From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Reported in Mediapost: This seems to be contrary to our own experiences, even overstating how many people actually make lists. Its good to see more research coming...Franz Dill From The Eponymous Pickle | September 14, 2010 at 04:35 PM
Twitter kills the password anti-pattern, but at what cost? Jon Udell argues that the switch to OAuth comes at the cost of a loss of flexibility and the potential...Simon Phipps From Wild WebMink | September 14, 2010 at 02:30 PM
Commons Law – ComputerworldUK.com Great to see UK open source law expert Andrew Katz is now blogging on the (steadily expanding) open source blog at ComputerWorldUK...Simon Phipps From Wild WebMink | September 14, 2010 at 01:18 PM
Twitter kills the password anti-pattern, but at what cost? Jon Udell argues that the switch to OAuth comes at the cost of a loss of flexibility and the potential...Simon Phipps From Wild WebMink | September 14, 2010 at 12:05 PM
Suppose you happen to have $150 million burning in your pocket that you want to use to help the theoretical computer science community ($150 million endowed will...Lance From Computational Complexity | September 14, 2010 at 11:30 AM
The Day Zero event of the Intel Developer Forum started off with a presentation by Intel Fellow (and anthropologist) Genevieve Bell who is now also the head of...Experientia From Putting People First | September 14, 2010 at 10:18 AM
Canadian newspaper The Globe and Mail has published an extensive, three-part interview that Chad Sapieha conducted with Microsoft Principal Researcher (and fellow...Experientia From Putting People First | September 14, 2010 at 08:53 AM
Not only are many unconcerned about strangers overhearing cellphone calls, we purposely broadcast our personal business on Facebook and Twitter. Sharon Jayson reports...Experientia From Putting People First | September 14, 2010 at 08:45 AM
Human-Computer Interaction for Development: The Past, Present, and Future Research article by Melissa R. Ho (University of California, Berkeley), Thomas N. Smyth...Experientia From Putting People First | September 14, 2010 at 08:20 AM
My essay on Community Types is now available in the Essays section of the site. It defines what I mean by terms like “co-developer” and “deployer-developer” when...Simon Phipps From Wild WebMink | September 14, 2010 at 07:30 AM
We talked to several office furniture and space manufacturers and they were all looking at the possibility of making work surfaces, walls and even floors into interactive...Franz Dill From The Eponymous Pickle | September 14, 2010 at 07:05 AM
Interested in Digital Media & Learning? Well, the 2011 Digital Media & Learning Conference is looking for some interesting talks, papers, and sessions. They’ve...zephoria From Apophenia | September 13, 2010 at 09:13 PM
In the latest Communications of the ACM: Computers in Patient Care: Why has progress been so slow?. A good readable article that includes a good narrative about...Franz Dill From The Eponymous Pickle | September 13, 2010 at 08:01 PM
Wal-Mart has branded its own wireless plan. " ... it is introducing the first cell phone plan that uses the chain's own branding, further demonstrating its clout...Franz Dill From The Eponymous Pickle | September 13, 2010 at 07:53 PM
I see that the exciting temporal search engine 'Recorded Furture' has added full text search to its premium interface. A very nice ability, which makes you depend...Franz Dill From The Eponymous Pickle | September 13, 2010 at 06:04 PM
As is obvious, mobile users do not like Ads with their mobile Apps. As in the early days of the Web until now, they will accept them for the right value trade off...Franz Dill From The Eponymous Pickle | September 13, 2010 at 02:54 PM
Charlene Li, always interesting, on the what she calls the rise of social commerce. Which will be talked about at an upcoming meeting.Franz Dill From The Eponymous Pickle | September 13, 2010 at 02:29 PM
Kenzero is a Japanese Trojan that collects and publishes users' porn surfing habits, and then blackmails them to remove the information.
schneier From Schneier on Security | September 13, 2010 at 11:46 AM
I am of the age where many of my friends are having kids and so I’ve been exposed to more conversations about what to name one’s child than I ever could’ve imagined...zephoria From Apophenia | September 13, 2010 at 11:29 AM