From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This semester I am teaching two sections of Web Page Design. This is the third year that I have taught the class at the high school level, but I still struggle... From Computer Science Teachers Association | February 4, 2012 at 08:05 PM
Good post on the topic. I find many groups are uncertain about how to manage the process of working with analytics. And they are also unclear about how to deal...Franz Dill From The Eponymous Pickle | February 4, 2012 at 06:29 PM
In the Atlantic: In an edited excerpt from his new book, Too Big to Know, David Weinberger explains how the massive amounts of data necessary to deal with complex...Franz Dill From The Eponymous Pickle | February 4, 2012 at 06:08 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The Bipartisan Policy Center released a report last Friday — Transforming Health Care: The Role of Health IT – emphasizing the critically important role that health...Erwin Gianchandani From The Computing Community Consortium Blog | February 4, 2012 at 12:40 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM
Sands Research sends along an item and commentary pointing to an article in the WSJ on how Super Bowl ad companies use neuromarketing methods to test modifications...Franz Dill From The Eponymous Pickle | February 3, 2012 at 06:59 PM
Good post by Laura Mikovsky on Enterprise Performance management from SAP. A classic need for the enterprise. A typical dashboard BI application. How are various...Franz Dill From The Eponymous Pickle | February 3, 2012 at 06:36 PM
In a move to consumer driven demand, Food Lion shares data: " ... Food Lion is working on changing the way CPG vendors such as PepsiCo replenish its distribution...Franz Dill From The Eponymous Pickle | February 3, 2012 at 05:55 PM
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...schneier From Schneier on Security | February 3, 2012 at 04:49 PM
Tricia Wang of UCSD’s Department of Sociology and Barry Brown of the Mobile Life VINN Excellence Center Stockholm presented the paper “Ethnography of the telephone...Experientia From Putting People First | February 3, 2012 at 02:31 PM
I know you have been reading me write about Kinect for Windows for a while now so why is this news? The reason for that is simple Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 3, 2012 at 10:07 AM
An excellent piece by Ed Burghard on effective conflict management. Most people do not deal well with conflict, and this chkeclist of possible solutions can be...Franz Dill From The Eponymous Pickle | February 3, 2012 at 02:43 AM
From The Computing Community Consortium Blog
Back in October, we told you about the ninth International Science & Engineering Visualization ChallengeErwin Gianchandani From The Computing Community Consortium Blog | February 2, 2012 at 10:37 PM
An interview with a pharmaceutical industry analyst on the BBC today illustrated a key point about patents and reminds us they are about stimulating, not rewarding...Simon Phipps From Wild WebMink | February 2, 2012 at 08:33 PM
Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value:
Over all, there are now more people under "correctional...schneier From Schneier on Security | February 2, 2012 at 03:04 PM