From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Mark Montgomery of KYield posts about Realizing the Theory: Yield Management of Knowledge. He defines it as: " ... Yield Management of Knowledge: The process by...Franz Dill From The Eponymous Pickle | August 31, 2010 at 03:26 PM
A short article on how to manage time for social media presence. Mostly common sense, but also worth a look.Franz Dill From The Eponymous Pickle | August 31, 2010 at 02:41 PM
A good article in AdAge: My thoughts: Listening, whether it be to consumers, trends, the pulse of technology, is very important. Maybe it should be called observing...Franz Dill From The Eponymous Pickle | August 31, 2010 at 02:30 PM
In a very interesting development a version of the very well known CAD system will become available for the IPhone and IPad, available by this fall.... I used AutoCad...Franz Dill From The Eponymous Pickle | August 31, 2010 at 01:53 PM
On Thursday Aug 26 Lance stated
Bill is at
Barriers II in Princeton and promises a full report upon his return.
Not quite sure I promised that, or what a full report...GASARCH From Computational Complexity | August 31, 2010 at 01:39 PM
Thirty researchers met August 11-13 to discuss the future of interactive systems. This workshop was sponsored by the Computing Community Consortium, ACM/SIGCHI...Erwin Gianchandani From The Computing Community Consortium Blog | August 31, 2010 at 12:58 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Or is it “mind” the data? Last week I read a blog post by Stacey Armstrong (CS News – Video Game Data Mining) that linked to an article about how game companies...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | August 31, 2010 at 12:14 PM
I started blogging a little over 3 years ago, as something of an experiment. Lance had given up blogging, and I had been a reasonably frequent and opinionatedKleinberg's...Michael Mitzenmacher From My Biased Coin | August 31, 2010 at 11:48 AM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Some people scoff at those who have too many friends on Facebook. "They probably just friend a bunch of people they don't know to look popular," they say. While...Gail Carmichael From The Female Perspective of Computer Science | August 31, 2010 at 09:47 AM
In response to several comments, I’ve just extracted my discussion of direct and indirect causality from my recent article on why “which licence” is now the wrong...Simon Phipps From Wild WebMink | August 31, 2010 at 02:38 AM
Want your service, book, software or consulting skills presented to an elite audience here in review form? See my Ad and review policies here. -----------------...Franz Dill From The Eponymous Pickle | August 30, 2010 at 06:54 PM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
The Simons Foundation will provide up to $6 million/year in funding for a new Institute for the Theory of Computing. The call for applications recognizes the deep...Erwin Gianchandani From The Computing Community Consortium Blog | August 30, 2010 at 03:26 PM
I have now mentioned Recorded Future a number of times in this space, here is another independent review that does a good job of introducing it for niche research...Franz Dill From The Eponymous Pickle | August 30, 2010 at 02:42 PM
Hungarian Parliament, originally uploaded by webmink. My best wishes to all my friends attending the OpenOffice.org conference in Budapest this week. With all of...Simon Phipps From Wild WebMink | August 30, 2010 at 01:36 PM