From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice:
In this paper we revisit the assumption that shellcode need be fundamentally different in structure than non-executable data. Specifically, we elucidate...schneier From Schneier on Security | March 25, 2010 at 12:16 PM
A look at long quoted Metcale'e law, about how value grows as networks grow. It has been the 'rule' of Web 2.0, in GigaOm:' ... Networks Franz Dill From The Eponymous Pickle | March 25, 2010 at 12:10 PM
Italian democracy, citizen surveillance, DRM from the BBC and even the BCS rejecting a petition. May I get depressed?Simon Phipps From Wild WebMink | March 25, 2010 at 12:07 PM
Africa Calling: Can Mobile Phones Make a Miracle? is the title of a long article by Jenny C. Aker (Assistant Professor, The Fletcher School) and Isaac M. Mbiti...Experientia From Putting People First | March 25, 2010 at 10:57 AM
At Lift France 09, Mike Kuniavsky spoke about Changing Things: Fab Labs, towards decentralized design and production of material products (link to 25 min. video)...Experientia From Putting People First | March 25, 2010 at 10:04 AM
Successful Service Design: Turning Innovation Into Practice is a website created by the UK’s Cabinet Office that provides a robust guide to service design.
The...Experientia From Putting People First | March 25, 2010 at 09:59 AM
I'm at Ohio State for the Combinatorics,
Groups, Algorithms, and Complexity Conference in honor of Laci Babai's
60th birthday. An incredible turn out with 74 talks...Lance From Computational Complexity | March 25, 2010 at 09:38 AM
Are some behaviours more contagious than others?
This is the question that Nicholas Christakis and James Fowler address in their book, Connected: The Surprising...Experientia From Putting People First | March 25, 2010 at 07:34 AM
David Sherwin argues in his blog that there are a few eerie similarities between the plotting of mystery novels and how designers should document design research...Experientia From Putting People First | March 25, 2010 at 07:21 AM
Jeff Howard alerts us in his “Design for Service” blog to the publication “Can You Design a Service?” by the Danish agency 1508.
“Six brief case studies showcase...Experientia From Putting People First | March 25, 2010 at 07:15 AM
Online Plan for Public Services: ' ... Everyone in the country is to be given a personalised webpage for accessing Government services within a year as part of...Franz Dill From The Eponymous Pickle | March 25, 2010 at 01:24 AM
In StorefrontBacktalk: " ... The capability for a search engine to have a current and comprehensive list of products (SKU and sub-SKU) for every retailer in a given...Franz Dill From The Eponymous Pickle | March 25, 2010 at 01:18 AM
In the category of "waste nothing", here's a handout I wrote way back when (over a decade ago) that I use for my standard graduate seminar class on How to Read. ...Michael Mitzenmacher From My Biased Coin | March 25, 2010 at 12:47 AM
A good report, includes overview of a number of common BI packages. Requires registrationEase of Use and Interface Appeal in Business Intelligence Tools, by Cindi...Franz Dill From The Eponymous Pickle | March 25, 2010 at 12:40 AM
A Fax App for the IPhone that includes a digital signature mode. Faxes are one of the oldest digital transmission modes. Yet despite their age, there is still...Franz Dill From The Eponymous Pickle | March 24, 2010 at 04:10 PM
From ACM-W supporting, celebrating and advocating for Women in Computing
We celebrate Ada Lovelace Day today by honoring Janie Irwin, recent recipient of the ACM-W Athena Lecturer Award. I have known Janie for a while now, and she is...Ellen Walker From ACM-W supporting, celebrating and advocating for Women in Computing | March 24, 2010 at 01:52 PM
Today is Ada Lovelace Day, a day we write about technical women we admire. Last year, I wrote about how much I admired my fellow CU-WISE executives. This year...Gail Carmichael From The Female Perspective of Computer Science | March 24, 2010 at 01:50 PM