From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
My high school daughter Molly was reading her Kindle and said "You know how you can choose a word and the Kindle will give you a definition. There should be anword...Lance Fortnow From Computational Complexity | January 22, 2015 at 08:03 AM
Every January, hundreds of politicians, CEOs, scientific experts, and celebrities gather for their annual meeting in the exclusive Swiss ski resort of Davos to...Experientia From Putting People First | January 22, 2015 at 06:58 AM
Saw a demonstration of Microsoft HoloLens today. An impressive see-through visor that sits on your head and can give you 3-D holographic experiences. Wirelessly...Franz Dill From The Eponymous Pickle | January 22, 2015 at 05:00 AM
Fascinating example using Bayesia's graphical methods. I like how the visualization leads to useful implications of the discovery. Easy to follow example with...Franz Dill From The Eponymous Pickle | January 21, 2015 at 05:01 PM
Cognitive Computing, A Brief Guide for Game Changers by Peter Fingar, just received. I commented on early versions. They write:" ... This book is a concise...Franz Dill From The Eponymous Pickle | January 21, 2015 at 03:18 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of my most popular posts has been a collection of links to block programming (drag and drop programming) tools and languages. The other day it occurred to me...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 21, 2015 at 11:53 AM
Below is an collaborative webinar featuring two groups I have done work with. And includes Tom Davenport, who included our analytics efforts at Procter & Gamble...Franz Dill From The Eponymous Pickle | January 21, 2015 at 10:50 AM
In Smart Data Collective, by Richard Boire I like the mentions of real time data,and also that we need to look at longitudinal (historical) views to understand...Franz Dill From The Eponymous Pickle | January 21, 2015 at 09:59 AM
Interesting characteristics of this labeling system, with likely applications to Internet of things applications." ... Each label, costing a few pennies, is a plastic...Franz Dill From The Eponymous Pickle | January 21, 2015 at 09:56 AM
This very notable private label introduction has been pulled after six weeks on the market. In GigaOM. They say for redesign. Do expect more examples of private...Franz Dill From The Eponymous Pickle | January 21, 2015 at 09:32 AM
It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud...Bruce Schneier From Schneier on Security | January 21, 2015 at 07:31 AM
The U.S. Copyright Office is accepting public input on proposed exemptions to the prohibitions against circumvention under the Digital Millennium Copyright Act...Renee Dopplick From U.S. Public Policy Committee of the ACM | January 21, 2015 at 12:04 AM
So what is hyper relevance? And all about dark assets that you are not using. Read about it in the Cisco blog.Franz Dill From The Eponymous Pickle | January 20, 2015 at 07:15 PM
Supporting information for a proposed project:" ... This study compares the accuracy of personality judgment—a ubiquitous and important social-cognitive activity...Franz Dill From The Eponymous Pickle | January 20, 2015 at 01:48 PM
The AAAS Science and Technology Policy Fellows at the National Science Foundation (NSF) have organized a new seminar series on Data Science, Big Data, and Internet...Helen Vasaly From The Computing Community Consortium Blog | January 20, 2015 at 12:14 PM
January 20 President Obama will give his State of the Union address. 9 p.m., Capitol Building January 21 Hearing: The Communications and Technology Subcommittee...David Bruggeman From U.S. Public Policy Committee of the ACM | January 20, 2015 at 11:34 AM
We looked at this topic a dozen years ago in the enterprise. It is not only just about phone calls, but also about how two way, interactive, data rich interactions...Franz Dill From The Eponymous Pickle | January 20, 2015 at 10:17 AM
In GigaOM: Case study of the use of Splunk for mining business insight by Dominos. Intrigued by the use of this new capability, especially for time domain, real...Franz Dill From The Eponymous Pickle | January 20, 2015 at 09:07 AM
In Forbes: Wearables and analytical value. Should they be in the medical record?" ... The great promise of wearables for medicine includes the opportunity for...Franz Dill From The Eponymous Pickle | January 20, 2015 at 08:49 AM
At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have...Bruce Schneier From Schneier on Security | January 20, 2015 at 07:24 AM