From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The physical environment in which a service plays out has a significant influence on the experience of a service. So it’s not uncommon for service design projects...Experientia From Putting People First | June 19, 2013 at 05:23 AM
A new Ericsson ConsumerLab report, Unlocking Consumer Value, identifies the needs of today’s smartphone and mobile internet users. “The rapid uptake of smartphones...Experientia From Putting People First | June 19, 2013 at 05:15 AM
Looking a several projects that aim to deliver information to small executive groups. Mobile is esential. The question is what are the likely formats of theNow...Franz Dill From The Eponymous Pickle | June 19, 2013 at 01:38 AM
The government clearly wishes to be seen to be doing something about the issues of children viewing pornography and of child pornography. To this end they have called...Simon Phipps From Wild WebMink | June 18, 2013 at 10:16 PM
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...schneier From Schneier on Security | June 18, 2013 at 09:00 PM
I am sometimes asked why I think stories in games need to improve. Considering I'm studying nonlinear stories in games for my PhD project, I was for a long time...Gail Carmichael From The Female Perspective of Computer Science | June 18, 2013 at 06:49 PM
Just announced. A further indication of movement of more data gathering and integrating companies moving towards the use of stronger predictive analytics.  ...Franz Dill From The Eponymous Pickle | June 18, 2013 at 06:09 PM
Former colleague Sandra Hughes, For a time chief privacy office of Procter & Gamble, has just set up a blog: Sandra Hughes Strategies. Check it out. She does...Franz Dill From The Eponymous Pickle | June 18, 2013 at 04:57 PM
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...schneier From Schneier on Security | June 18, 2013 at 04:02 PM
In Fast Company: Stories simplify, integrate complex things into an understandable thread, engage. That includes data and analytics, but is not often done well...Franz Dill From The Eponymous Pickle | June 18, 2013 at 02:38 PM
Excellent overview piece on the topic, which makes the point that the business process must be woven into the quantifications and visuals, a favorite topic of...Franz Dill From The Eponymous Pickle | June 18, 2013 at 02:24 PM
In the HBR: Data needs to be gathered, understood, communicated and embedded in the decision process. You need quant people to make this happen. This article"...Franz Dill From The Eponymous Pickle | June 18, 2013 at 01:36 PM
The Computing Community Consortium (CCC) sponsored the Simons Institute Symposium on Visions of the Theory of Computing. The three-day symposium brought together...Ann Drobnis From The Computing Community Consortium Blog | June 18, 2013 at 01:12 PM
Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just...schneier From Schneier on Security | June 18, 2013 at 11:57 AM
In anticipation of Google's Reader RSS shut down in a couple of weeks I have moved to the free Feedly service. Both as an App and in Chrome. Works well, and...Franz Dill From The Eponymous Pickle | June 17, 2013 at 11:12 PM
Code.Org has just released a new video promoting computer science that may be especially effective for creating broader public awareness among policy leaders and... From Computer Science Teachers Association | June 17, 2013 at 09:24 PM
If you meet a stranger, the probability that he will have the same birth date as yourself is probably less than 1%. It is roughly 1/365 if you make simplifying...Daniel Lemire From Daniel Lemire's Blog | June 17, 2013 at 07:31 PM
For each of these, are they frauds?
The Turk was a chess playing ``computer'' (around 1770) that was later discovered to be cheating--- a human made the moves...GASARCH From Computational Complexity | June 17, 2013 at 07:18 PM
A good Adage Article on how the revelations of massive private data leaks could make the EU further tighten data privacy. What does this mean and and what are the...Franz Dill From The Eponymous Pickle | June 17, 2013 at 07:03 PM
June 18 Hearing: The Senate Commerce, Science and Transportation Committee will hold a hearing on the nominee to head the Federal Communications Commission, Thomas...David B. From U.S. Public Policy Committee of the ACM | June 17, 2013 at 06:15 PM