From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Also had not realized SAP was into sentiment analysis. An overview via an interview here. " ... SearchSAP spoke to Sameer Patel, global vice president and general...Franz Dill From The Eponymous Pickle | May 7, 2013 at 06:11 PM
I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here:
More recently...schneier From Schneier on Security | May 7, 2013 at 05:57 PM
Good article about the idea. Summarized by linking to executive champions and truly understanding where the analytics intersects with decision process.Franz Dill From The Eponymous Pickle | May 7, 2013 at 05:38 PM
New from Tom Ritchey:For those who are interested in computer-aided GAP Analysis – especially concerning problem areas that are difficult to quantify – a new article...Franz Dill From The Eponymous Pickle | May 7, 2013 at 05:25 PM
Mobile advertising from Catalina. Had not seen them in this space before, but admit have not followed them closely. " .. “BuyerVision Mobile represents a huge...Franz Dill From The Eponymous Pickle | May 7, 2013 at 03:55 PM
Just today, I got my 1,000th recruiter email in the last ~4 years. I know this is the number because I'm slightly obsessed with organization and have added a specific...Yevgeniy Brikman From Writing | May 7, 2013 at 03:49 PM
In CACM: Research on the ongoing and imminent disruption of education. A model that has existed for 800 years sees itself threatened. What will make the new...Franz Dill From The Eponymous Pickle | May 7, 2013 at 02:05 PM
Justin Thaler and Jon Ullman had back-to-back thesis defenses today. Both talks were excellent -- Justin's on his work on verification methods (for cloud computing)...Michael Mitzenmacher From My Biased Coin | May 7, 2013 at 01:51 PM
The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have...schneier From Schneier on Security | May 7, 2013 at 11:10 AM
The discrete log and the factoring problem Antoine Joux is a crypto expert at Versailles Saint-Quentin-en-Yvelines University. He is also one of the crypto experts...Pip From Gödel's Lost Letter and P=NP | May 6, 2013 at 10:56 PM
Perhaps an unusual choice. Most large non-tech companies use off the shelf or outsource such capabilities. Wal-Mart feels it has special understanding of it needs...Franz Dill From The Eponymous Pickle | May 6, 2013 at 07:35 PM
May 8 Hearing: The Subcommittee on Crime and Terrorism of the Senate Judiciary Committee will hold a hearing on responses to cyberthreats. 9 a.m., 226 Dirksen Building...David B. From U.S. Public Policy Committee of the ACM | May 6, 2013 at 06:21 PM
Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass.
Now imagine that millions of Americans walk around each day wearing...schneier From Schneier on Security | May 6, 2013 at 06:17 PM
In the last post of the EthnographyMatters Ethnomining edition (edited by Nicolas Nova), David Ayman Shamma @ayman gives a personal perspective on mixed methods...Experientia From Putting People First | May 6, 2013 at 05:47 PM
Although Windows and Macintosh are both showing their age, Michael Mace of Cera Technology thinks there is enormous opportunity for a renaissance in personal computing...Experientia From Putting People First | May 6, 2013 at 05:38 PM
Just started to review some of Michael Schrage's posts in his HBR blog that had to do with analytics, data visualization and the digitization of business. Well...Franz Dill From The Eponymous Pickle | May 6, 2013 at 04:33 PM
My darling sometimes watches TV in the middle of the night when she can't sleep.So I found myself watching (actually listening) to the quiz show
Are You Smarter...GASARCH From Computational Complexity | May 6, 2013 at 02:32 PM
Though it does not get much press, one of the great social and technological innovation of the last 30 years has been open source software. To about 90% of the...Daniel Lemire From Daniel Lemire's Blog | May 6, 2013 at 02:30 PM
An interesting HBR Blog case study on visualizing geographic data. They conclude reasonably: " ... There are lots of ways to sequence development. But the end...Franz Dill From The Eponymous Pickle | May 6, 2013 at 01:29 PM
Here is a simple but clever idea. Seed password files with dummy entries that will trigger an alarm when used. That way a site can know when a hacker is trying...schneier From Schneier on Security | May 6, 2013 at 10:44 AM