified before the House Research...David B. From U.S. Public Policy Committee of the ACM | September 23, 2011 at 03:27 AM
In CACM: Computational Journalism: How computer scientists can empower journalists, democracy's watchdogs, in the production of news in the public interest ......Franz Dill From The Eponymous Pickle | September 22, 2011 at 07:04 PM
This uses a simple check-in loyalty model at Wal-Mart and Sam's. A collaboration with Unilever. " ... Unlike most location-based apps, Check In To Win focuses...Franz Dill From The Eponymous Pickle | September 22, 2011 at 04:02 PM
The Defense Advanced Research Projects Agency (DARPA), Intelligence Advanced Research Projects Activity (IARPA), and National Institutes of Health (NIH)Erwin Gianchandani From The Computing Community Consortium Blog | September 22, 2011 at 01:06 PM
The long-standing ANZUS military treaty now includes cyberspace attacks:
According to Reuters, the decision was made in discussions between the two countries this...schneier From Schneier on Security | September 22, 2011 at 12:09 PM
In CGT, an excellent and fairly detailed article on Procter & Gamble's development of the virtual store concept within it's innovation centers. The first time...Franz Dill From The Eponymous Pickle | September 22, 2011 at 04:23 AM