From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the HBR. design your own profession. Depends upon the local culture as to how successful this will be.Franz Dill From The Eponymous Pickle | January 14, 2012 at 07:24 PM
In ReadwriteWeb: Fascinating description of how Facebook is allowing the aggregate and statistical use of its data. What is described here is unstructured textual...Franz Dill From The Eponymous Pickle | January 14, 2012 at 03:52 AM
Yet another story that combines squid and security.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | January 13, 2012 at 10:19 PM
Somewhat obvious but useful examples of who and what to get together to better insure the success of a BI effort.Franz Dill From The Eponymous Pickle | January 13, 2012 at 08:50 PM
Long (but well-written and interesting) story of someone whose Gmail account was hacked and erased, and eventually restored. Many interesting lessons about the...schneier From Schneier on Security | January 13, 2012 at 06:58 PM
Worth a look. We worked with Herman Miller on innovation projects: PBS Eames documentary now online:If you're at all interFranz Dill From The Eponymous Pickle | January 13, 2012 at 06:55 PM
The Royal Society in Great Britain has just released a ground-breaking new report called Shut Down or Restart: The Way Forward for Computing in UK Schools which... From Computer Science Teachers Association | January 13, 2012 at 06:50 PM
As someone who is always looking for outreach opportunities with middle and high school students, I enjoyed The Guardian's recent article called Michael Gove to...Gail Carmichael From The Female Perspective of Computer Science | January 13, 2012 at 06:13 PM
It's a policy debate that's been going on since the crypto wars of the early 1990s. The FBI, NSA, and other agencies continue to claim they're losing their ability...schneier From Schneier on Security | January 13, 2012 at 12:58 PM
The National Institute of General Medicine Sciences (NIGMS), an institute of the National Institutes of Health (NIH) supporting basic research and research training...Erwin Gianchandani From The Computing Community Consortium Blog | January 13, 2012 at 12:17 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The other day Chris Bowen (thatAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | January 13, 2012 at 10:46 AM
Chapter twelve of the interaction-design.org resource is now available in preview. It deals with what HCI specialists call Experientia From Putting People First | January 13, 2012 at 10:30 AM
During the Pop!Tech conference, well known design researcher Jan Chipchase gave a talk about his research work. In the panel session an audience member asked two...Experientia From Putting People First | January 13, 2012 at 09:45 AM
A short post by Gartner on the proposed acquisition.. Some of the usual watch-outs with any acquisition. Certainly it is a means of bringing very specific retail...Franz Dill From The Eponymous Pickle | January 13, 2012 at 04:07 AM
Crowd sourcing prediction.. " ... Participate in competitions ... is an arena where you can match your data science skills against a global cadre of experts in...Franz Dill From The Eponymous Pickle | January 13, 2012 at 02:49 AM
In the Recorded Future Blog. A good look at IT in Pharmaceuticals using the temporal search engine Recorded Future. This search engine semantically analyzes...Franz Dill From The Eponymous Pickle | January 12, 2012 at 09:13 PM
I have a love/hate relationship with the CATO Institute. Most of their analysis I strongly disagree with, but some of it I equally strongly agree with. Last September...schneier From Schneier on Security | January 12, 2012 at 09:04 PM
The TSA claims that the cupcake they confiscated was in a jar. So this is a less obviously stupid story than I previously thought.schneier From Schneier on Security | January 12, 2012 at 08:39 PM
This week I'm at the Computability, Complexity and Randomness workshop at Dagstuhl in Germany. This meeting brings together two groups, complexity theorists and...Lance Fortnow From Computational Complexity | January 12, 2012 at 06:42 PM