From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From the ACM: Talk on determining sentiment and prediction from text analysis in financial news. This requires filling out a registration. " ... Can the choice...Franz Dill From The Eponymous Pickle | September 6, 2014 at 01:33 PM
A very instructive piece in the Cisco Blog about how retail hacking at point of sale works, and how it can be addressed. Must reading. " ... With the announcement...Franz Dill From The Eponymous Pickle | September 6, 2014 at 01:12 PM
An interview in Forbes with SAS data guru and founder Jim Goodnight. Met him a number of times during their work with our enterprise, always interesting. Some...Franz Dill From The Eponymous Pickle | September 6, 2014 at 01:04 PM
How digital is transforming retail: The view from eBayDoes mobile commerce spell the end of traditional stores? In this series of short videos, Devin Wenig, the...Franz Dill From The Eponymous Pickle | September 6, 2014 at 11:56 AM
Preparing the Ghost: An Essay Concerning the Giant Squid and Its First Photographer, by Matthew Gavin Frank. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | September 5, 2014 at 05:06 PM
The National Institute for Standards and Technology (NIST), in coordination with the International Association of Privacy Professionals (IAPP), will host the Second...Renee Dopplick From U.S. Public Policy Committee of the ACM | September 5, 2014 at 03:09 PM
More in the auction management space. Which has many interesting ontological implications. " ... Six leading regional auction houses have joined forces to launch...Franz Dill From The Eponymous Pickle | September 5, 2014 at 01:52 PM
A new collection of articles from McKinsey. Just starting to take a look at this. For example: " ... Management intuition for the next 50 years ... The collision...Franz Dill From The Eponymous Pickle | September 5, 2014 at 12:51 PM
In Wired: Thoughts on what leads people to change their identity, and the implications. " ... Sockpuppetry—using false identities for deception—is centuries old...Franz Dill From The Eponymous Pickle | September 5, 2014 at 12:31 PM
UX strategy isn’t the blueprint, canvas, or definition you use. UX strategy is about the conversations you have and the alignment you achieve, writes Austin Govella...Experientia From Putting People First | September 5, 2014 at 10:07 AM
In Computer Now: Very good, extensive view of the topic. Increasingly important was we use systems in new ways. Current and future trends." ... Human-computer...Franz Dill From The Eponymous Pickle | September 5, 2014 at 08:33 AM
At USENIX Security this year there were two papers studying the security of password managers: David Silver, Suman Jana, and Dan Boneh, "Password Managers: Attacks...Bruce Schneier From Schneier on Security | September 5, 2014 at 07:01 AM
[This blog post was co-authored by Professor Samuel Liles and Spaf.]
Over the last few days we have seen a considerable flow of news and social media coverage of...Gene Spafford From CERIAS Blog | September 4, 2014 at 11:06 PM
[This blog post was co-authored by Professor Samuel Liles and Spaf.]
Over the last few days we have seen a considerable flow of news and social media coverage of...Gene Spafford From CERIAS Blog | September 4, 2014 at 11:06 PM
[This blog post was co-authored by Professor Samuel Liles and Spaf.]
Over the last few days we have seen a considerable flow of news and social media coverage of...Gene Spafford From CERIAS Blog | September 4, 2014 at 11:06 PM
An interesting article on the topic. You need some sort of domain area ontology to understand what you are mining. We built similar dictionaries for parts of...Franz Dill From The Eponymous Pickle | September 4, 2014 at 05:51 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Today is the eight day of classes for me. By and large the school year is off to a good start. The students are great. I told my students this morning that I was...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 4, 2014 at 02:13 PM
In March 2012, the Obama Administration announced the “Big Data Research and Development Initiative.” The goal is to help solve some of the Nation’s most pressing...Helen Vasaly From The Computing Community Consortium Blog | September 4, 2014 at 11:33 AM
New kind of wearable, the bracelet. Intel unveils a 3G simple wearable. Message display with a jewelry look.Franz Dill From The Eponymous Pickle | September 4, 2014 at 09:19 AM