From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ever keen to expand the boundaries of their practices, design professionals have been moving in the direction of public policy for some years, writes Lucy Kimbell...Experientia From Putting People First | July 2, 2010 at 09:24 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The CACM web site has an interesting interview with Joel Adams (Joel Adams Discusses the Career Outlook for CS Students) Joel AdamsAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 1, 2010 at 11:27 PM
Wharton WIMI studies how fans access the World Cup via ESPN: " ... ESPN, which is televising the World Cup, is using the soccer tournament as a living laboratory...Franz Dill From The Eponymous Pickle | July 1, 2010 at 07:00 PM
It makes sense for a toy manufacturer to look at this. it is well known that some smartphone game Apps are very big profit makers for well known toy companies....Franz Dill From The Eponymous Pickle | July 1, 2010 at 06:18 PM
This is from Atomic Bombing: How to Protect Yourself, published in 1950:
Of course, millions of us will go through our lives never seeing a spy or a saboteur...schneier From Schneier on Security | July 1, 2010 at 06:05 PM
Wim Van de Velde points me the Recorded Future Site, which I had missed. What they call a temporal analytics engine. Not descriptive enough as a title. Just exploring...Franz Dill From The Eponymous Pickle | July 1, 2010 at 02:06 PM
By Russian spies:
Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...schneier From Schneier on Security | July 1, 2010 at 02:02 PM
The Spring 2010 issue of the Journal of Information Architecture is now available. In one of the articles “Beyond Findability“, Luigi Spagnolo, Davide Bolchini,...Experientia From Putting People First | July 1, 2010 at 01:19 PM
Consider the following problem:
A hole is drilled through the center of a sphere.
The cylinder-with-caps is removed.
The length of the removed cylinder (itHere...GASARCH From Computational Complexity | July 1, 2010 at 12:53 PM
Project Harmony looks to improve contribution agreements I hope to be able to participate in this activity, if only to ensure that it does not become a validation...Simon Phipps From Wild WebMink | July 1, 2010 at 12:06 PM
This fast approaching era of desktop manufacturing via advanced MakerBots and other 3D printers is in part why ThingM co-founder Mike Kuniavsky runs an annual conference...Experientia From Putting People First | July 1, 2010 at 08:46 AM
The Grattan Institute, an Australian independent public policy think-tank, has published a new report, entitled “The Cities We Need“, that aims to set an agenda...Experientia From Putting People First | July 1, 2010 at 08:36 AM
“For all of the attention on social networking, there are few social media experiences that match the fun of hanging out together with friends in person,” writes...Experientia From Putting People First | July 1, 2010 at 08:29 AM
At the beginning of May, frog design partnered with the Lift conference in Geneva to conduct design research on the conference itself to understand what was working...Experientia From Putting People First | July 1, 2010 at 08:19 AM
The relationship between researchers and product designers can be a rocky one. Paul Golden looks at how market research can make sure it promotes creative thinking...Experientia From Putting People First | July 1, 2010 at 08:11 AM
In a cool move Amazon has bought the geeky surplus store Woot. Will operate as an independent subsidiary. Although I have not been there for a while Woot was known...Franz Dill From The Eponymous Pickle | July 1, 2010 at 01:18 AM
Below is a list of items with policy relevance from the June issue of Communications of the ACM. As always, much of the material in CACM is premium content, and... From U.S. Public Policy Committee of the ACM | June 30, 2010 at 08:12 PM
Its only been five years since the launch of the Google Maps API. ReadWriteWeb celebrates with an article about it, and points to their map of mashups. Have now...Franz Dill From The Eponymous Pickle | June 30, 2010 at 07:18 PM
For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...schneier From Schneier on Security | June 30, 2010 at 05:53 PM