From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The example here is in art, but I can see this happening much more broadly. Consider too, its potential integration with remote manufacturing. " ... using a free...Franz Dill From The Eponymous Pickle | June 15, 2012 at 03:53 PM
A topic we spent time simulating and examining in laboratory settings. A new look at the factors determining shopper behavior. How can re-design and better shopper...Franz Dill From The Eponymous Pickle | June 15, 2012 at 03:32 PM
What is patents could be de-weaponized? That’s the goal of the new Defensive Patent License, released this week by law professor (and former EFF lawyer) Jason Schultz...Simon Phipps From Wild WebMink | June 15, 2012 at 02:20 PM
A missed? or forgotten? connection from 1976 Richard Brent is an illustrious Australian mathematician and computer scientist. He is known for Brent’s Theorem, which...rjlipton From Gödel's Lost Letter and P=NP | June 15, 2012 at 02:12 PM
A piece of research that suggests that over leveraged cloud services could cause service meltdowns. he suggest that these interdependencies are still little understood...Franz Dill From The Eponymous Pickle | June 15, 2012 at 01:52 PM
From "CNN national security analyst" Peter Bergen:
Few Americans harbor irrational fears about being killed by a lightning bolt. Abu Yahya al-Libi's death on Monday...schneier From Schneier on Security | June 15, 2012 at 11:51 AM
The Association for Computing Machinery (ACM) is holding its A.M. Turing Centenary Celebration in San Francisco, CA, today and Saturday — marking the 100th anniversary...Erwin Gianchandani From The Computing Community Consortium Blog | June 15, 2012 at 09:30 AM
Connected Health: How mobile phones, cloud, and big data will reinvent healthcare by Jody Ranck, DrPH GigaOm Books, June 2012 170 pages [Amazon Kindle edition]...Experientia From Putting People First | June 15, 2012 at 08:19 AM
If you can't attend ACM's Turing Centenary Celebration, you can still experience the thrill of rubbing elbows with ACM Turing Award winnersFranz Dill From The Eponymous Pickle | June 14, 2012 at 08:44 PM
MJ Perry reports. Increasingly, suppliers of remote online expertise are gaining acceptance. Expect this to continue as the Cloud increases its resources.Franz Dill From The Eponymous Pickle | June 14, 2012 at 08:32 PM
Fairly obvious. But worth reviewing for understanding how shoppers interact with labeling. Shoppers also interact with labels differently according to the store...Franz Dill From The Eponymous Pickle | June 14, 2012 at 08:24 PM
Dad's increase their influence on shopping, according to recent study. " ... with 52% reporting being the household's primary grocery shopper, according to the...Franz Dill From The Eponymous Pickle | June 14, 2012 at 08:17 PM
Around this time every year, the White House Office of Management and Budget (OMB) and Office of Science and Technology Policy (OSTP) typically issue a joint guidance...Erwin Gianchandani From The Computing Community Consortium Blog | June 14, 2012 at 07:50 PM
Interesting article:
In the case of that student, the professor in the course had tried to prevent cheating by using a testing system that pulled questions at...schneier From Schneier on Security | June 14, 2012 at 05:27 PM
In a further nod to the sexiness of big data and mobile tablets, Tibco's Spotfire analytics and visualization tool has added a number of new capabilities. Spotfire...Franz Dill From The Eponymous Pickle | June 14, 2012 at 03:06 PM
(I delayed posting this until after The Belmont Stakes since I wanted to see if there would be a Triple Crown winner.Alas, I'll have another was scratched. From...GASARCH From Computational Complexity | June 14, 2012 at 02:10 PM
As we described in this space yesterday, this morning at an event at the White House,Erwin Gianchandani From The Computing Community Consortium Blog | June 14, 2012 at 11:47 AM
We're in the early years of a cyberwar arms race. It's expensive, it's destabilizing, and it threatens the very fabric of the Internet we use every day. Cyberwar...schneier From Schneier on Security | June 14, 2012 at 11:40 AM