From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A blog devoted to Sankey diagrams. Discovered in my quest for ways to deliver these. Many good examples. " ... With this blog I would like to share with you...Franz Dill From The Eponymous Pickle | May 4, 2013 at 08:16 PM
While I greatly enjoy working at Harvard, there are many painfully stupid things said and done by people here -- as I suppose is the case anywhere -- that either...Michael Mitzenmacher From My Biased Coin | May 4, 2013 at 07:28 PM
Ken Karakotsios was the author of the remarkable SimLife genetic playground game. He worked with us to build agent based simulation models that were used for years...Franz Dill From The Eponymous Pickle | May 4, 2013 at 06:59 PM
TIBCO and Teradata Enable CIOs to Extract Actionable Insights From Real-Time Event Streams to Deliver the Two-Second AdvantageEvent Processing within the Teradata...Franz Dill From The Eponymous Pickle | May 4, 2013 at 05:32 PM
Quite a considerable accomplishment, built on work started years ago with innovation in Executive Information Systems. Much more in this blog about Business"...Franz Dill From The Eponymous Pickle | May 3, 2013 at 09:52 PM
It's amazing how small a hole he can fit through.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | May 3, 2013 at 09:33 PM
The Congressional Internet Caucus Advisory Committee brings you the 5th Annual State of the Mobile Net Conference on Thursday, May 9, 2013. Key members of Congress...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 3, 2013 at 08:31 PM
The U.S. Election Assistance Commission will hold a roundtable on “Transforming Election Administration, Voting System Accessibility, and the Certification Process”...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 3, 2013 at 07:36 PM
The Department of Health & Human Services (HHS) will hold its first “a11y@HHS: Technology Accessibility and Inclusion Conference,” on Tuesday, May 7, 2013 at the...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 3, 2013 at 07:16 PM
It's a really interesting code and story. (The first link has the most detailed information about the code and the cryptanalysis.)schneier From Schneier on Security | May 3, 2013 at 05:44 PM
In SASCom: SAS visual analytics methods, seen through the problem of retailing. Video of their method. Would like to see more of this in the retail space.Franz Dill From The Eponymous Pickle | May 3, 2013 at 04:52 PM
Thinking of a smartphone as a sensor driven device. How might they ultimately be used as a means to give remote physicals? Still some issues, but the possibilities...Franz Dill From The Eponymous Pickle | May 3, 2013 at 04:44 PM
Amazingly, the debate about when we will see the “year of the Linux desktop” is still active. Maybe it’s software Stockholm Syndrome making us all love our captor...Simon Phipps From Wild WebMink | May 3, 2013 at 04:28 PM
Our government collects a lot of information about us. Tax records, legal records, license records, records of government services received-- it's all in databases...schneier From Schneier on Security | May 3, 2013 at 11:15 AM
The USPTO Patent Public Advisory Committee will hold its quarterly meeting on Thursday, May 16, 2013 from 9:30 am to 3:30 pm at the USPTO campus in Alexandria,...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 3, 2013 at 01:58 AM
A not uncommon application for analytics. Decreasing customer churn. This loyalty problem is an expensive issue in many periodic sales industries. A case study...Franz Dill From The Eponymous Pickle | May 2, 2013 at 10:04 PM
Reblogged from Meshed Insights & Knowledge: This week the United States Trade Representative (USTR) released the annual Special 301 Report. For those of you who...Simon Phipps From Wild WebMink | May 2, 2013 at 10:02 PM
In recent weeks, several new activities of the Federal Big Data Initiative have been launched with the goal of addressing the challenges and opportunities of Big...Shar Steed From The Computing Community Consortium Blog | May 2, 2013 at 08:36 PM
How linear algebra can make databases go really fast Mike Stonebraker is one of the world’s leading expert on database technology. He started in academe at Berkeley...rjlipton From Gödel's Lost Letter and P=NP | May 2, 2013 at 07:15 PM
Interesting research:
Helbing's publication illustrates how cascade effects and complex dynamics amplify the vulnerability of networked systems. For example, just...schneier From Schneier on Security | May 2, 2013 at 06:09 PM