From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In my years at the big enterprise I took the Myers-Briggs test at least a half dozen times. The results always interesting, largely self-affirming. I always had...Franz Dill From The Eponymous Pickle | September 2, 2010 at 01:53 AM
I see that Don Tapscott's new book: MacroWikinomics: Rebooting Business and the World is about to come out. We were interviewed for his previous book Wikinomics...Franz Dill From The Eponymous Pickle | September 1, 2010 at 08:53 PM
As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...schneier From Schneier on Security | September 1, 2010 at 06:17 PM
The latest issue of the International Journal of Design, eer-reviewed, open-access journal devoted to publishing research papers in all fields of design, is devoted...Experientia From Putting People First | September 1, 2010 at 06:00 PM
If a provocative new study is to be believed, the world lives in a situation where American undergraduates monopolize our knowledge of human nature, writes Anand...Experientia From Putting People First | September 1, 2010 at 05:45 PM
Two new articles in UX Magazine: Don’t become a digital dinosaur by Samantha Starmer UX professionals canExperientia From Putting People First | September 1, 2010 at 05:30 PM
Mostly the young are interested in letting others know their physical location. Others are reticent for safety reasons, or against providing too much information...Experientia From Putting People First | September 1, 2010 at 04:27 PM
The New York Times reports on how online start-ups are allowing people to rent out their belongings locally, for a small fee. “The Roomba was mine for only 24 hours...Experientia From Putting People First | September 1, 2010 at 04:10 PM
In CACM: Privacy protection models for large databases. " ... The "K-anonymity" method of providing anonymity to large data sets has raised excitement in realms...Franz Dill From The Eponymous Pickle | September 1, 2010 at 03:17 PM
Andrew Paradise has sent along a link about his Aislebuyer venture in the news on CNBC. A great example of in-store shopper convenience and engagement via smartphones...Franz Dill From The Eponymous Pickle | September 1, 2010 at 03:02 PM
In Progressive Grocer: Hannaford grocer revamps their site to include a number of mobile friendly ideas. Another example of mobile to retail plays. Expect to see...Franz Dill From The Eponymous Pickle | September 1, 2010 at 02:54 PM
Le Monde newspaper published (Google translation) today a summary of an ethnographic research project on smartphone use by young adult, presented yesterday at a...Experientia From Putting People First | September 1, 2010 at 02:48 PM
People have asked me how much the alleged proof of P NE NP was
discussed at Barriers II.
Actually, nobody discussed the proof; however, we did discuss
the aftermath...GASARCH From Computational Complexity | September 1, 2010 at 02:41 PM
The End of OpenSolaris Patrick Finch with an informed view of what happened in the past and informed conjecture about the present and future. (tags: OpenSolaris...Simon Phipps From Wild WebMink | September 1, 2010 at 12:06 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
The City of Dublin and the Institute of Art, Design & Technology (IADT) will act as co-hosts for Interaction 12, the annual conference of the Interaction Design...Experientia From Putting People First | September 1, 2010 at 10:53 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Contributor agreements that aggregate the copyrights of open source code in favour of a single corporate sponsor are a sure sign of a community where one member...Simon Phipps From Wild WebMink | September 1, 2010 at 07:00 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM
Many of you are familiar with the Exploring Computer Science (ECS) curriculum, developed in partnership with CSTA as part of an NSF grant. Though initially developed... From Computer Science Teachers Association | August 31, 2010 at 03:57 PM