From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...schneier From Schneier on Security | April 18, 2012 at 11:49 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
And fun as well. Recently a co-worker sent me a link to some videos that were done by the Houston Independent School District about the pilot program they are running...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 18, 2012 at 10:16 AM
Artefact is, like Experientia, a UX design consultancy that is strongly inspired by cognitive and behavioral modeling, and uses all kinds of inputs from cognitive...Experientia From Putting People First | April 18, 2012 at 08:54 AM
Tricia Wang is a cultural sociologist interested in understanding how people use digital tools in their day to day lives. In her talk at the Lift 12 conference,...Experientia From Putting People First | April 18, 2012 at 08:38 AM
Richard MacManus writes on ReadWriteWeb that the next generation of in-car apps will be about providing “smart” services, such as taking some of the cognitive load...Experientia From Putting People First | April 18, 2012 at 08:32 AM
In an extensive article by Charles Arthur, technology editor of The Guardian, on the rise of walled gardens (apps, social networks) on the net, we read this quote...Experientia From Putting People First | April 18, 2012 at 06:47 AM
I enjoyed the final paragraph of the Fast.CoDesign article on the second generation Nest Thermostat: “HereExperientia From Putting People First | April 18, 2012 at 06:32 AM
Within the next decade, smart-device swiping will have gained mainstream acceptance as a method of payment and could largely replace cash and credit cards for most...Experientia From Putting People First | April 18, 2012 at 06:20 AM
Wired UK has published a guest post by Usman Haque, founder of Pachube.com and director at Haque Design + Research and CEO of Connected Environments, where he argues...Experientia From Putting People First | April 18, 2012 at 06:15 AM
A very detailed DARPA challenge for robotics in the area of disaster response. In IEEE spectrum. I have been surprised that more has not been done in this context...Franz Dill From The Eponymous Pickle | April 18, 2012 at 05:00 AM
See correspondent Lisa Kaczmarczyk's book:Computers and Society: Computing for Good contains in-depth case studies with extensive, thought provoking end of chapter...Franz Dill From The Eponymous Pickle | April 18, 2012 at 02:32 AM
In E-Commerce Times: Some useful thoughts about the process and the needs for expertise. Its never all about the tools:" ... Considering the large number of...Franz Dill From The Eponymous Pickle | April 17, 2012 at 08:28 PM
Rescentris just brought to my attention. We worked on Electronic Laboratory Notebook (ELN) systems that could be signed and witnessed some time ago. Most recently...Franz Dill From The Eponymous Pickle | April 17, 2012 at 08:23 PM
I have been following the Aimia group for a while now. More news. " ... Self Serve, a proprietary program through Sobeys' partnership with analytics firm Aimia...Franz Dill From The Eponymous Pickle | April 17, 2012 at 07:51 PM
That's a nice turn of phrase:
Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...schneier From Schneier on Security | April 17, 2012 at 06:22 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The SIGCSE mailing list has been having a very active discussion of plagiarism in computer science classes of late. These discussions seem to recur with disappointing...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | April 17, 2012 at 03:37 PM
Later this month, the best and brightest cyber defense students from 10 universities throughout the country will descend on San Antonio, TX, for the 8th annual...Erwin Gianchandani From The Computing Community Consortium Blog | April 17, 2012 at 12:30 PM
From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community."
In war you will generally find that the...schneier From Schneier on Security | April 17, 2012 at 11:15 AM
Yesterday I had the pleasure of meeting with Bill Mitchell, Director of the BCS Academy of Computing in the United Kingdom (UK). It was interesting to chat with... From Computer Science Teachers Association | April 17, 2012 at 10:03 AM