From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This afternoon, I met with a couple of Stanford seniors to advise them on a startup they’ve been developing and targeting towards mid-sized online retailers. I’d...Daniel Tunkelang From The Noisy Channel | March 20, 2011 at 01:44 PM
A legacy from the 1800s leaves Tokyo facing blackouts | ITworld Turns out that the electricity crisis triggered by the multiple tragedies in Japan is the result...Simon Phipps From Wild WebMink | March 20, 2011 at 01:30 PM
Designing and Conducting Ethnographic Research: An Introduction Paperback, 376 pages AltaMira Press; Second edition 2010 [Amazon link] The Ethnographer’s Toolkit...Experientia From Putting People First | March 20, 2011 at 12:17 PM
Over 280 leading networking researchers from around the country gathered this week for the 10th GENI Engineering Conference (GEC). Erwin Gianchandani From The Computing Community Consortium Blog | March 20, 2011 at 02:11 AM
In ReadwriteWeb: On the nature of agile commerce. Is it what we can expect in the near future? What are the architectures and planning required? Who makes sure...Franz Dill From The Eponymous Pickle | March 20, 2011 at 12:54 AM
You’d think given the number of places I track music and the number of things I have given permission to spam me with music information that something would have...Simon Phipps From Wild WebMink | March 19, 2011 at 10:56 PM
Hardly a statistical view. But some interesting comments. I spend much more than the suggested seventeen minutes, but I am a foodie. Lots of discussion of cause...Franz Dill From The Eponymous Pickle | March 19, 2011 at 02:52 PM
Danny Sullivan revisits his excellent 25 Things I hate about Google. Five years after the original article. I read that original article, and it made me think...Franz Dill From The Eponymous Pickle | March 19, 2011 at 02:37 PM
The security connection is pretty tenuous, so I figured I'd blog this on a Saturday.
Once it infects an ant, the fungus uses as-yet-unidentified chemicals to control...schneier From Schneier on Security | March 19, 2011 at 02:12 PM
Interdisciplinary Computing Blog. by Lisa C. Kaczmarczyk. Brought to my attention recently. In particular an article on earthquake preparation and response and...Franz Dill From The Eponymous Pickle | March 19, 2011 at 05:37 AM
It used to be a feature of RFID tags that they contained very small amounts of data, with the tag acting as a link to data sources. Yet there appears to bean increase...Franz Dill From The Eponymous Pickle | March 19, 2011 at 03:46 AM
Good piece in Fast Company on Telehealth. Which seems to say that it is effective to use remote sensors and expertise to deliver health. I further think that...Franz Dill From The Eponymous Pickle | March 18, 2011 at 07:04 PM
What is the big deal with Java?
I teach at a public school of excellence that can best be described as a magnet school for the state. We are currently in our... From Computer Science Teachers Association | March 18, 2011 at 06:54 PM
In Engadget: A set of sensors that can monitor many aspects of your life, like exercise, then award you with experience points, compete with others, etc.Franz Dill From The Eponymous Pickle | March 18, 2011 at 06:12 PM
If you are a grad student and want to goto STOC 2011
there is travel support money that you can apply for.
See
here
for details.
We are particularly interested...GASARCH From Computational Complexity | March 18, 2011 at 05:14 PM
From Putting People First
The European Union is planning to enshrine in law the right to be forgotten on the internet, but we can’t live outside society, argues investigative journalist...Experientia From Putting People First | March 18, 2011 at 03:26 PM
“Companies should lead their users, not the other way around.” So say Jens Skibsted and Rasmus Hansen in their recent post, User-Led Innovation Can’t Create Breakthroughs...Experientia From Putting People First | March 18, 2011 at 03:18 PM
Skype security weaknesses could endanger 'vulnerable users' | Technology | guardian.co.uk This Privacy International report covers a few of the reasons citizens...Simon Phipps From Wild WebMink | March 18, 2011 at 01:03 PM