From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.
Assange is an international trafficker, of sorts. He and his colleagues collect...schneier From Schneier on Security | June 24, 2010 at 06:13 PM
Heard Charlene Li talk today introducing concepts in her new book: Open Leadership: How Social Technology Can Change the Way You Lead. Some excellent points. In...Franz Dill From The Eponymous Pickle | June 24, 2010 at 05:54 PM
In Roger Dooley's Neuromarketing blog: Why Stories Sell. With some links to previous posts on the subject. Certainly they do sell, and are much more memorable than...Franz Dill From The Eponymous Pickle | June 24, 2010 at 02:33 PM
How to best describe what we do to the layperson?
It depends on what you mean by layperson.
I was in Austin Texas visiting my nephew Jason.
I was also giving...GASARCH From Computational Complexity | June 24, 2010 at 02:32 PM
Discovered! An excellent site and scented spaces blog by Tracy Pepe on scent design. I am following, check it out. See also her recent post on CPG scent branding...Franz Dill From The Eponymous Pickle | June 24, 2010 at 02:16 PM
A useful glossary of social media terms. Terms in play are always changing, worth knowing.Franz Dill From The Eponymous Pickle | June 24, 2010 at 01:46 PM
Marten Mickos says open source doesn't have to be fully open This was the received wisdom among the senior VPs at Sun just before the fall of the company. While...Simon Phipps From Wild WebMink | June 24, 2010 at 12:06 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I am starting to put stuff together to take with me to ISTE this weekend. I get in Sunday sometime and already have a dinner meeting set up. And some stuff do to...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 24, 2010 at 09:55 AM
Two new articles in UX Magazine: Fusing content strategy with design by David Gillis Context maps and content flow diagrams are just two possible ways to integrate...Experientia From Putting People First | June 24, 2010 at 06:45 AM
In recent posts I have been exploring auction technologies, mobile and otherwise. Part of the exploration I did was to attend a local auction at Cowan's Auctions...Franz Dill From The Eponymous Pickle | June 24, 2010 at 12:47 AM
Barcode reading has been on my mind lately, see recent posts. And just as that occurs eBay buys RedLaser, with more than just code-reading on their mind. RedLaser...Franz Dill From The Eponymous Pickle | June 23, 2010 at 11:08 PM
Dena Sacco and her team have put together a fantastic document that maps out the legal and socio-legal issues surrounding sexting: Sexting: Youth Practices and...zephoria From Apophenia | June 23, 2010 at 07:48 PM
A CGT interview with Steve Knox, CEO of P&G's Tremor. " ... Have you ever wondered why consumers talk? Thought-leader Steve Knox shares tricks for building consumer...Franz Dill From The Eponymous Pickle | June 23, 2010 at 07:28 PM
Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:
No...schneier From Schneier on Security | June 23, 2010 at 06:16 PM
Interesting piece on the power of the checklist and our aversion to it: " Checking Everything Off -- Except the Resistance to Changefrom Knowledge@WhartonErrors...Franz Dill From The Eponymous Pickle | June 23, 2010 at 05:48 PM
Maybe it’s a trend, or maybe I just noticed because I was looking, but following my article last week about the strange parallels between Life of Brian and the...Simon Phipps From Wild WebMink | June 23, 2010 at 02:35 PM
I set up a new blog, Future of STOC to discuss role of our main conference and how to achieve it.
At STOC this year we had a relatively large attendance of 350...Lance From Computational Complexity | June 23, 2010 at 11:22 AM
In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:
"High-tech, low-tech, we can't...schneier From Schneier on Security | June 23, 2010 at 11:00 AM