From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The austere public budgets that will come out of the financial crisis offer, as a silver lining, a renaissance in cooperative citizen engagement in the supply of...Experientia From Putting People First | December 3, 2009 at 04:16 PM
In this video of Make/Think, the recent AIGA Design Conference, Roger Martin, dean of the Joseph L. Rotman School of Management at the University of Toronto, makes...Experientia From Putting People First | December 3, 2009 at 03:57 PM
Danah Boyd, a social media researcher at Microsoft Research, and Sherry Turkle, MIT Professor of the Social Studies of Science and Technology, were interviewed...Experientia From Putting People First | December 3, 2009 at 03:38 PM
Today was the last day of classes for Computers and Cognition, a course that's inspired a couple of posts here, and that I signed up for, for credit, even though...Gail Carmichael From The Female Perspective of Computer Science | December 3, 2009 at 02:22 PM
In the Noisy Channel, as mostly a consumer of search technology I have to worry about the bias of search, major and minor, my own needs ... sometimes casual sometimes...Franz Dill From The Eponymous Pickle | December 3, 2009 at 12:45 PM
Wired summarizes research by Christopher Soghoian:
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...schneier From Schneier on Security | December 3, 2009 at 11:47 AM
As I promised sometime back, we now have a paper (up on the arxiv) giving the thresholds for cuckoo hashing, a problem that had been open and was part of my survey...Michael Mitzenmacher From My Biased Coin | December 3, 2009 at 11:43 AM
One of the many things I’ve enjoyed in my first few weeks of working at Google is the opportunity to talk with many people who care about user interfaces and think...Daniel Tunkelang From The Noisy Channel | December 3, 2009 at 10:59 AM
Congrads to ALL of the ACM Fellows which were annouced here.
There are several theorists among them. I could try to list them or count them; however, the term...GASARCH From Computational Complexity | December 3, 2009 at 09:31 AM
The CCC co-sponsored and co-organized the Discovery and Innovation in Health IT Workshop in San Francisco on October 29 and 30, 2009 (http://www.cra.org/ccc/healthit...Ran Libeskind-Hadas From The Computing Community Consortium Blog | December 2, 2009 at 08:51 PM
One of the comments on my last post, the 17x17 post, inquired if I am also interested in the other unknown grids (17x18, 18x18, 21x10, 21x11, 21x12, 22x10). I AM...GASARCH From Computational Complexity | December 2, 2009 at 04:04 PM
The latest issue of UPA’s UX Magazine is devoted to sustainable design, and one of the articles is by Experientia.
In their contribution, Experientia collaborators...Experientia From Putting People First | December 2, 2009 at 02:06 PM
In InformationWeek, good article and case study:" ... The terms "scorecard" and "dashboard" are often used interchangeably, but there's an important distinction...Franz Dill From The Eponymous Pickle | December 2, 2009 at 11:48 AM
Lots of interesting details in this report:Booz & Company's 2009 edition of the Global Innovation 1000 report finds large R&D spenders are keeping the pace when...Franz Dill From The Eponymous Pickle | December 2, 2009 at 09:50 AM
It can be impossible to securely delete a file:
What are the security implications of Volume Shadow Copy?
Suppose you decide to protect one of your documents...schneier From Schneier on Security | December 2, 2009 at 09:49 AM
An article in the Cincinnati Enquirer on the work of Andrew Manning, P&G anthropologist. P&G finds worldwide consumers share traits.Franz Dill From The Eponymous Pickle | December 1, 2009 at 09:00 PM
Not surprising, but some ot the details are interesting:Suggesting Alternative Ways to Spend Affects Consumers' Purchase Decisions ' ... ItFranz Dill From The Eponymous Pickle | December 1, 2009 at 08:14 PM
Intriguing piece in CACM on how the game industry is requiring more skilled programmers that in the past would have gone to industrial research labs. I would also...Franz Dill From The Eponymous Pickle | December 1, 2009 at 04:16 PM
This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...schneier From Schneier on Security | December 1, 2009 at 04:15 PM