From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I saw this post about IBM's first personal computer, not the consumer PC, but the IBM 5150. In 1981 we received a loaner from IBM. One ended up in our Chairman's...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:56 PM
This seems like a really bad idea:
...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...schneier From Schneier on Security | August 12, 2011 at 02:46 PM
MJ Perry on US consumer spending on goods made in China. Less than 2%. Surprising that it is so low.Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:43 PM
Is it more fun to shop online in 3D rather than 2D? I experimented with this concept in the seminal virtual community Second Life, and found it less than satisfying...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:32 PM
Interesting development I was late to:
" ... Creating a social network is so last week. Today, American Express is unveiling a social media platform called "Link...Franz Dill From The Eponymous Pickle | August 12, 2011 at 02:29 PM
Wolfram's blog has a long post on Computable Document Format (CDF) which explains it nicely. Now experimentally built into WolframAlpha. The idea of having a...Franz Dill From The Eponymous Pickle | August 12, 2011 at 04:46 AM
The Gordon and Betty Moore Foundation has just announced a Request for Ideas (RFI) about Data Intensive Science: The increasing volume and complexity of scientific...Erwin Gianchandani From The Computing Community Consortium Blog | August 12, 2011 at 01:43 AM
Just starting to read: Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade us to Buy by Martin Lindstrom. To be available September 20. Have...Franz Dill From The Eponymous Pickle | August 12, 2011 at 12:48 AM
Below is a list of items with policy relevance from the May issue of Communications of the ACM. As always, much of the material in CACM is premium content, and...David B. From U.S. Public Policy Committee of the ACM | August 11, 2011 at 10:17 PM
The esteemed Mayo Clinic is opening a retail outlet at the Mall of America. In MJ Perry's blog.Franz Dill From The Eponymous Pickle | August 11, 2011 at 06:26 PM
Jonathan Salem Baskin on innovation at P&G. Is P&G succeeding because of innovative branding, or because of functional innovation? I have certainly seen both...Franz Dill From The Eponymous Pickle | August 11, 2011 at 05:19 PM
In ReadWriteWeb: The way to address this is to have the process have the ability to adapt to changes. That can and has been done. It does not need AI, just...Franz Dill From The Eponymous Pickle | August 11, 2011 at 04:47 PM
How Macy's uses predictive analytics. Visualization and other techniques. " ... The machinery of predictive analytics is only as good as the human-engineered...Franz Dill From The Eponymous Pickle | August 11, 2011 at 04:39 PM
Given two arrays, say (1,2,3,4) and (4,3,1,5), their scalar product is simply the sum of the products: 1 Daniel Lemire From Daniel Lemire's Blog | August 11, 2011 at 02:28 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
A blog post by Andy Firth, an Engineer Architect at Bungie, called The demise of the low level Programmer is getting some attention lately. In the post he lists...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 11, 2011 at 02:07 PM
Last week, my wife and I took a vacation to the Caribbean on the biggest cruise ship there is. I like cruising, just relaxing, swimming, reading, eating, drinking...Lance From Computational Complexity | August 11, 2011 at 01:42 PM
Apple, publishers conspired against $9.99 Amazon e-books, says lawsuit It's not enough to be the richest company in the world. Everyone else has to fail as well...Simon Phipps From Wild WebMink | August 11, 2011 at 01:02 PM
I have now been a long time user of Wifi in the wild and note the many ways that it is applied. In some cases simply, in other places logging you out periodically...Franz Dill From The Eponymous Pickle | August 11, 2011 at 10:48 AM