From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Experientia partner Mark Vanderbeeken will be giving a talk tomorrow at 6 pm, as a part of the Digital Anthropology MSc course at University College London (UCL)...Experientia From Putting People First | March 1, 2011 at 08:08 PM
I see that neuromarketing company: BuyologyInc has a new website. I have done consulting work with them in the past. Much better done and more informative site than...Franz Dill From The Eponymous Pickle | March 1, 2011 at 07:45 PM
Liked this NYT article: Moonlighting Within Microsoft, in Pursuit of New Apps Admittedly it would work best in the technical enterprise, where you can slice off...Franz Dill From The Eponymous Pickle | March 1, 2011 at 06:54 PM
An example of gestural interactivity with a screen in store. We examined early attempts at this kind of interaction on the store shelf. This appears to be increasing...Franz Dill From The Eponymous Pickle | March 1, 2011 at 04:08 PM
It is surprising that this kind of location based promotion service was not launched sooner. Readwriteweb posts a good overview: ' ... The difference between ...Franz Dill From The Eponymous Pickle | March 1, 2011 at 01:41 PM
"Reliably Erasing Data From Flash-Based Solid State Drives," by Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson.
Abstract: Reliably erasing...schneier From Schneier on Security | March 1, 2011 at 12:29 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Looking through the list of domain names I’ve acquired over the years, I realised I had a couple that weren’t well used that could be handy for people who want...Simon Phipps From Wild WebMink | March 1, 2011 at 10:00 AM
I am part of the organisation that trains and selects students to represent New Zealand at the International Olympiad in Informatics (IOI). We attract some government... From Computer Science Teachers Association | March 1, 2011 at 01:33 AM
I was reminded again today of the official Google CPG blog. A post this month tells us the insights gleaned in 2010.Franz Dill From The Eponymous Pickle | February 28, 2011 at 10:11 PM
From Michael Nielsen
I was recently asked to prepare a two minute talk on a topic of my choice, for a small audience of about 10 people. HereMichael Nielsen From Michael Nielsen | February 28, 2011 at 07:55 PM
The focus on digital video is interesting:In Adage: Can Digital Marketing Rekindle Growth at Reckitt Benckiser?Marketing Chief Jiri Kulik Plans to Remain Biggest...Franz Dill From The Eponymous Pickle | February 28, 2011 at 05:53 PM
Good piece in the HBR on the complexities of using co-creation. " ... But what is co-creation, really, and how do you do it right? Co-creation involves working...Franz Dill From The Eponymous Pickle | February 28, 2011 at 03:41 PM
In a
prior post
I pondered if there was interesting MATH that relates to the
Unexpected Hanging Paradox.
At the time none of the comments really had any and, alas...GASARCH From Computational Complexity | February 28, 2011 at 03:22 PM
When designing an information system, a piece of software or a law, experts work from a model. This model must have boundaries. When these boundaries are violated...Daniel Lemire From Daniel Lemire's Blog | February 28, 2011 at 03:18 PM
March 2
Meeting
The Information Security and Privacy Advisory Board will hold one of its periodic meetings.
8:30 a.m., Homewood Suites by Hilton, 1475 Massachusetts... From U.S. Public Policy Committee of the ACM | February 28, 2011 at 02:28 PM
Lots of interesting posts by computer science teachers last week. And some news from various sources to share. But letAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 28, 2011 at 10:37 AM
One of the effects of writing a book is that I don't have the time to devote to other writing. So while I've been wanting to write about Anonymous vs HBGary, I...schneier From Schneier on Security | February 28, 2011 at 09:13 AM