From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves...schneier From Schneier on Security | November 29, 2011 at 08:13 PM
Steve Sands of SandsResearch reports on neuromarketing activity in China. The link below constains considerable detail: It's the fastest growing market and neuromarketing's...Franz Dill From The Eponymous Pickle | November 29, 2011 at 06:16 PM
I like doing things artfully, but I always prioritize being able to objectively understand and interact with data first beyond sheer 'Form'. Nevertheless the following...Franz Dill From The Eponymous Pickle | November 29, 2011 at 05:53 PM
Apache has been criticised for preventing new Incubator projects using Git. In its defence, some have claimed this is a criticism of the idea of the Foundation....Simon Phipps From Wild WebMink | November 29, 2011 at 04:12 PM
Gamification is certainly a hot topic these days. Jesse Schell opened Pandora's Box with his Visions of the Gamepocalypse talk. Sebastian Deterding discussedpromises...Gail Carmichael From The Female Perspective of Computer Science | November 29, 2011 at 04:06 PM
From The Computing Community Consortium Blog
An interesting computer security research result making news this morning — and stirring some controversy — courtesy of msnbc.com: Could a hacker from half-way...Erwin Gianchandani From The Computing Community Consortium Blog | November 29, 2011 at 01:11 PM
Electronic surveillance is becoming so easy that even marketers can do it:
The cellphone tracking technology, called Footpath, is made by Path Intelligence Ltd...schneier From Schneier on Security | November 29, 2011 at 01:01 PM
Aileen Lee, partner at venture firm Kleiner Perkins Caufield & Byers, believes that the best way to cost-effectively attract valuable users is harnessing a concept...Experientia From Putting People First | November 29, 2011 at 09:54 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
The Computer Science Teachers Association runs what I consider the single best and most important professional development events of the year for computer science...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | November 29, 2011 at 09:49 AM
The Speaker is BJ Fogg head of Stanford's Persuasive Technology lab who we used in several projects in the enterprise: Aetna sponsors a Challenge: " ... Seniors...Franz Dill From The Eponymous Pickle | November 29, 2011 at 04:20 AM
Towards a taxonomy of all things. Which would be a very useful thing but turns out to be quite difficult.Franz Dill From The Eponymous Pickle | November 29, 2011 at 03:45 AM
Innovative Guy Kawasaki visits Cincinnati and P&G and takes pictures of the background and industrial processes. I did something like this years ago but they didn't...Franz Dill From The Eponymous Pickle | November 29, 2011 at 03:42 AM
A recent paper out of Google, "Extracting Patterns From Location History" (PDF), is interesting not only for confirming that Google is studying using location data...Greg Linden From Geeking with Greg | November 28, 2011 at 09:54 PM
I'm the type of person who really does see computers and computer science everywhere. I can turn any situation or location into a discussion or eye-opening opportunity... From Computer Science Teachers Association | November 28, 2011 at 09:25 PM
Microsoft Research New England (MSRNE) is looking for PhD interns to join the social media collective for Spring and Summer 2012. For these positions, we are looking...zephoria From Apophenia | November 28, 2011 at 08:57 PM
Shichang Zhang, Teck Hui Koh, Wee Khee Seah, Yee Hing Lai, Mark A. Elgar, and Daiqin Li (2011), "A Novel Property of Spider Silk: Chemical Defence Against Ants,"...schneier From Schneier on Security | November 28, 2011 at 06:55 PM
The speed of many algorithms depends on how quickly you can multiply matrices or compute distances. In turn, these computations depend on the scalar product. Given...Daniel Lemire From Daniel Lemire's Blog | November 28, 2011 at 05:27 PM