From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The USPTO Patent Public Advisory Committee will hold its quarterly meeting on Thursday, May 16, 2013 from 9:30 am to 3:30 pm at the USPTO campus in Alexandria,...Renee Dopplick From U.S. Public Policy Committee of the ACM | May 3, 2013 at 01:58 AM
A not uncommon application for analytics. Decreasing customer churn. This loyalty problem is an expensive issue in many periodic sales industries. A case study...Franz Dill From The Eponymous Pickle | May 2, 2013 at 10:04 PM
Reblogged from Meshed Insights & Knowledge: This week the United States Trade Representative (USTR) released the annual Special 301 Report. For those of you who...Simon Phipps From Wild WebMink | May 2, 2013 at 10:02 PM
In recent weeks, several new activities of the Federal Big Data Initiative have been launched with the goal of addressing the challenges and opportunities of Big...Shar Steed From The Computing Community Consortium Blog | May 2, 2013 at 08:36 PM
How linear algebra can make databases go really fast Mike Stonebraker is one of the world’s leading expert on database technology. He started in academe at Berkeley...rjlipton From Gödel's Lost Letter and P=NP | May 2, 2013 at 07:15 PM
Interesting research:
Helbing's publication illustrates how cascade effects and complex dynamics amplify the vulnerability of networked systems. For example, just...schneier From Schneier on Security | May 2, 2013 at 06:09 PM
An examination of the second screen phenomenon. Mashable looks how it is evolving. And a number of interesting players.Franz Dill From The Eponymous Pickle | May 2, 2013 at 05:38 PM
The Computing Community Consortium (CCC) sponsored a sustainability award at CHI 2013, ACM’s premiere conference on Human Factors in Computing Systems. The conference...Kenneth Hines From The Computing Community Consortium Blog | May 2, 2013 at 03:05 PM
A piece in Bloomberg about tracking shoppers in retail. A subject we did much with in retail laboratory environments, and much has been written about here. More...Franz Dill From The Eponymous Pickle | May 2, 2013 at 12:49 PM
Following the coloring theme from Bill's last post, a few years ago I asked you readers for natural examples of maps that were and were not three colorable. Chris...Lance Fortnow From Computational Complexity | May 2, 2013 at 12:47 PM
In Science Mag. A new camera that was inspired by an alternative model for sight, using multiple individual lenses to focus on objects. The claim is that the result...Franz Dill From The Eponymous Pickle | May 2, 2013 at 12:29 PM
FinFisher (also called FinSpy) is a commercially sold spyware package that is used by governments world-wide, including the U.S. There's a new report that hasbunch...schneier From Schneier on Security | May 2, 2013 at 11:50 AM
Lev Manovich on Cultural Analytics. " ... Cultural Analytics: computational analysis and visualization of massive cultural visual datasets in the humanities....Franz Dill From The Eponymous Pickle | May 2, 2013 at 11:15 AM
The UK Design Council and three other members of the SEE Platform (Sharing Experience Europe) – the Danish Design Centre, Design Wales and Aalto University, Finland...Experientia From Putting People First | May 2, 2013 at 11:14 AM
The iPad is a multi-user device according to industry reports, writes Frank Spillers. But you wouldn’t know it from picking up even the latest generation iPad,...Experientia From Putting People First | May 2, 2013 at 09:03 AM
In GigaOM: For use in applications like embedding tags into advertising in magazines. Or integrating with product packaging. Or other on shelf applications.Franz Dill From The Eponymous Pickle | May 2, 2013 at 12:15 AM
An example of a store display tracking eye movement. " ... Scientists at Lancaster University have created advertising screens which track your eye movement as...Franz Dill From The Eponymous Pickle | May 2, 2013 at 12:12 AM
Good discussion of On line Education (MOOC):On April 25, 2013, UPenn President Amy Gutmann appeared on the Charlie Rose show to discuss online education with fellow...Franz Dill From The Eponymous Pickle | May 1, 2013 at 08:00 PM
Google is paying bug bounties. This is important; there's a market in vulnerabilities that provides incentives for their being kept secret and exploitable; for...schneier From Schneier on Security | May 1, 2013 at 06:58 PM
In TDWI: Thoughtful, but also somewhat misleading piece on the subject. Big data analytics need to work with the same assumptions that all analytics have always...Franz Dill From The Eponymous Pickle | May 1, 2013 at 05:07 PM