From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I am a big proponent of mind mapping. Have used it for years. It is a great discipline, I use it on my laptop, tablet and smartphone. I can build maps and then...Franz Dill From The Eponymous Pickle | July 27, 2011 at 08:57 PM
Have been looking at how HTML5 will ultimately influence publishing online. A friend sent me this O'Reilly piece on EPUB3, which is worth looking at. We needEPUB3...Franz Dill From The Eponymous Pickle | July 27, 2011 at 07:31 PM
Matt Blaze analyzes the 2010 U.S. Wiretap Report.
In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical...schneier From Schneier on Security | July 27, 2011 at 07:10 PM
Yesterday saw the launch of the Open Cloud Initiative here at OSCON in Portland. It has the potential to steer the evolution of cloud computing just as the Open...Simon Phipps From Wild WebMink | July 27, 2011 at 05:30 PM
From today’s New York Times: A coalition of 28 American universities is throwing its weight behind a plan to build ultra-high-speed computer networks Erwin Gianchandani From The Computing Community Consortium Blog | July 27, 2011 at 05:09 PM
HBS Working Knowledge on Customer Loyalty Programs that Work. " ... The customer rewards cards that clutter wallets and clog key chains of many a shopper may soon...Franz Dill From The Eponymous Pickle | July 27, 2011 at 03:50 PM
An interesting example of how location based systems like Google Places can be used for franchise restaurants.Franz Dill From The Eponymous Pickle | July 27, 2011 at 03:45 PM
From Experientia. A review of what learning is all about. " ... Learning is a complex process with distinct stages, each with corresponding tasks and emotions....Franz Dill From The Eponymous Pickle | July 27, 2011 at 03:32 PM
Good article:
Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it's hard to mandate, or...schneier From Schneier on Security | July 27, 2011 at 11:44 AM
Learning is a complex process with distinct stages, each with corresponding tasks and emotions. Understanding how users learn can help us design experiences that...Experientia From Putting People First | July 27, 2011 at 11:08 AM
New research findings from a global study of education systems suggest that the promise of a hi-tech, high-skills, high-wage future for kids is a fantasy. Does...Experientia From Putting People First | July 27, 2011 at 11:01 AM
Jakob Nielsen has published a new report with 19 new case studies of enterprise portals. It finds slow growth in new features. The focus is instead on robust integration...Experientia From Putting People First | July 27, 2011 at 10:14 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
What is the difference between Hacking and programming? One opinion I have heard expressed is that a hacker can put a lot of code together in a hurry but if a change...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 27, 2011 at 10:01 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
If you are involved in K-12 computer science education you really owe it to yourself to join the Computer Science Teachers Association (CSTA) And if you are a member...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 26, 2011 at 10:47 PM
After a considerable delay Wal-Mart is integrating its purchased movie streaming service Vudu into Walmart.com. Reported in some detail in e-Commerce Times. "...Franz Dill From The Eponymous Pickle | July 26, 2011 at 09:31 PM
IEEE Spectrum presents: A Robot Film Festival. Nice selection that gives some hint at the future of robotics.Franz Dill From The Eponymous Pickle | July 26, 2011 at 06:43 PM
In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper:
The access control provided by a physical...schneier From Schneier on Security | July 26, 2011 at 06:28 PM