From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
With brief registration, a reasonable look at the topic. I would prefer first a better definition of the topic as well. All analytics aims to be predictive,"...Franz Dill From The Eponymous Pickle | May 3, 2012 at 01:16 PM
Businesses now sit on data goldmines, but very few leverage the data to improve customer service. Ziba’s creative director Sean Madden suggests three ways forward...Experientia From Putting People First | May 3, 2012 at 01:12 PM
Social TV is a major disruption in the rapidly changing television industry. In the free report “Social TV and the second screen“, Stowe Boyd, acclaimed futurist...Experientia From Putting People First | May 3, 2012 at 01:03 PM
I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastlyThis...schneier From Schneier on Security | May 3, 2012 at 11:22 AM
I am giddy with pleasure to share Jennifer Chayes’ announcement that Microsoft Research is opening a new lab in New York City that will be filled with computational...zephoria From Apophenia | May 3, 2012 at 04:09 AM
Enemies sparking innovation. Martin Lindstrom writes an interesting piece about competition producing the need to innovate. Coke - Pepsi and Apple - Microsoft...Franz Dill From The Eponymous Pickle | May 3, 2012 at 03:00 AM
Calling data “a transformative new currency for science, engineering, education, and commerce,”Erwin Gianchandani From The Computing Community Consortium Blog | May 2, 2012 at 08:45 PM
Recently I attended NCWIT's Aspirations in Computing Southern California Awards Ceremony in Santa Ana, CA. Two students from my COSMOS (California State Summer... From Computer Science Teachers Association | May 2, 2012 at 06:25 PM
The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie.
Several weeks later...schneier From Schneier on Security | May 2, 2012 at 05:41 PM
Data discovery is not a term I have heard much recently. We experimented with the topic as part of a broader artificial intelligence program. It linked well with...Franz Dill From The Eponymous Pickle | May 2, 2012 at 02:34 PM
Students respond to yet another example of free online courses. This prototype example from MIT on Electrical Engineering. The knowledge is starting to spread...Franz Dill From The Eponymous Pickle | May 2, 2012 at 02:23 PM
A piece from the SAS blog on operationalizing business analytics. An important topic I am just working with " ... Business analytics is maturing Franz Dill From The Eponymous Pickle | May 2, 2012 at 02:15 PM
Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be.
We have...schneier From Schneier on Security | May 2, 2012 at 12:10 PM
A key insight into the UK Open Standards Consultation is that some of the opposition to truly open standards – ones without restrictions on implementation – comes...Simon Phipps From Wild WebMink | May 2, 2012 at 08:35 AM
The iconic Slashdot site has opened a new portal: SlashBI that focuses on business intelligence. " ... SlashBI is designed to offer the latest news and expert...Franz Dill From The Eponymous Pickle | May 2, 2012 at 06:17 AM
I used Google's Gmail Meter for the first time today. If you use Gmail for significant quantities of mail, it is an excellent way to understand your email uses...Franz Dill From The Eponymous Pickle | May 2, 2012 at 12:30 AM
I mentioned in a recent post that I had a conversations with Health Chain Solutions LLC: It was reported today that " ... they have been selected as the innovative...Franz Dill From The Eponymous Pickle | May 1, 2012 at 07:49 PM