From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Wired Gadget Labs: Illustrated Man. We examined the use of LEDs on clothing for advertising, which can be readily done, but this takes it to the next level...Franz Dill From The Eponymous Pickle | November 20, 2009 at 05:01 PM
This CRISP-DM model was looked at within the enterprise. Re-examined. It attempts to be very detailed and universal. Worth a look though it does not seem to have...Franz Dill From The Eponymous Pickle | November 20, 2009 at 04:30 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
The Crimson is reporting that the Harvard Faculty of Arts and Sciences will plan to decrease the size of the faculty* in response to budget woes. The key point...Michael Mitzenmacher From My Biased Coin | November 20, 2009 at 04:19 PM
Mikkel Michelsen discusses the core differences between specialised use contexts and the mainstream use of a mass consumer product, and tries to answer the questions...Experientia From Putting People First | November 20, 2009 at 03:08 PM
Dozens of home energy monitors are coming to market, but nobody knows whether only hybrid Prius owners will use them. Martin LaMonica reports on CNet News.
“The...Experientia From Putting People First | November 20, 2009 at 02:58 PM
A student asked me which version of a research paper to cite, a journal (the last reviewed version) or a conference (the first reviewed version) of a paper. I generally...Lance From Computational Complexity | November 20, 2009 at 12:57 PM
Some English language websites, blogs, articles and publications updating on what Denmark is doing on user-driven innovation:
Is Denmark a lead user of user driven...Experientia From Putting People First | November 20, 2009 at 11:59 AM
Apple's Mistake
Paul Graham gets it spot on again. Apple's attitude is Google's biggest asset in the battle for the mobile market.
(tags: ...webmink From Wild WebMink | November 20, 2009 at 09:28 AM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
What will solve climate change? Will it be technology? Policy? A growing number of researchers and activists say it’s what’s behind it all: people. And understanding...Experientia From Putting People First | November 19, 2009 at 03:53 PM
EU press release (link):
EU ministers have committed to developing smarter online public services for citizens and businesses by 2015. The Commission has welcomed...Experientia From Putting People First | November 19, 2009 at 02:17 PM
There are now bibles online where you can click for different versions, different translations, different interepretations, historical context, etc. The same is...GASARCH From Computational Complexity | November 19, 2009 at 01:54 PM
From IEEE Spectrum: IBM Unveils New Brain Simulator. ' ... Scientists and engineers at IBM revealed yesterday that they have created the largest brain simulation...Franz Dill From The Eponymous Pickle | November 19, 2009 at 12:10 PM
Dmitry Fadeyev, founder of the Usability Post blog, wrote an article for Smashing Magazine “to demonstrate the power of social interface design”.
he standard approach...Experientia From Putting People First | November 19, 2009 at 10:27 AM
A number of articles illustrate the power of the mobile phone in emerging markets:
What next after the Mobile revolution in Kenya?
by John Karanja
MPESA will be...Experientia From Putting People First | November 19, 2009 at 10:11 AM
This afternoon at 3PM EST, a DM radio broadcast on Predictive analytics. Which they enthusiastically call an enterprise crystal ball. The broadcast is also recorded...Franz Dill From The Eponymous Pickle | November 19, 2009 at 09:29 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM