From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is interesting:
Some of the scenarios where we have installed video analytics for our clients include:
to detect someone walking in an area of their yard...schneier From Schneier on Security | July 14, 2010 at 05:54 PM
I have been asked to take a closer look at the Recorded Future site. A number of posts will follow that will track my interaction with the site and company. The...Franz Dill From The Eponymous Pickle | July 14, 2010 at 02:58 PM
A good CWorld article on the the bloom of the robotics industry. I like this because it links the challenge to artificial intelligence (AI) which I covered for...Franz Dill From The Eponymous Pickle | July 14, 2010 at 02:00 PM
I'm sure getting together every two weeks to play board games and calling it research isn't anything new, but it's definitely something I need to do. I pride myself...Gail Carmichael From The Female Perspective of Computer Science | July 14, 2010 at 02:00 PM
Insider Dave Knox on taking social engagement to a new level at Procter & Gamble's Old Spice brand. Via Walter Riker.Franz Dill From The Eponymous Pickle | July 14, 2010 at 01:46 PM
Last week, the Center
for Computational Intractability hosted a Geometric
Complexity Theory Workshop. Geometric complexity theory (GCT) is
an approach to P vs...Lance From Computational Complexity | July 14, 2010 at 12:12 PM
SugarCRM 6 Debuts with Open Source and Commercial Features While their marketing guy may claim “that overall, Sugar 6 is an open source product from an open source...Simon Phipps From Wild WebMink | July 14, 2010 at 12:07 PM
It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...schneier From Schneier on Security | July 14, 2010 at 11:51 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The following is a guest post by Pat Yongpradit. Pat is the computer science teacher at Springbrook High School in Silver Spring, Maryland. His students competed...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 14, 2010 at 09:48 AM
PARC, the legendary California-based research centre owned by the Xerox Corporation, is hosting a series of talks on ethnography in industry. The three talks that...Experientia From Putting People First | July 14, 2010 at 09:09 AM
Philips Design has published a downloadable paper on how it uses qualitative research and design thinking to support development of solutions for the ever-changing...Experientia From Putting People First | July 14, 2010 at 08:11 AM
I gave this presentation today at AT&T Labs, hosted by Stephen North of Graphviz fame.Daniel Tunkelang From The Noisy Channel | July 14, 2010 at 03:13 AM
From 1955, intended as humor:
In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...schneier From Schneier on Security | July 13, 2010 at 05:42 PM
The Math Book: From Pythagoras to the 57th Dimension, 250 Milestones in the History of Mathematics by Clifford A. Pickover. Just found this recently published...Franz Dill From The Eponymous Pickle | July 13, 2010 at 05:36 PM
I was recently pointed to the Field Agent IPhone App. It implemented an idea which was discussed a number of times in the enterprise before the emergence of Apps...Franz Dill From The Eponymous Pickle | July 13, 2010 at 04:56 PM
Dominos is crediting social media for increases in profits. Good case study. Via Paul Gillin. See also his blog.Franz Dill From The Eponymous Pickle | July 13, 2010 at 04:55 PM
Our brains come with hard-wired algorithms. Cats can catch birds or mice without thinking about it. I can grab and eat a strawberry without thinking. The Savanna...Daniel Lemire From Daniel Lemire's Blog | July 13, 2010 at 04:17 PM
The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...schneier From Schneier on Security | July 13, 2010 at 12:21 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Cool stuff for us space nuts. ItAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 13, 2010 at 10:00 AM
Intriguing project and link to video.In CACM: Solving the Crisis of Choice OnlineThe MyMedia Project Content is everywhere these days, forcing consumers to make...Franz Dill From The Eponymous Pickle | July 13, 2010 at 05:37 AM