From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Your photos, status updates and tweets will fascinate future historians. Will these online remains last forever? In this special report, newscientist.com editor...Experientia From Putting People First | May 7, 2011 at 08:09 PM
From The Computing Community Consortium Blog
There’s a great article in today’sErwin Gianchandani From The Computing Community Consortium Blog | May 7, 2011 at 04:52 PM
Skype bug gives attackers access to Mac OS X machines Serious, exploitable bug in the Mac version of Skype. Best not to run Skype until they have it fixed. Actually...Simon Phipps From Wild WebMink | May 7, 2011 at 01:01 PM
Today at UC, Heard Marshall Fisher talk about work in chapter 2 of his book: The New Science of Retailing: How Analytics are Transforming the Supply Chain andhis...Franz Dill From The Eponymous Pickle | May 7, 2011 at 02:51 AM
Ooo, this one is important. A clever and very fun paper, "Hyper-Local, Direction-Based Ranking of Places" (PDF), will be presented at VLDB 2011 later this year...Greg Linden From Geeking with Greg | May 6, 2011 at 08:26 PM
Prompted by the massive data breaches of Sony's networks, the Subcommittee on Commerce, Manufacturing and Trade of the House Energy and Commerce Committee held... From U.S. Public Policy Committee of the ACM | May 6, 2011 at 08:16 PM
I’ve read the USTR‘s Special 301 report so you don’t have to. The worrying conclusions are over on ComputerWorldUK.Simon Phipps From Wild WebMink | May 6, 2011 at 05:45 PM
A scary development in rootkits:
Rootkits typically modify certain areas in the memory of the running operating system (OS) to hijack execution control from the...schneier From Schneier on Security | May 6, 2011 at 05:32 PM
In Fast Company, well worth understanding: Marissa Mayer Talks Location Strategy: The longtime VP tells us how a simple call for a pizza delivery influences...Franz Dill From The Eponymous Pickle | May 6, 2011 at 12:55 PM
The National Library of Medicine has announced a software development challenge, seeking innovative software applications that use the library’s vast and free biomedical...Erwin Gianchandani From The Computing Community Consortium Blog | May 6, 2011 at 12:50 PM
Another example of location based interaction with retail and warehouse:" ... There are many business situations when you need to know Franz Dill From The Eponymous Pickle | May 6, 2011 at 12:19 PM
Here's a clever Web app that locates your stolen camera by searching the EXIF data on public photo databases for your camera's serial number.
schneier From Schneier on Security | May 6, 2011 at 12:01 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of the things that I tell students when I do career talks is that it has never been easier to start a software business than it is today. Many great companies...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | May 6, 2011 at 11:20 AM
Something I could have used a long time ago, an add-in that does fuzzy look up in Excel. Thanks.Franz Dill From The Eponymous Pickle | May 6, 2011 at 04:56 AM
I continue to be impressed by Tableau's easy to use BI system, now providing mobile solutions, and touch interaction:" ... Tableau 6.1 provides many new and exciting...Franz Dill From The Eponymous Pickle | May 6, 2011 at 12:28 AM