From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A book by Keith Kelsen I just discovered: Unleashing the Power of Digital Signage. This was a big topic of the retail innovation center. How do you successfully...Franz Dill From The Eponymous Pickle | September 25, 2011 at 04:29 PM
It is clear that every enterprise is scaling up their gathering of data, and especially getting closer to real time acquisition. New sensors in everyone's pocket...Franz Dill From The Eponymous Pickle | September 24, 2011 at 04:29 PM
A Brief History of the Emoticon. The transferal of emotional hints remains an important and unsolved issue in electronic communications. I think it needs a further...Franz Dill From The Eponymous Pickle | September 24, 2011 at 03:57 PM
A Bookworm interface for an open library. " ... Bookworm demonstrates a new way of interacting with the millions of recently digitized library books. The Harvard...Franz Dill From The Eponymous Pickle | September 24, 2011 at 04:16 AM
There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female.
This unusual behaviour, they...schneier From Schneier on Security | September 23, 2011 at 09:28 PM
Yesterday, Senator Bob Casey (D-Pennsylvania) and Representative Jared Polis (D-Colorado) introduced legislation to strengthen computer science education in the...David B. From U.S. Public Policy Committee of the ACM | September 23, 2011 at 09:07 PM
It's the Browser Exploit Against SSL/TLS Tool, or BEAST:
The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...schneier From Schneier on Security | September 23, 2011 at 06:37 PM
Traditional market research or neuromarketing methods? I have always believed that it is worth thinking of neuromarketing methods as an augmentation of traditional...Franz Dill From The Eponymous Pickle | September 23, 2011 at 04:50 PM
Local company ThinkVine, who I have have talked to now for a number of years, has been a leader in marketing mix and promotion analysis work,using unique simulation...Franz Dill From The Eponymous Pickle | September 23, 2011 at 04:20 PM
For those of you wondering what the heck I've been up to lately research-wise, wonder no longer! Here's a snapshot of what I've been working on lately and planCognitive...Gail Carmichael From The Female Perspective of Computer Science | September 23, 2011 at 02:56 PM
In E-Commerce Times: A good look at what is called marketing automation. Is it science or not? Or just a way to push for attention.Franz Dill From The Eponymous Pickle | September 23, 2011 at 02:27 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the big issues with computer science education is that it is not an integral part of the curriculum It is almost always an elective and doesnAlfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 23, 2011 at 01:55 PM
Getting closer to practical computing. " ... Physicists find quantum versions of both feedback control and classical computer architecture ... " Franz Dill From The Eponymous Pickle | September 23, 2011 at 01:54 PM
Bill has a lot of posts where he questions whether to teach Mahaney's theorem in a graduate complexity class. Since it is one of my favorite theorems and most of...Lance From Computational Complexity | September 23, 2011 at 01:07 PM
The National Science Foundation has issued a solicitation for its East Asia and Pacific Summer Institutes (EAPSI), providing U.S. science and engineering graduate...Erwin Gianchandani From The Computing Community Consortium Blog | September 23, 2011 at 12:21 PM
We all know that teen bullying – both online and offline – has devastating consequences. Jamey Rodemeyer’s suicide is a tragedy. He was tormented for being gay....zephoria From Apophenia | September 23, 2011 at 11:21 AM
On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...schneier From Schneier on Security | September 23, 2011 at 11:17 AM
This proposal is worth thinking about.
Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...schneier From Schneier on Security | September 23, 2011 at 10:22 AM
Just received from notable gamification vendor Bunchball. Some nice ideas embedded here, and where better to try gamification than with a heavily extroverted...Franz Dill From The Eponymous Pickle | September 23, 2011 at 08:27 AM
Khoi Vinh reflects on the fact (and the user experience) that almost everything on all of his computers and all of his mobile devices can only be accessed with...Experientia From Putting People First | September 23, 2011 at 06:26 AM