From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
From AnalyticsBridge: An interesting paper that addresses the process. Somewhat overplayed in my opinion, but it is worth a look for alternatives to design...Franz Dill From The Eponymous Pickle | March 22, 2012 at 12:58 AM
This saw considerable press a few weeks ago. The P&G detergent Tide being used as a 'currency' for criminals. And becoming the object of theft. Not because...Franz Dill From The Eponymous Pickle | March 21, 2012 at 06:33 PM
Using game dynamics to prevent support agent burnout. A reasonable area of application since it includes tiresome tasks, but is it reasonably scalable?Franz Dill From The Eponymous Pickle | March 21, 2012 at 06:25 PM
From The Computing Community Consortium Blog
In IEEE’s SpectrumErwin Gianchandani From The Computing Community Consortium Blog | March 21, 2012 at 04:44 PM
FutureScapes, an open collaboration project by Sony and Forum for the Future, aims to bring together a range of expert thinkers, designers, futurologists, writers...Experientia From Putting People First | March 21, 2012 at 03:19 PM
Earlier this month, the National Coordination Office (NCO) for the Networking and Information Technology Research and Development (NITRD) Program — the Federal...Erwin Gianchandani From The Computing Community Consortium Blog | March 21, 2012 at 12:46 PM
Helsinki Street Eats: a book about everyday food By Bryan Boyer and Dan Hill, with contributions from Ville Tikka, Nuppu GExperientia From Putting People First | March 21, 2012 at 12:00 PM
A way to securely erase paper:
"The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...schneier From Schneier on Security | March 21, 2012 at 11:26 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Being somewhat opinionated about the subject (who am I kidding Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | March 21, 2012 at 11:08 AM
From Consumer Goods Technology: " ... Unilever's Open Innovation team launched a new online platform, which offers experts the opportunity to help the company...Franz Dill From The Eponymous Pickle | March 21, 2012 at 03:29 AM
Additional Cloud risks. The danger of legal actions in the Cloud. A recent example shows the danger.Franz Dill From The Eponymous Pickle | March 21, 2012 at 03:17 AM
Starting in July, I'll be chair of the School of Computer Science in the College of Computing at Georgia Tech. Annie AntLance Fortnow From Computational Complexity | March 20, 2012 at 08:26 PM
The March issue of the CSTA Voice (see p. 4-5) includes a look at some state-by-state results from the 2011 National Secondary Computer Science Survey . AsCertification... From Computer Science Teachers Association | March 20, 2012 at 07:59 PM
An NFC enabled print ad for Lexus in Wired Magazine. Readable from NFC enabled phones or other devices. Why this versus a QR code? I have not tried the phone...Franz Dill From The Eponymous Pickle | March 20, 2012 at 07:50 PM
From ComputerWorld a post on the applicability of the new iPad to business. Personnally I do not plan to upgrade from the '2' unless I need to utilize or test...Franz Dill From The Eponymous Pickle | March 20, 2012 at 07:14 PM
We sometimes measure the caliber of a researcher by how many research papers he wrote. This is silly. While there is some correlation between quantity and quality...Daniel Lemire From Daniel Lemire's Blog | March 20, 2012 at 05:26 PM
Can your life processes be gamified? Can you adjust your more mundane tasks by using game dynamics> This article looks at Apps that claim to do this. Had only...Franz Dill From The Eponymous Pickle | March 20, 2012 at 02:10 PM
A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph:
At a closed-door briefing, the senators were shown howtake...schneier From Schneier on Security | March 20, 2012 at 01:52 PM