From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Design thinking and techniques can help create radical innovations needed to meet the challenges facing local communities and services, says Philip Colligan, executive...Experientia From Putting People First | September 9, 2011 at 11:46 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Innovation! What is is and how can we teach it to children? Big questions today as many of us believe that innovation in many forms is absolutely critical to success...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 9, 2011 at 09:55 AM
See former colleague Krista Neher's Boot Camp Digital. Local Social media tips and tricks. Great stuff. "Krista really knows her stuff re: social media. She...Franz Dill From The Eponymous Pickle | September 9, 2011 at 04:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Coding a game from scratch is hard. Make no mistake about there is a lot to it. OF course many people, especially students, think they are all ready to create the...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 8, 2011 at 05:50 PM
Had completely missed this idea in Google Docs: Fusion Tables. " ... a new option in Google Docs: creating tables. It seems that Google Docs started to integrate...Franz Dill From The Eponymous Pickle | September 8, 2011 at 02:42 PM
A clever, simple idea that also depends much on how it is implemented. An open infrastructure that is all about delivering badges for acquiring skills. Much...Franz Dill From The Eponymous Pickle | September 8, 2011 at 02:00 PM
I've already written about secret questions, the easier-to-guess low-security backup password that sites want you to have in case you forget your harder-to-remember...schneier From Schneier on Security | September 8, 2011 at 11:14 AM
One of the great accomplishments of the 19th century was the electric motor. Converting electrical energy to controllable mechanical energy. Now a single molecule...Franz Dill From The Eponymous Pickle | September 8, 2011 at 05:55 AM
In Junk Charts they illustrate one of my favorite examples of poor data visualization. It is the use of bar charts without using scales that start at zero. This...Franz Dill From The Eponymous Pickle | September 8, 2011 at 05:42 AM
This is now live. Have not tried it yet, but plan to. Need a reworking of my blog format and capabilities.Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:46 AM
Grow from Within: Mastering Corporate Entrepreneurship and Innovation by Robert Wolcott and Michael Lippitz. Now on my stack of things to read. Recently heard...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:40 AM
Some excellent examples of the use of the Statistical/visualization/data mining language R for a number of real applications. Have started to use it more myself...Franz Dill From The Eponymous Pickle | September 8, 2011 at 12:21 AM
When I posted on sequence problems
here
some people said that they did not have unique answers.
Many problems FORMALLY do not have a unique answer, but common sense...GASARCH From Computational Complexity | September 7, 2011 at 11:58 PM
In Mediapost: More must be more done to quantify how neuromarketing results are used. What are useful metrics?Franz Dill From The Eponymous Pickle | September 7, 2011 at 10:46 PM
A paper by six Googlers from the recent KDD 2011 conference, "Detecting Adversarial Advertisements in the Wild" (PDF) is a broadly useful example of how to succeed...Greg Linden From Geeking with Greg | September 7, 2011 at 09:00 PM
Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...schneier From Schneier on Security | September 7, 2011 at 07:32 PM
Following up on my general impressions of SIGGRAPH I wanted to write about a few of the games paper presentations I enjoyed seeing at the conference. I paid most...Gail Carmichael From The Female Perspective of Computer Science | September 7, 2011 at 06:49 PM
Interesting article on how difficult it is to keep an identity secret in the information age. schneier From Schneier on Security | September 7, 2011 at 11:17 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
IF you missed it live (like I did) you can now view the recording of the Windows Phone Mango Jump Start training on Channel 9. I borrowed these direct links from...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | September 7, 2011 at 09:34 AM