From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the WSJ: A balanced review of correspondent Sally Satel and Scott Lilienfeld's book: Brainwashed: The Seductive Appeal of Mindless Neuroscience.Franz Dill From The Eponymous Pickle | June 14, 2013 at 07:11 PM
In Mediapost, Elissa Moses posts a good introduction about a number of non conscious methods and their use in marketing analysis. For a largely contrary critical...Franz Dill From The Eponymous Pickle | June 14, 2013 at 06:58 PM
It's amazing how many people fail to realize that computing can be a creative field. In fact, in many cases, it has to be! For example, it makes no sense for me...Gail Carmichael From The Female Perspective of Computer Science | June 14, 2013 at 05:39 PM
On April 1, I announced the Sixth Annual Movie Plot Threat Contest:
I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...schneier From Schneier on Security | June 14, 2013 at 05:20 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Wow! Free computers. Hard to ignore that one. If you are heading out to San Antonia for ISTE 2013 Microsoft has a deal for you. They are giving away free Microsoft...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 14, 2013 at 04:01 PM
I mentioned some time ago visiting a new Microsoft Store in the local mall. Located very close to the Apple store, which had been around for a couple of years....Franz Dill From The Eponymous Pickle | June 14, 2013 at 04:01 PM
Kroger and GS1 are beginning a three year Project Mercury effort to synchronize data. A key element of running any large, complex retail operation. " ... Under...Franz Dill From The Eponymous Pickle | June 14, 2013 at 03:38 PM
Researchers at Lawrence Berkeley National Laboratory and Northwestern University have conducted a study and found that moving common applications to the cloud can...Ann Drobnis From The Computing Community Consortium Blog | June 14, 2013 at 02:51 PM
An intriguing article on the employment of genius. By their carefully limiting definition. Seen this effect relatively often. Genius does not always combine...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:35 PM
In IEEE Spectrum: Cisco and iRobot working to produce a telepresence robot. Conceptually an appealing idea, but I wonder about the practicality before robotic...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:04 PM
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
In Industry Week:" ... Supply chain managers adopt new strategies to mitigate risks Research has shown that major interruptions in the supply chain can sap a company's...Franz Dill From The Eponymous Pickle | June 14, 2013 at 02:39 AM
From Tableau Software: Major global retailer on the use of visualization: " ... Tesco uses Teradata to warehouse their supply and inventory data. They've got...Franz Dill From The Eponymous Pickle | June 14, 2013 at 01:26 AM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM
Last weekend I took my teenage daughters to see The Internship, the Vince Vaughn-Owen Wilson vehicle where they play two forty-year old interns at Google. It basically...Lance Fortnow From Computational Complexity | June 13, 2013 at 07:32 PM
Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...schneier From Schneier on Security | June 13, 2013 at 04:34 PM
The FCC Emergency Access Advisory Committee (EEAC) will meet tomorrow, Friday, June 14, from 10:30 am to 3:30 pm EDT, to discuss the technologies and protocols...Renee Dopplick From U.S. Public Policy Committee of the ACM | June 13, 2013 at 04:22 PM
Though there is starting to be some serious competition at the edges, Television continues to be a very big means of one to many conversation. Ars Technica has...Franz Dill From The Eponymous Pickle | June 13, 2013 at 12:00 PM
Here's a quick list of some of my older writings that are related to the current NSA spying documents:
"The Internet Is a Surveillance State ," 2013.
The importance...schneier From Schneier on Security | June 13, 2013 at 11:09 AM
In a second article in a four-part series on the use of tablets in educational settings, Justin Reich of MindShift examines the topic of curation. “As technologies...Experientia From Putting People First | June 13, 2013 at 07:26 AM