From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I've already written about secret questions, the easier-to-guess low-security backup password that sites want you to have in case you forget your harder-to-remember...schneier From Schneier on Security | September 8, 2011 at 11:14 AM
One of the great accomplishments of the 19th century was the electric motor. Converting electrical energy to controllable mechanical energy. Now a single molecule...Franz Dill From The Eponymous Pickle | September 8, 2011 at 05:55 AM
In Junk Charts they illustrate one of my favorite examples of poor data visualization. It is the use of bar charts without using scales that start at zero. This...Franz Dill From The Eponymous Pickle | September 8, 2011 at 05:42 AM
This is now live. Have not tried it yet, but plan to. Need a reworking of my blog format and capabilities.Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:46 AM
Grow from Within: Mastering Corporate Entrepreneurship and Innovation by Robert Wolcott and Michael Lippitz. Now on my stack of things to read. Recently heard...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:40 AM
Some excellent examples of the use of the Statistical/visualization/data mining language R for a number of real applications. Have started to use it more myself...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:21 AM
When I posted on sequence problems
here
some people said that they did not have unique answers.
Many problems FORMALLY do not have a unique answer, but common sense...GASARCH From Computational Complexity | September 7, 2011 at 11:58 PM
In Mediapost: More must be more done to quantify how neuromarketing results are used. What are useful metrics?Franz Dill From The Eponymous Pickle | September 7, 2011 at 10:46 PM
A paper by six Googlers from the recent KDD 2011 conference, "Detecting Adversarial Advertisements in the Wild" (PDF) is a broadly useful example of how to succeed...Greg Linden From Geeking with Greg | September 7, 2011 at 09:00 PM
Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...schneier From Schneier on Security | September 7, 2011 at 07:32 PM
Following up on my general impressions of SIGGRAPH I wanted to write about a few of the games paper presentations I enjoyed seeing at the conference. I paid most...Gail Carmichael From The Female Perspective of Computer Science | September 7, 2011 at 06:49 PM
Interesting article on how difficult it is to keep an identity secret in the information age. schneier From Schneier on Security | September 7, 2011 at 11:17 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
IF you missed it live (like I did) you can now view the recording of the Windows Phone Mango Jump Start training on Channel 9. I borrowed these direct links from...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 7, 2011 at 09:34 AM
Through Stanford University lectures and a project, coordinated by Scott Klemmer, learn the fundamentals of human-computer interaction and design thinking. The...Experientia From Putting People First | September 7, 2011 at 08:25 AM
A couple of videos sent to me that illustrate the topics in Martin Lindstrom's forthcoming book: Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade...Franz Dill From The Eponymous Pickle | September 7, 2011 at 04:58 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Labor Day in the US means a three-day weekend and I took advantage of it. I’d like to make note of a couple of my recent posts that seem to have more in common...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 7, 2011 at 03:39 AM
Thoughtful piece, a great place to start thinking about why you should manage information at all:The Path to Information Management NirvanaSimilar to MaslowFranz Dill From The Eponymous Pickle | September 6, 2011 at 11:37 PM
In GigaOM. "Marketers have long believed that some customers have a disproportionate influence on others when it comes to purchase decisions, and they have tried...Franz Dill From The Eponymous Pickle | September 6, 2011 at 11:06 PM
New research: Adrian J. Lee and Sheldon H. Jacobson (2011), "The Impact of Aviation Checkpoint Queues on Optimizing Security Screening Effectiveness," Reliability...schneier From Schneier on Security | September 6, 2011 at 08:29 PM