From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There’s plenty of talk about how Nokia’s embrace of Microsoft’s Windows Phone has doomed Nokia. But has Nokia’s embrace actually doomed Windows Phone? Read my views...Simon Phipps From Wild WebMink | February 16, 2011 at 03:30 PM
Begone. A movement to make it easy to get off of mailing lists promoted by Forrester's Josh Bernoff. Nice idea, we need it, but I wonder if the marketers will...Franz Dill From The Eponymous Pickle | February 16, 2011 at 01:33 PM
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
schneier From Schneier on Security | February 16, 2011 at 12:26 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Kenny Spade is a Microsoft Academic Developer Evangelist out in California who has been writing a series of blog posts that help one learn how to write a Windows...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 16, 2011 at 10:57 AM
Divining a Digital Future: Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell MIT Press, April 2011, 264 pages ISBN 978-0-262-01555-4 264...Experientia From Putting People First | February 16, 2011 at 10:35 AM
The Eclipse Foundation is home to a family of projects related to enterprise software development. Its Executive Director Mike Milinkovic has very kindly supplied...Simon Phipps From Wild WebMink | February 16, 2011 at 09:45 AM
Fascinating statistics and surveys in this study by Bain & Company: Publishing in the digital era by Bain partner Patrick BFranz Dill From The Eponymous Pickle | February 16, 2011 at 05:51 AM
Had to miss this today, but find it interesting:Unified Intelligence: Closing the Loop on Unstructured Data, by James Taylor of AttivioAnd here's a link to a PDF...Franz Dill From The Eponymous Pickle | February 15, 2011 at 09:08 PM
In Engadget: An overview of a USC Annenberg study. Quite a few exabytes, and growing. The current capacity for digital is about 295 exabytes they say ... An...Franz Dill From The Eponymous Pickle | February 15, 2011 at 08:44 PM
A good non technical overview of the progress of AI in the NYT. Quite naturally people have hopes and fears of this world. The broad expectations of the early...Franz Dill From The Eponymous Pickle | February 15, 2011 at 08:39 PM
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types...schneier From Schneier on Security | February 15, 2011 at 07:11 PM
Alice Marwick and I co-authored this piece for The Guardian.
The Press Complaints Commission in the UK has now ruled that there is no “reasonable expectation” of...zephoria From Apophenia | February 15, 2011 at 06:55 PM
In my TA workshop yesterday on communication skills, we had a discussion/brainstorm session that I captured in a document (shown on the projector) as we went along...Gail Carmichael From The Female Perspective of Computer Science | February 15, 2011 at 04:01 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
One of my frustrations these days is that with all the talk of education reform there is not much talk about computing education in that mix. It is as if people...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 15, 2011 at 03:06 PM
With A Little Help: The Early Returns Excellent and honest account from Cory of his experiment in self-publishing. From reading this it's clear that there is still...Simon Phipps From Wild WebMink | February 15, 2011 at 01:01 PM
Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except...schneier From Schneier on Security | February 15, 2011 at 11:43 AM