From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
After a number of warnings following around blogging be passe lately, its good to see a new book on blogging and business ... '" ... From Eric Butow and Rebecca...Franz Dill From The Eponymous Pickle | February 20, 2010 at 08:58 PM
A Big Victory for F/OSS: Jacobsen v. Katzer is Settled
A crucial and foundational legal finding that establishes violation of open...webmink From Wild WebMink | February 20, 2010 at 12:06 PM
Amazon’s Mechanical Turk is one of my favorite examples of leveraging the internet for innovation: Amazon Mechanical Turk is a marketplace for work that requires...Daniel Tunkelang From The Noisy Channel | February 20, 2010 at 10:15 AM
A Time Mag article: Now Hear This. A good piece, on sounds in advertising, see also my previous post on Martin Lindstrom and Buyology Inc's work in this area.Franz Dill From The Eponymous Pickle | February 20, 2010 at 01:34 AM
A new report on the future of the internet, based on interviews of nearly 900 internet stakeholders and critics, conducted by the Pew Research Center’s Internet...Experientia From Putting People First | February 19, 2010 at 09:11 PM
Barbara Pantuso, director of healthcare innovation at frog design, reports on health outcomes and financial implications of Evidence-Based Design (EBD).
“ItExperientia From Putting People First | February 19, 2010 at 08:43 PM
Cellphone-based money transfer is transforming the prospects of people who live without bank accounts or ATMs Experientia From Putting People First | February 19, 2010 at 08:38 PM
There was a big U.S. cyberattack exercise this week. We didn't do a
This is, I think, an eyewitness report.
schneier From Schneier on Security | February 19, 2010 at 07:33 PM
I recently read Ken Auletta's book Googled, about the creation and rise of Google. I read it as both a techno-geek and as an educator. There were two particular... From Computer Science Teachers Association | February 19, 2010 at 05:57 PM
I happened on a demonstration of Talking Tag by Air Arts via Ven Cheva while I was in Chicago yesterday. A clever and simple idea that attaches an audio track (or...Franz Dill From The Eponymous Pickle | February 19, 2010 at 05:56 PM
This is the third and last post in a three-part series of design proposals for augmented reality learning applications. These are from a paper I wrote in my computers...Gail Carmichael From The Female Perspective of Computer Science | February 19, 2010 at 04:22 PM
From the WSJ: Expect a flurry of new products from P&G: ' Robert McDonald, CEO of Procter & Gamble, said the company's growth strategies "are starting to work"...Franz Dill From The Eponymous Pickle | February 19, 2010 at 03:55 PM
From Martin Lindstrom: Analyzing sounds" ... The article probes the results of a new 9-month study conducted by the New York Buyology Inc., team, in partnership...Franz Dill From The Eponymous Pickle | February 19, 2010 at 03:06 PM
It reads like a very professional operation:
Security footage of the killers' movements during the afternoon, released by police in Dubai yesterday, underlines...schneier From Schneier on Security | February 19, 2010 at 12:49 PM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Last week someone on the SIGCSE mailing list mentioned that they learned to program in FORTRAN, using punch cards on an IBM 1130. Well so did I and I said so. This...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | February 19, 2010 at 10:45 AM
Steve King reports on Data and Dating in Small Biz Labs. The topic has always been of interest to me. I worked with some matching algorithms in the enterprise,...Franz Dill From The Eponymous Pickle | February 19, 2010 at 04:09 AM
The Design Council and the Department of Health partner to combat the spread of infection in U.K. hospitals. David Sokol reports in Metropolis Magazine.
“Patients...Experientia From Putting People First | February 18, 2010 at 04:12 PM
(Guest post from Richard Taylor who requests information on a problem.)
The following graph partition problem arises in connection with studies
I am doing on...GASARCH From Computational Complexity | February 18, 2010 at 02:55 PM
Interesting blog post, with video demonstration, about an improved tool to open high security locks with a key that will just "form itself" if you insert it into...schneier From Schneier on Security | February 18, 2010 at 12:21 PM