From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This happened is a series of London-based events focusing on the stories behind interaction design.
“Having ideas is easier than making them happen. We delve into...Experientia From Putting People First | September 15, 2009 at 04:56 PM
Cennydd Bowles, a user experience designer for Clearleft, discusses how people form mental models of urban environments, and how technology can augment and even...Experientia From Putting People First | September 15, 2009 at 04:52 PM
Although smartphones have made considerable progress in being business friendly tools Forrester suggests that desktops still rule for business applications. We...Franz Dill From The Eponymous Pickle | September 15, 2009 at 03:19 PM
You must do many silly things to get a large research grant:
You must know precisely what you will do for the next five years. Yet, in my experience, good researchers... From Daniel Lemire's Blog | September 15, 2009 at 01:53 PM
Five consumer laws you really ought to know
Helpful summary of consumer protections in the UK. Plenty more to know, but this bare...webmink From Wild WebMink | September 15, 2009 at 12:07 PM
Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...schneier From Schneier on Security | September 15, 2009 at 11:10 AM
The "final version" of our SIGGRAPH Asia paper, Real-Time Parallel Hashing on the GPU, is available here.I was primarily involved in the "hash table construction"...Michael Mitzenmacher From My Biased Coin | September 15, 2009 at 11:01 AM
On July 27, 2009, National Public Radio (NPR) relaunched the website www.npr.org through the efforts of its in-house design team and interactive agency Schematic...Experientia From Putting People First | September 15, 2009 at 09:49 AM
I recently heard or read the following phrases.
former cop killer
ideal compromiser
even prime numbers have their uses
In each case it was ambiguous...GASARCH From Computational Complexity | September 14, 2009 at 05:22 PM
I see that Mahendra Vora and Sundar Kadayam have founded a startup called Zakta. Much more here. He and his colleagues are best known for founding Intelliseek...Franz Dill From The Eponymous Pickle | September 14, 2009 at 04:47 PM
More details in AdAge about Unilever's use of crowd sourcing to replace some kinds of some product marketing. The comments are also interesting.Franz Dill From The Eponymous Pickle | September 14, 2009 at 02:40 PM
September 14
Hearing:
The Senate Homeland Security and Government Affairs Committee will hold a hearing on cyberattacks and industry.
10 a.m., 342 Dirksen Building... From U.S. Public Policy Committee of the ACM | September 14, 2009 at 01:29 PM
If you seek approval above all else, you are unlikely to innovate outside the rigid bounds of the current system:
You do not convince existing journals to give... From Daniel Lemire's Blog | September 14, 2009 at 01:16 PM
IBM Throws Out Microsoft Office
Copying Sun again :-) What will they do for ideas after Sun is gone?
(tags: IBM...webmink From Wild WebMink | September 14, 2009 at 12:53 PM
A colleague sent me this link to a Washington Post article, on how colleges are going to be "torn apart" like newspapers have been by the Internet. Dramatically...Michael Mitzenmacher From My Biased Coin | September 14, 2009 at 11:02 AM
Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...schneier From Schneier on Security | September 14, 2009 at 09:20 AM
Wim Van de Velde points me to Tibco Spotfire's new Business Intelligence Blog which I have put on my feed. I like their current post on five unconventional uses...Franz Dill From The Eponymous Pickle | September 14, 2009 at 09:19 AM