From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Thinking about differing architectures for casual versus power users of business intelligence. Having worked with executive information systems that needed to...Franz Dill From The Eponymous Pickle | November 19, 2010 at 02:07 AM
I had a request on Identica to make one of my essays available under a Creative Commons licence so it could be translated. I thought that was such a good idea I’ve...Simon Phipps From Wild WebMink | November 19, 2010 at 12:14 AM
Many years ago I had the tremendous pleasure of meeting Anita Borg and, although I did not realize it at that time, she had a tremendous impact on my career and... From Computer Science Teachers Association | November 18, 2010 at 11:14 PM
In the SASCom magazine, analytics is hot in the telecom industry. You don't have to tell me that, it should be hot everywhere. Franz Dill From The Eponymous Pickle | November 18, 2010 at 09:26 PM
I received a comment on Is a Software Architect Worthy of the Name? via email from Lourens Veen, a software architect for a project at the University of Amsterdam...Gail Carmichael From The Female Perspective of Computer Science | November 18, 2010 at 09:15 PM
Download squad shows a way to watch a video with friends using Youtube Social. I can see this also being used to rate a commercial with a group of consumers, or...Franz Dill From The Eponymous Pickle | November 18, 2010 at 09:06 PM
Excellent:
Here's a scenario:
Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...schneier From Schneier on Security | November 18, 2010 at 06:19 PM
I don't do tweets-I don't think I have enough interesting 140-char notes to tell people
(though that doesn't stop Lance).
However, several tweet-worthy notes did...GASARCH From Computational Complexity | November 18, 2010 at 03:10 PM
The conversation around LWN’s coverage of Michael Meeks’ talk at the Linux Plumbers Conference (sadly paywalled until now but available today and worth reading...Simon Phipps From Wild WebMink | November 18, 2010 at 03:00 PM
Should Companies That Use Open Source Software Pay a Tithe? They should certainly budget to obtain service and ensure they pay the companies and people that make...Simon Phipps From Wild WebMink | November 18, 2010 at 01:03 PM
Adding them all up, the U.S. government "receives between 8,000 and 10,000 pieces of information per day, fingering just as many different people as potential threats...schneier From Schneier on Security | November 18, 2010 at 12:13 PM
I am surprised this has not been done methodically long ago. It is becoming very important as shoppers need to get accurate data in-store. It is also key for...Franz Dill From The Eponymous Pickle | November 18, 2010 at 06:44 AM
When I took my current position, I was invited to teach a course on unstructured data. It is a sensible topic for a course: some say that between 80% to 90% of...Daniel Lemire From Daniel Lemire's Blog | November 18, 2010 at 12:33 AM
Michele Visciola, Experientia partner, gave a talk last Sunday on online healthcare information at the 16th IFHRO (International Federation of Health Records Organizations)...Experientia From Putting People First | November 17, 2010 at 08:02 PM
In the Forbes blog. Excellent article on the open source R statistical package. The visualization capabilities are emphasized. I agree that it is the package...Franz Dill From The Eponymous Pickle | November 17, 2010 at 06:40 PM
In Progressive Grocer, an overview article on the increasing use of digital coupons, with quite a few useful statistics. With the increasing use of smartphones...Franz Dill From The Eponymous Pickle | November 17, 2010 at 03:59 PM
In Ars Technica, an article about the many privacy settings available for Google users. I use many Google services and am concerned about the privacy I give up...Franz Dill From The Eponymous Pickle | November 17, 2010 at 03:46 PM
Eye movements instead of eye structures.
The new system tracks the way a person's eye moves as he watches an icon roam around a computer screen. The way the icon...schneier From Schneier on Security | November 17, 2010 at 01:13 PM