From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Grow from Within: Mastering Corporate Entrepreneurship and Innovation by Robert Wolcott and Michael Lippitz. Now on my stack of things to read. Recently heard...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:40 AM
Some excellent examples of the use of the Statistical/visualization/data mining language R for a number of real applications. Have started to use it more myself...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:21 AM
When I posted on sequence problems
here
some people said that they did not have unique answers.
Many problems FORMALLY do not have a unique answer, but common sense...GASARCH From Computational Complexity | September 7, 2011 at 11:58 PM
In Mediapost: More must be more done to quantify how neuromarketing results are used. What are useful metrics?Franz Dill From The Eponymous Pickle | September 7, 2011 at 10:46 PM
A paper by six Googlers from the recent KDD 2011 conference, "Detecting Adversarial Advertisements in the Wild" (PDF) is a broadly useful example of how to succeed...Greg Linden From Geeking with Greg | September 7, 2011 at 09:00 PM
Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...schneier From Schneier on Security | September 7, 2011 at 07:32 PM
Following up on my general impressions of SIGGRAPH I wanted to write about a few of the games paper presentations I enjoyed seeing at the conference. I paid most...Gail Carmichael From The Female Perspective of Computer Science | September 7, 2011 at 06:49 PM
Interesting article on how difficult it is to keep an identity secret in the information age. schneier From Schneier on Security | September 7, 2011 at 11:17 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
IF you missed it live (like I did) you can now view the recording of the Windows Phone Mango Jump Start training on Channel 9. I borrowed these direct links from...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 7, 2011 at 09:34 AM
Through Stanford University lectures and a project, coordinated by Scott Klemmer, learn the fundamentals of human-computer interaction and design thinking. The...Experientia From Putting People First | September 7, 2011 at 08:25 AM
A couple of videos sent to me that illustrate the topics in Martin Lindstrom's forthcoming book: Brandwashed: Tricks Companies Use to Manipulate Our Minds and Persuade...Franz Dill From The Eponymous Pickle | September 7, 2011 at 04:58 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Labor Day in the US means a three-day weekend and I took advantage of it. I’d like to make note of a couple of my recent posts that seem to have more in common...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 7, 2011 at 03:39 AM
Thoughtful piece, a great place to start thinking about why you should manage information at all:The Path to Information Management NirvanaSimilar to MaslowFranz Dill From The Eponymous Pickle | September 6, 2011 at 11:37 PM
In GigaOM. "Marketers have long believed that some customers have a disproportionate influence on others when it comes to purchase decisions, and they have tried...Franz Dill From The Eponymous Pickle | September 6, 2011 at 11:06 PM
New research: Adrian J. Lee and Sheldon H. Jacobson (2011), "The Impact of Aviation Checkpoint Queues on Optimizing Security Screening Effectiveness," Reliability...schneier From Schneier on Security | September 6, 2011 at 08:29 PM
Well, it's back to school time and most of us have done some professional development over the summer to rejuvenate and enhance what we are doing in the classroom... From Computer Science Teachers Association | September 6, 2011 at 06:42 PM
Many systems are self-regulatory. For example, in a few market, prices will fluctuate until everyone gets a fair price. But free markets are a mathematical abstraction...Daniel Lemire From Daniel Lemire's Blog | September 6, 2011 at 03:37 PM
(FOCS registration is open:
here.
Note that there are tutorials on Sat Oct 22 and the conference talks are
Sun Oct 23-Tues Oct 25.)
(Guest post by By Jeffery...GASARCH From Computational Complexity | September 6, 2011 at 02:29 PM
Congress has returned from its August recess. The Fiscal Year 2012 budget should be high on the agenda, as that year starts October 1. September 7 Hearing The Senate...David B. From U.S. Public Policy Committee of the ACM | September 6, 2011 at 02:20 PM
From Foreign Policy: "Why Is It So Hard to Find a Suicide Bomber These Days?" And from Stratfor: "Why al Qaeda is Unlikely to Execute Another 9/11."
Me from May...schneier From Schneier on Security | September 6, 2011 at 12:03 PM