From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Have been involved in a major supply chain analysis lately. It was an area I worked in early in my career. This Economist article discusses the effect of the...Franz Dill From The Eponymous Pickle | April 3, 2011 at 01:04 PM
In Roughtype: As a foodie much interested in how we interact with information about food and recipes online I found this quite interesting. How recipes are searched...Franz Dill From The Eponymous Pickle | April 2, 2011 at 08:26 PM
UW Madison has responded to the Open Records Request regarding Professor Cronon (which I mentioned here). Here's a link to the Chancellor's message as well asUW...Michael Mitzenmacher From My Biased Coin | April 2, 2011 at 07:01 PM
In Technology Review: About Google's +1, searching and social networks. Letting your friends help prioritize search results. Like the old idea of letting friends...Franz Dill From The Eponymous Pickle | April 2, 2011 at 02:07 PM
The Number Guy blogs about statistical significance. A frequently asked question: Is it significant? And it turns out often a troublesome concept. Don't let...Franz Dill From The Eponymous Pickle | April 2, 2011 at 01:40 PM
The Marketing Science Institute has created a web site that celebrates its 50th anniversary. Some interesting links and features.Franz Dill From The Eponymous Pickle | April 2, 2011 at 03:11 AM
Finding spam using fuzzy hashing and other uses. " ... 'Fuzzy hashing' was invented to flag spam emails, but has found application in everything from malware detection...Franz Dill From The Eponymous Pickle | April 1, 2011 at 08:11 PM
From The Computing Community Consortium Blog
There’s anErwin Gianchandani From The Computing Community Consortium Blog | April 1, 2011 at 05:59 PM
Editor's Note: Candidates for the upcoming CSTA election have been invited to post brief blog statements so that members can have a chance to get to know them
... From Computer Science Teachers Association | April 1, 2011 at 05:23 PM
For April Fool’s Day, Wikipedia editors have collected such a wonderful set of links and articles that it seems a shame to let it perish in the daily update. So...Simon Phipps From Wild WebMink | April 1, 2011 at 03:34 PM
I conjecture that, everything else being equal, the level of your education is inversely correlated with innovation. At first, a new idea appears interesting, but...Daniel Lemire From Daniel Lemire's Blog | April 1, 2011 at 02:21 PM
Creepy app warns of an end to privacy The biggest threat to your privacy is not the disclosure of any one piece of data. It's triangulation across all the data...Simon Phipps From Wild WebMink | April 1, 2011 at 01:01 PM
A CS vision professor once told me "Of course we know there is an efficient algorithm for that humans can do it." Are we just nothing more than Turing machines...Lance From Computational Complexity | April 1, 2011 at 12:50 PM
For geolocation developers:" .... SimpleGeo's hosted spatial database service Storage was released from private beta. This is the flagship product from the company...Franz Dill From The Eponymous Pickle | April 1, 2011 at 12:31 PM
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...schneier From Schneier on Security | April 1, 2011 at 11:58 AM
Major emphasis on user-centred design, open innovation and social innovation in new EU innovation strategy On 6 October 2010, the European Commission adopted the...Experientia From Putting People First | April 1, 2011 at 10:59 AM
Earlier this year, the NAE and IOM, along with Health 2.0, announced a challenge for college students throughout the U.S., to create new apps or tools that use...Erwin Gianchandani From The Computing Community Consortium Blog | April 1, 2011 at 03:18 AM
@jzbJoe Brockmeier Microsoft is going to the EU about Google being anticompetitive. That's like Jack the Ripper going to the cops for getting mugged. about 18 hours...Simon Phipps From Wild WebMink | April 1, 2011 at 02:28 AM