From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In a blog post, Niti Bhan, the head of Experientia’s Emerging Market Business Unit, writes about her realization that there is a huge gap in design for the next...Experientia From Putting People First | May 24, 2012 at 10:58 AM
Aljazeera’s The Stream reports on how people declare economic independence by establishing alternative currencies. “People and businesses are establishing micro...Experientia From Putting People First | May 24, 2012 at 06:54 AM
Cristian Norlin, master researcher at the Ericsson Research User Experience Lab, alerted me via Twitter to the Lab’s new blog. The User Experience Lab at Ericsson...Experientia From Putting People First | May 24, 2012 at 06:26 AM
From Putting People First
Site works also as a full-screen swipeable tablet web app Today granstudio, the international design studio based in Turin, launches its new website, created by...Experientia From Putting People First | May 24, 2012 at 05:57 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Back in the day when I went to a college with A computer room with A computer it was cool enough that there was a computer there and that it was available to students...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 24, 2012 at 12:59 AM
In ReadWwriteWeb: A look at how Google is reoriented search to include more semantic knowledge. And provides a connection to related knowledge.Franz Dill From The Eponymous Pickle | May 24, 2012 at 12:22 AM
Newly announced a System and equation modeling tool based on Mathematica.Have not looked deeper yet, but this appears to be quite impressive. The post linked to...Franz Dill From The Eponymous Pickle | May 23, 2012 at 05:53 PM
Interesting discussion of trust in this article on web hoaxes.
Kelly's students, like all good con artists, built their stories out of small, compelling details...schneier From Schneier on Security | May 23, 2012 at 05:32 PM
In Computerworld. NFC is a wireless transmission method, operating over a few centimeters, that is typically used for payment from smartphones. It is now being...Franz Dill From The Eponymous Pickle | May 23, 2012 at 12:47 PM
Interesting paper: "The Perils of Social Reading," by Neil M. Richards, from the Georgetown Law Journal.
Abstract: Our law currently treats records of our reading...schneier From Schneier on Security | May 23, 2012 at 12:25 PM
In order for designers to navigate the complex ecosystem of digital platforms, they’ll need to master business modeling and become comfortable working across disciplines...Experientia From Putting People First | May 23, 2012 at 08:37 AM
Good examination of power laws in the newly revived Exploring Complexity blog. An important idea that is introduced clearly here.Franz Dill From The Eponymous Pickle | May 23, 2012 at 02:57 AM
Last night I ran my last STOC business meeting as SIGACT chair. It was a three-hour affair until the hotel staff kicked us out at midnight. Lots of highlights.online...Lance Fortnow From Computational Complexity | May 23, 2012 at 02:26 AM
As I prepare to meet with a local School Board member and a magnet high school principal to discuss implementing computer programming in the high school, I have... From Computer Science Teachers Association | May 22, 2012 at 07:41 PM
"Roots of Racism," by Elizabeth Culotta in Science:
Our attitudes toward outgroups are part of a threat-detection system that allows us to rapidly determine friend...schneier From Schneier on Security | May 22, 2012 at 06:10 PM
Popper argued that science should be falsifiable. To determine truth, we simply try to disprove an hypothesis until we are exhausted. It is a nice theory, but actual...Daniel Lemire From Daniel Lemire's Blog | May 22, 2012 at 02:25 PM