From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On the reasons for the re-emergence of AI as cognitive computing. In the Economist:" ... Cognitive computing is AI redux. Researchers took the successful bits...Franz Dill From The Eponymous Pickle | January 10, 2015 at 12:41 PM
Via Brian Moon or Perigean Technologies, who writes on making sense of knowledge via methods like concept mapping. Good piece at link.Abductive Thinking and Sensemaking...Franz Dill From The Eponymous Pickle | January 10, 2015 at 09:58 AM
Cmap is the best known general concept mapping tool, which we tested in the enterprise. Previously noted about this in test last year. See previous posts here...Franz Dill From The Eponymous Pickle | January 10, 2015 at 08:49 AM
In KDNuggets: An overview of the Watson ecosystem from a recent presentation. Examples in healthcare and education.Franz Dill From The Eponymous Pickle | January 10, 2015 at 08:22 AM
This just in: the threat of being eaten doesn't deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | January 9, 2015 at 06:46 PM
In Conversioner: Nicely done short piece that brings together a number of data and behavioral process methods to address selling. " ... Surprisingly, competitive...Franz Dill From The Eponymous Pickle | January 9, 2015 at 10:06 AM
I have been connected to two startups in the neuromarketing domain. Is the hype fading for non conscious interaction applications of the neural kind? Have seen...Franz Dill From The Eponymous Pickle | January 9, 2015 at 09:57 AM
In Computing Now An example of new approaches to collaborative interface. Haptic (touch) included.Spatial User Interfaces for Large-Scale Projector-Based Augmented...Franz Dill From The Eponymous Pickle | January 9, 2015 at 08:32 AM
The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has "very high confidence" in the FBI's...Bruce Schneier From Schneier on Security | January 9, 2015 at 07:24 AM
Complementary social science? Quali-quantitative experiments in a Big Data world Anders Blok and Morten Axel Pedersen University of Copenhagen, Copenhagen, Denmark...Experientia From Putting People First | January 9, 2015 at 06:41 AM
Various senses of ‘many’ from proofs of the infinitude of primes 2008 Bowen Lectures source Hillel Furstenberg is entering his 50th years as a professor of mathematics...Pip From Gödel's Lost Letter and P=NP | January 8, 2015 at 11:00 PM
Good information on how Internet Explorer, Chrome, and Firefox store user passwords....Bruce Schneier From Schneier on Security | January 8, 2015 at 06:50 PM
In Retailwire: Have been involved with a third party seller on Amazon for some time. The process and dynamics are interesting to watch. The data use claim is...Franz Dill From The Eponymous Pickle | January 8, 2015 at 05:18 PM
An overview of the idea. Continuing to follow. Have mentioned I think there are some useful integrated visualizations here that are quite good. Still unclear...Franz Dill From The Eponymous Pickle | January 8, 2015 at 04:31 PM
This sort of thing is still very rare, but I fear it will become more common: ...hackers had struck an unnamed steel mill in Germany. They did so by manipulating...Bruce Schneier From Schneier on Security | January 8, 2015 at 04:16 PM
The RFCode site blog was just brought to my attention. My investigation into data costs and data asset value led me to this. They have an Infographic on the cost...Franz Dill From The Eponymous Pickle | January 8, 2015 at 01:14 PM
The following is a Computing Research Policy Blog post by Brian Mosley, CRA Policy Analyst. Just wanted to put up a quick post that due to extra availability we...Helen Vasaly From The Computing Community Consortium Blog | January 8, 2015 at 12:10 PM
Computers store numbers in binary form using a fixed number of bits. For example, Java will store integers using 32 bits (when using the int type). This can be...Daniel Lemire From Daniel Lemire's Blog | January 8, 2015 at 10:45 AM
In CWorld: I did some direct programming on this chip, so the milestone is historic for me. Where is the microprocessor going? Good background and directional...Franz Dill From The Eponymous Pickle | January 8, 2015 at 10:04 AM