From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Donald Norman ’s recent essay Technology First, Needs Last, in which he argues that “design research is great when it comes to improving existing product categories...Experientia From Putting People First | December 10, 2009 at 07:23 AM
You may have heard on the news that the TSA (temporarily) put up their Screening Management Standard Operating Procedure on the web. As pointed out on this blog...Michael Mitzenmacher From My Biased Coin | December 10, 2009 at 04:37 AM
Re-Discovered: Managing Business Complexity: Discovering Strategic Solutions with Agent-Based Modeling and Simulation by Michael J. North and Charles M. Macal ....Franz Dill From The Eponymous Pickle | December 10, 2009 at 03:59 AM
Sally Satel, MD, is a resident scholar at the American Enterprise Institute. She comments on On neuromarketing in Forbes.Franz Dill From The Eponymous Pickle | December 9, 2009 at 09:38 PM
Schmidt said:
I think judgment matters. If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really...schneier From Schneier on Security | December 9, 2009 at 06:22 PM
(The 17x17 problem has gotten far wider attention than I imagined--- Brian Hayes
posted it on his website: here,
and its also
here
and
here.
The last website is...GASARCH From Computational Complexity | December 9, 2009 at 05:08 PM
From Flowingdata: How to make an interactive area chart, like the name voyager from the Baby Name Wizard by Martin Wattenberg. See the example on the right that...Franz Dill From The Eponymous Pickle | December 9, 2009 at 02:58 PM
In Run-length encoding (part 1), I presented the various run-length encoding formats. In part 2, I discussed the coding of the counters. In this third part, I want...Daniel Lemire From Daniel Lemire's Blog | December 9, 2009 at 02:05 PM
Cennydd Bowles, a user experience designer at Clearleft in Brighton, England, writes about interaction design, behavioural change, and the design of emotions.
“If...Experientia From Putting People First | December 9, 2009 at 01:04 PM
This, from The New England Journal of Medicine, sounds familiar:
This is the story line for most headline-grabbing illnesses schneier From Schneier on Security | December 9, 2009 at 12:43 PM
How stranger danger changed the way children play
Strong, sad story that's worth reading. Given the effects are so systemic and...webmink From Wild WebMink | December 9, 2009 at 12:09 PM
Meena Kadri reports on how lunch and laundry delivery in Mumbai – known as the Dabbawalla and Dhobi Ghat services Experientia From Putting People First | December 9, 2009 at 10:58 AM
From Global standards body GS1, the concept of extended packaging allows the consumer to gather unlimited information from packaging via devices. For example a...Franz Dill From The Eponymous Pickle | December 8, 2009 at 11:16 PM
In an interesting development, P&G has decided to sell its Tide-Swash cleansing products online only. We visited their OSU - Columbus innovation store two years...Franz Dill From The Eponymous Pickle | December 8, 2009 at 08:28 PM
A video interview of John Nash, game theory theorist, nobelist, and subject of the fictionalized movie: A Beautiful Mind.Franz Dill From The Eponymous Pickle | December 8, 2009 at 08:02 PM
I started writing this entry while thinking about the "if you have nothing to hide, then you have nothing to fear" fallacy. What do you say to someone who says...Pascal Meunier From CERIAS Blog | December 8, 2009 at 07:16 PM
A little over a month ago, I wrote about the U.S. Congress passing a resolution designating the first week of December as Computer Science Education Week. As far... From Computer Science Teachers Association | December 8, 2009 at 05:25 PM
The debacle of the leaked emails, data and code from the University of East Anglia showed that reputed global warming scientists were petty and cheaters. As always...Daniel Lemire From Daniel Lemire's Blog | December 8, 2009 at 04:51 PM
After a talk on derandomization at Midwest Theory Day, someone asked if those techniques could also be used in quantum computing.
In classical randomness under ...Lance From Computational Complexity | December 8, 2009 at 04:05 PM
I recently attended a workshop put on by our school's career services department about making an academic portfolio. Now that I'm a PhD student, I really wantcurrent...Gail Carmichael From The Female Perspective of Computer Science | December 8, 2009 at 02:22 PM