From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...schneier From Schneier on Security | February 21, 2012 at 01:36 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Over the weekend, the ACM/IEEE-CS Computer Science Curricula 2013 committee (of which I am a member) released the first public from this effort. (The announcement...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 21, 2012 at 10:44 AM
Adrian Chan, social media expert and social interaction theorist at Gravity7, has written a long essay to collect his thoughts on social interaction design. “Imperfect...Experientia From Putting People First | February 21, 2012 at 09:30 AM
With Apple, Inc. having the largest market capitalization of any company in the world, and an endless stream of CEOs and pundits talking about the importance of...Experientia From Putting People First | February 21, 2012 at 09:17 AM
UX matters posted yesterday four new articles: The world of services user experience By Baruch Sachs In a services organization, you are not only the UX expert,...Experientia From Putting People First | February 21, 2012 at 09:13 AM
I agree that EMail is becoming increasingly hard to deal with. Too much, too messy, and hard to deal with as an efficient means to store knowledge. These former...Franz Dill From The Eponymous Pickle | February 21, 2012 at 07:58 AM
A survey of CIO's indicates that " ... Analytics/business intelligence was the top-ranked technology for 2012 as CIOs are combining analytics with other technologies...Franz Dill From The Eponymous Pickle | February 21, 2012 at 04:43 AM
DemandTec is now an IBM Company, but I am continuing to make my way through their solution briefs for retail. This week I took a look at one that I had not reviewed...Franz Dill From The Eponymous Pickle | February 21, 2012 at 04:12 AM
One of the more interesting pieces of non-solicited email that I received this morning offered to help me teach like a rock star. I have to admit, the promotional... From Computer Science Teachers Association | February 20, 2012 at 07:38 PM
Now finally and firmly established as an independent entity, The Document Foundation and LibreOffice are a refreshing story of community triumphing over adversity...Simon Phipps From Wild WebMink | February 20, 2012 at 07:21 PM
In GigaOM: Metadata linked to location.SpaceCurve, a Seattle-based startup pushing a database designed for location data, has raised $2.7 million on the promise...Franz Dill From The Eponymous Pickle | February 20, 2012 at 04:56 PM
From The Computing Community Consortium Blog
Last week, the World Economic Forum’s Global Agenda Council on Emerging Technologies released a consensus list — the result of input from “some of the world’s leading...Erwin Gianchandani From The Computing Community Consortium Blog | February 20, 2012 at 04:28 PM
Particularly useful for point-of-sale applications. Press release. " ... New West Technologies partners with Enterasys Networks and Honeywell to offer secure...Franz Dill From The Eponymous Pickle | February 20, 2012 at 04:27 PM
Following the fall of the USSR, hundreds of world class mathematicians emigrated to the USA. Intuitively, this should have made American mathematics stronger. Did...Daniel Lemire From Daniel Lemire's Blog | February 20, 2012 at 04:10 PM
The Children’s Online Privacy Protection Act (COPPA) was created to prevent corporations from collecting data about children without parental permission. This law...zephoria From Apophenia | February 20, 2012 at 03:55 PM
About 25 years ago I visited a college friend, David Jackson, then a grad student at Texas A&M. He was a Ph.D. student in Food Science doing his doctorate research...Lance Fortnow From Computational Complexity | February 20, 2012 at 03:13 PM
Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...schneier From Schneier on Security | February 20, 2012 at 12:30 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
I read an article recently about a commercial drone being shot down. Then this NYT article about how commercial drones are now allowed in general. Heard ofA...Franz Dill From The Eponymous Pickle | February 20, 2012 at 07:31 AM
Colleague Walter Riker sends along an interesting application for QR codes. Using them as a contactless time and attendance system. Simple idea. See theTimestation...Franz Dill From The Eponymous Pickle | February 20, 2012 at 02:09 AM