From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Taiwan meets Italy this week, in a series of workshops and company visits hosted by Experientia for Taiwanese business people. The 15 chief customer experience...Experientia From Putting People First | September 12, 2013 at 08:49 AM
Back at Northwestern I occasionally taught an undergraduate cryptography class since I was the local expert in the field (a statement not even remotely true atAdvanced...Lance Fortnow From Computational Complexity | September 12, 2013 at 08:38 AM
Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems:
In security, the worst case -- the thing you...schneier From Schneier on Security | September 12, 2013 at 07:05 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
BirdBrain Technologies has announced their intention to lend out 1,000 Finch robots as their contribution to this year's Computer Science Education Week and Code...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 12, 2013 at 06:42 AM
Understanding the experience of using an object depends on understanding the context of use, argues Jeff Doemland in UX Magazine. However, “The prevailing understanding...Experientia From Putting People First | September 12, 2013 at 05:53 AM
An impressive writeup about how companies like McDonald's are attempting to manage customer experience. Can it really be optimized, as they say, when people are...Franz Dill From The Eponymous Pickle | September 11, 2013 at 08:55 PM
This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later. schneier From Schneier on Security | September 11, 2013 at 12:53 PM
One would expect that listening to your customers’ needs and wants is a basic prerequisite for any business active in a competitive industry. It also is understandable...Experientia From Putting People First | September 11, 2013 at 11:06 AM
Last week Joeri van den Steenhoven, attended the How Public Design? conference in Copenhagen, Denmark, which was organized by MindLab, the Danish design lab that...Experientia From Putting People First | September 11, 2013 at 10:53 AM
I review books here from time to time. If you have a book that has anything to do with the content subjects seen here, and want to have it reviewed, contact me...Franz Dill From The Eponymous Pickle | September 11, 2013 at 10:13 AM
The reported inclusion of fingerprint authentication in new iPhones means we will see this approach being used commonly. It is very convenient, but has its limitations...Franz Dill From The Eponymous Pickle | September 11, 2013 at 09:47 AM
Vint Cerf interview on the Age of context. His role as evangelist at at Google, and how the times are changing to adapt in a connected world. " ... “I think...Franz Dill From The Eponymous Pickle | September 11, 2013 at 09:30 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Two interesting and initially unrelated links came across my computer screen in the past couple of days. One was an image that said “Everyone talks about leaving...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 11, 2013 at 08:50 AM
When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...schneier From Schneier on Security | September 11, 2013 at 07:43 AM
In AdAge CMO Strategy What looks to be a rational way to think about e-commerce, as opposed to pure hype. Contains detail about what L'Oreal and competitors...Franz Dill From The Eponymous Pickle | September 10, 2013 at 03:32 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
CSTA members (you are a member right?) should have seen this in their email. The CSTA annual conference is in my humble opinion the single best professional development...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 10, 2013 at 01:30 PM
McKinsey provides a broad report from a survey and much statistics on the topic."Bullish on digital: McKinsey Global Survey resultsCEOs and other senior executives...Franz Dill From The Eponymous Pickle | September 10, 2013 at 12:56 PM
The following is a special contribution to this blog by Keith Marzullo, division director for the National Science Foundation’s (NSF) Division of Computer and Network...Ann Drobnis From The Computing Community Consortium Blog | September 10, 2013 at 11:45 AM
Friend Paul Gillin runs a Big Data Google Plus Hangout on the use of Big Data methods for Midmarket and beyond. The 37 minute stream brings together current users...Franz Dill From The Eponymous Pickle | September 10, 2013 at 09:59 AM
The TSA does not have to tell the truth:
Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request?
Sure, no problem! Evenclassified...schneier From Schneier on Security | September 10, 2013 at 07:55 AM