From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
We have followed some of the work on measuring emotion from facial expression, here from MIT spin off Affectiva. We tested their methods pioneered at the Media...Franz Dill From The Eponymous Pickle | July 20, 2011 at 03:47 PM
Imagine finding yourself in the front foyer of what is probably a haunted mansion with a few of your closest friends. There's no way out, since the front door is...Gail Carmichael From The Female Perspective of Computer Science | July 20, 2011 at 02:48 PM
I am looking for reviewers for the following books for my
SIGACT NEWS book review column.
I will try to edit this post to keep the list up to date;
however, ifthis...GASARCH From Computational Complexity | July 20, 2011 at 02:09 PM
A few weeks ago, we began highlighting a few of the 107 Computing Innovation Fellows (CIFellows) we’ve had the pleasure of funding.Erwin Gianchandani From The Computing Community Consortium Blog | July 20, 2011 at 01:29 PM
(English translation of article published yesterday in La Stampa newspaper – author Andrea Rossi): Michigan delegation between the cabbages and the red peppers...Experientia From Putting People First | July 20, 2011 at 11:47 AM
This is interesting:
As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...schneier From Schneier on Security | July 20, 2011 at 11:23 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
This Summer, build Windows Phone 7 apps and you could earn exciting prizes to catch a movie, eat ice – cream, buy camping gear and more!! This special competition...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 20, 2011 at 09:15 AM
Some of what has caught my attention recently:Netflix may have been forced to change its pricing by the movie studios. It appears the studios may have made streaming...Greg Linden From Geeking with Greg | July 19, 2011 at 11:12 PM
The police arrested sixteen suspected members of the Anonymous hacker group.
Whatever you may think of their politics, the group committed crimes and their members...schneier From Schneier on Security | July 19, 2011 at 07:50 PM
ReadwriteWeb on the topic via an Infographic. The topic itself is interesting.The infographic use is confusing. At first I thought it was an ad. Then noticed...Franz Dill From The Eponymous Pickle | July 19, 2011 at 06:52 PM
Excellent post by MJ Perry about Wal-Mart as the most successful retailer in history. Some fascinating stats on the retailer and its operation.Franz Dill From The Eponymous Pickle | July 19, 2011 at 02:48 PM
I became interested in a new recommendation smartphone App called Alfred, which recommends restaurants, etc, It is glowingly described and reviewed in ReadwriteWeb...Franz Dill From The Eponymous Pickle | July 19, 2011 at 02:43 PM
FLOSS: Accept no substitutes | ITworld These sorts of scams were a serious problem that we spent a great deal of thought addressing in connection with OpenOffice...Simon Phipps From Wild WebMink | July 19, 2011 at 01:02 PM
The main conclusion of the Behaviour Change report, published today by the UK House of Lords Science and Technology Sub-Committee, is that ‘nudging’ on its own...Experientia From Putting People First | July 19, 2011 at 11:24 AM
From Putting People First
Interestingly, the badly designed user interface of the in-car telematics system was the primary gripe among Ford and Lincoln owners and lessees in the latest J...Experientia From Putting People First | July 19, 2011 at 11:11 AM
Allison Arieff talks in her New York Times Opinionator blog about the design of work. Paraphrasing Nathan Shedroff, she states that furniture is not the problem...Experientia From Putting People First | July 19, 2011 at 10:41 AM
This is really clever:
Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...schneier From Schneier on Security | July 19, 2011 at 10:27 AM
Have you been working with Small Basic? If so you probably know that it has officially been pre-release software. Well not it is released software and you can now...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | July 19, 2011 at 09:13 AM