From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I have said it often, visualization, a form of descriptive analytics, should be the first method used to understand any kind of data. Especially large scale and...Franz Dill From The Eponymous Pickle | October 5, 2014 at 09:19 AM
In CIOInsight: Some useful cautions about automation. Sure we want to do things as efficiently as possible, but there is still value to include humans in customer...Franz Dill From The Eponymous Pickle | October 5, 2014 at 09:04 AM
By exposing how confusing food stamp applications and other government online services can be, Citizen Onboard hopes to make them better. Anna North reports in...Experientia From Putting People First | October 5, 2014 at 06:03 AM
In Baseline: Enterprise as a collection of things, and their internal and external connections. People too. " ... There's a growing interest in understanding...Franz Dill From The Eponymous Pickle | October 4, 2014 at 11:51 AM
Always have been interested in how to programmatically analyze text. We worked with large text bases long ago using what was then called 'content analysis', which...Franz Dill From The Eponymous Pickle | October 4, 2014 at 09:47 AM
In the BBC: On the psychology of scamming. While we often pay attention to the technology involved, the scamming methods that exist have been around for a long...Franz Dill From The Eponymous Pickle | October 4, 2014 at 08:49 AM
Of interest, new to me:" ... Google is putting its considerable weight behind an open source technology that’s already one of the hottest new ideas in the world...Franz Dill From The Eponymous Pickle | October 4, 2014 at 08:14 AM
A good, short overview of some of the technical and practical aspects of Apple Pay. Taking a closer look.Franz Dill From The Eponymous Pickle | October 3, 2014 at 10:56 PM
McDonald's has a Halloween-themed burger with a squid-ink bun. Only in Japan. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:19 PM
Andreessen Horowitz had a second Academic Roundtable, gathering together academics, VCs, and people in startups to talk for a few days about a variety of topics...Michael Mitzenmacher From My Biased Coin | October 3, 2014 at 06:44 PM
Foodies Transforming grocery messaging. Not really a technical idea, but an understanding that the form of the message needs to adapt to change in consumer expectations...Franz Dill From The Eponymous Pickle | October 3, 2014 at 03:07 PM
A recent Slate articles warns that coffee makes you less productive. The main claim is that coffee has no cognition enhancement ability but, instead, a range of...Daniel Lemire From Daniel Lemire's Blog | October 3, 2014 at 12:03 PM
How good is data science at detecting and flagging bogus reviews in Amazon or Yelp? Some interesting points about how these problems are created and their solution...Franz Dill From The Eponymous Pickle | October 3, 2014 at 10:35 AM
Fascinating, non technical look at the complexity of what can and cannot be derived from cell phone based location information.Franz Dill From The Eponymous Pickle | October 3, 2014 at 10:22 AM
Procedurally generated games allow new kinds of backgrounds, components and interactions to be provided in a virtual world. This was discussed early on as wayIn...Franz Dill From The Eponymous Pickle | October 3, 2014 at 10:18 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I suspect that there are a lot of programs and websites available that let teachers enter a class roster and randomly pick out a student name. I know several teachers...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | October 3, 2014 at 08:58 AM
Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:59 AM
Historical note. We used Lotus extensively in the enterprise in the late 80s. It was the second major electronic spreadsheet offering, after Visicalc. We also...Franz Dill From The Eponymous Pickle | October 2, 2014 at 03:58 PM
It has been a while since I have looked at Wikis outside of Wikipedia. We developed intra-Wikis experimentally, but not with great success. Check some of my other...Franz Dill From The Eponymous Pickle | October 2, 2014 at 03:42 PM
The Computing Community Consortium (CCC) Vice Chair Beth Mynatt has received a 2014 Mobility Star Award, which salutes excellence and advancements in mobility....Helen Vasaly From The Computing Community Consortium Blog | October 2, 2014 at 02:41 PM