From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Ethnography Matters has embarked on a new series called “The Ethnographer’s Reading List” with UX professionals discussing their summer reading. Here are the latest...Experientia From Putting People First | August 1, 2012 at 06:51 AM
I just drove most of the way across the country (from upstate New York to New Mexico, just shy of 2500 miles). This gave me ample opportunity to ponder my GPS,... From Computer Science Teachers Association | August 1, 2012 at 03:49 AM
Once again, featuring Sands Research portable Neuroactivity capture in the aisle:" ... The use of neuroscience in POPAI's 2012 Shopper Engagement Study made itFull...Franz Dill From The Eponymous Pickle | August 1, 2012 at 12:31 AM
Paul Hare's blog: The Numbers Don't Lie: Statistical analysis of evidence in the world of sports. Moneyball and beyond.Franz Dill From The Eponymous Pickle | July 31, 2012 at 04:25 PM
Almost a year ago, Heather Ford was hired by Ushahidi to work as an ethnographic researcher on a project to understand how Wikipedians managed sources during breaking...Experientia From Putting People First | July 31, 2012 at 04:20 PM
We already know you can wear fake irises to fool a scanner into thinking you're not you, but this is the first fake iris you can use for impersonation: to fool...schneier From Schneier on Security | July 31, 2012 at 04:11 PM
In NYT Technology: Snack foods are a natural intersection place between social technology and people. This article addresses work underway and how retailers...Franz Dill From The Eponymous Pickle | July 31, 2012 at 03:33 PM
CW article on how a survey shows most companies have no plans for big data analytics. I will go further to say that most companies have coherent plans for any...Franz Dill From The Eponymous Pickle | July 31, 2012 at 01:39 PM
Last month, we noted that eminent computer scientist Bill Wulf had taken the unprecedented step of resigning from the University of Virginia to protest the ousting...Erwin Gianchandani From The Computing Community Consortium Blog | July 31, 2012 at 01:33 PM
Says a recent survey presented in Baseline. But they clearly use the Internet a great deal, even for very important decisions, when they should go elsewhere for...Franz Dill From The Eponymous Pickle | July 31, 2012 at 01:19 PM
Very Good piece from HBR on the rapid introduction of big technology change in the large enterprise, including some consumer package goods examples. We experienced...Franz Dill From The Eponymous Pickle | July 31, 2012 at 01:06 PM
The following is a special contribution to this blog by Louiqa Raschid, a professor in the School of Business, Institute for Advanced Computer Studies, Department...Erwin Gianchandani From The Computing Community Consortium Blog | July 31, 2012 at 12:54 PM
Last time I posted some questions. Today I post the answer that I know.
Is there a subset of [0,1] that is uncountable and has measure 0? YES- take theCantor...GASARCH From Computational Complexity | July 31, 2012 at 12:24 PM
This is impressive:
The device has Bluetooth and Wi-Fi adapters, a cellular connection, dual Ethernet ports, and hacking and remote access tools that let security...schneier From Schneier on Security | July 31, 2012 at 11:30 AM
I'm really excited to be attending this year's Grace Hopper Celebration of Women in Computing in Baltimore, and I hope you'll consider going, too! Tomorrow is the...Gail Carmichael From The Female Perspective of Computer Science | July 30, 2012 at 09:30 PM
An idea we experimented with. In particular as new hires come on board expecting to communicate broadly with a social network. This makes some good points about...Franz Dill From The Eponymous Pickle | July 30, 2012 at 07:57 PM
A favorite topic of mine: Elements of the design and its story place the design in a human context.Franz Dill From The Eponymous Pickle | July 30, 2012 at 06:14 PM
This TED talk trots out the usual fear-mongering that technology leads to terrorism. The facts are basically correct, but there are no counterbalancing facts,...schneier From Schneier on Security | July 30, 2012 at 05:40 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Over on the left here is a picture of a group of young women who visited Microsoft in Cambridge MA recently as part of Boston University’s Artemis Project. This...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 30, 2012 at 03:37 PM
The Senate will consider cybersecurity legislation this week. Several amendments will be introduced and debated on the floor. July 31 Hearing: The Oversight of...David B. From U.S. Public Policy Committee of the ACM | July 30, 2012 at 03:33 PM