From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Some common errors in visualization. Good to think about, but I am not sure these are the most important errors you could make. But the final section is right...Franz Dill From The Eponymous Pickle | January 5, 2014 at 10:57 AM
As expected, rich expectations, but also many constraints that are still untested. And lack of understanding of the possibilities." ... Survey results released...Franz Dill From The Eponymous Pickle | January 5, 2014 at 10:38 AM
Brought to my attention, a set of interesting historical examples of visual mapping. It's a very old idea that is still useful to describe a complex system before...Franz Dill From The Eponymous Pickle | January 4, 2014 at 01:11 PM
Went back to their site, They have a nice video playing now that shows how it works. We looked at them early on. They say: " .... Over 6 million people love...Franz Dill From The Eponymous Pickle | January 4, 2014 at 10:30 AM
In Progressive Grocer, some thoughts on the complexity of this decision process. SOunds like better analytics is needed, with lots of leverage available." ......Franz Dill From The Eponymous Pickle | January 4, 2014 at 10:27 AM
Wisconsin is one of the few states to have a distinct license that is required for teachers of computer science courses in high schools. This license, created in... From Computer Science Teachers Association | January 3, 2014 at 06:06 PM
Recently in the Teradata Blog, contains an excellent explanatory video by Tim Butler of P&G. Another great example of the digitization of marketing in CPG.TheProcter...Franz Dill From The Eponymous Pickle | January 3, 2014 at 05:34 PM
There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list:
"Tailored Access Operations...schneier From Schneier on Security | January 3, 2014 at 03:23 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF:
IRONCHEF
(TS//SI//REL) IRONCHEF provides access persistence to...schneier From Schneier on Security | January 3, 2014 at 01:20 PM
Interesting CW report from CES. Currently looking at iBeacon and similar techniques for data rich opportunities leveraging location. The presentation there...Franz Dill From The Eponymous Pickle | January 3, 2014 at 10:47 AM
Nice summary of common techniques. For a good start, review your business and decide which of these discoveries would give the most value. Their definition: ...Franz Dill From The Eponymous Pickle | January 3, 2014 at 10:31 AM
In the NYT: So where is all this going? Thoughtful piece including an interview with Vinton Cerf, now with Google and DARPA, Internet Pioneer. We worked with...Franz Dill From The Eponymous Pickle | January 3, 2014 at 10:07 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This may well be of interest to people who like software engineering. A draft of "Software Engineering 2013: Curriculum Guidelines for Undergraduate Degreehttp...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 3, 2014 at 08:05 AM
It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...schneier From Schneier on Security | January 3, 2014 at 07:10 AM
A nice simple topic that often comes up. How exactly to you choose which variables to use when seeking to find a relationship using regression? Such models are...Franz Dill From The Eponymous Pickle | January 3, 2014 at 12:30 AM
Three simple words: "How Might we? " Positive words for creativity. Good, very simple thgought, " ... Use Language to Shape a Creative Culture - Tom Kelley...Franz Dill From The Eponymous Pickle | January 3, 2014 at 12:00 AM
What caught my attention lately: Windows 8 has caused a big drop in PC sales to businesses, most of which has been picked up by Google Chromebooks (not by Apple)...Greg Linden From Geeking with Greg | January 2, 2014 at 04:50 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE:
DEITYBOUNCE
(TS//SI//REL) DEITYBOUNCE provides software application...schneier From Schneier on Security | January 2, 2014 at 04:25 PM
Jokingly, Rao pointed out that Americans are starting 2014 with an optimistic outlook: (…) it’s tough, but let’s just write off polar bears and groundwater pollution...Daniel Lemire From Daniel Lemire's Blog | January 2, 2014 at 03:24 PM