From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The first day of SIGIR 2010 ended with a monster poster session–over 100 posters to see in 2 hours in a hall without air conditioning! I managed to see a handful...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 07:19 AM
I’ve always felt that parallel conference sessions are designed to optimize for anticipated regret, and SIGIR 2010 is no exception. I decided that I’d try to attend...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 07:08 AM
As promised, here are some highlights of the SIGIR 2010 conference thus far. Also check out the tweet stream with hash tag #sigir2010. I arrived here on Monday,...Daniel Tunkelang From The Noisy Channel | July 21, 2010 at 06:44 AM
Always innovative retailer Wegmans has set up a blog contributed by employees. Worth a look.Franz Dill From The Eponymous Pickle | July 21, 2010 at 03:03 AM
Growing up as a white girl in Pennsylvania, I was taught that being tan was beautiful. My wealthier classmates would go on vacations to Florida in the winter,...zephoria From Apophenia | July 21, 2010 at 12:00 AM
Two interesting research papers on website password policies.
"Where Do Security Policies Come From?":
Abstract: We examine the password policies of 75 different...schneier From Schneier on Security | July 20, 2010 at 06:52 PM
In GigaOM: Image search in Google has improved their user interface to allow you to see many more images per search. They have a reported ten billion images accessible...Franz Dill From The Eponymous Pickle | July 20, 2010 at 06:21 PM
Sponsored by Nokia, The ideas Project is a selection of video presentation by mostly well-known pundits in the area of communications and information tech. If they...Franz Dill From The Eponymous Pickle | July 20, 2010 at 05:55 PM
As you may know, my research focus for my PhD is educational games and augmented reality. But what is this educational games stuff all about, anyway? Do video games...Gail Carmichael From The Female Perspective of Computer Science | July 20, 2010 at 05:25 PM
I very much enjoyed the reflection of Lee Bryant (Headshift), following the launch of the UK Government’s Big Society initiative. In it, he argues that in the past...Experientia From Putting People First | July 20, 2010 at 04:11 PM
Oscar Berg reflects on the changing role of intranets in knowledge-intensive businesses. “These intranets need to provide flexible access to both information and...Experientia From Putting People First | July 20, 2010 at 03:56 PM
Video from HBR on the Nokia Ideas project. This was something we explicitly intended to do with the creation of innovation centers. First to read realistic contexts...Franz Dill From The Eponymous Pickle | July 20, 2010 at 01:44 PM
Rotten to the (Open) Core? Dave Neary's thorough analysis of the problem with open core is right on the nail. (tags: OpenCore OpenSource) Opening The Rackspace...Simon Phipps From Wild WebMink | July 20, 2010 at 12:08 PM
From the U.S. Government Accountability Office: "Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development." Thirty-six pages; I haven't...schneier From Schneier on Security | July 20, 2010 at 11:43 AM
Amazon reports in the NYT that E-book sales for books have exceeded hardcover sales. To be clear E-books sales have not exceeded all book sales, which include softcover...Franz Dill From The Eponymous Pickle | July 20, 2010 at 02:07 AM
Today at the biennial Snowbird Conference, Jan Cuny (NSF), Owen Astrachan (U. of Virginia), and Larry Snyder (U. Washington) gave an inspiring talk about a new...Ran Libeskind-Hadas From The Computing Community Consortium Blog | July 20, 2010 at 12:51 AM
Have followed WolframAlpha for a while. Key is having the right data to support a query. Sometimes it is there an sometimes not. the new introduction of Data for...Franz Dill From The Eponymous Pickle | July 19, 2010 at 09:30 PM
From Wired News:
The four Wiseguy defendants, who also operated other ticket-reselling businesses, allegedly used sophisticated programming and inside information...schneier From Schneier on Security | July 19, 2010 at 06:11 PM
Earlier, I asked whether integer addition was faster than bitwise exclusive or. My tests showed no difference, and nobody contradicted me. However, everyone knows...Daniel Lemire From Daniel Lemire's Blog | July 19, 2010 at 05:09 PM