Bob Gourley's Blog, page 205

March 5, 2019

Operationalizing AI

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models? What does […]
 •  0 comments  •  flag
Share on Twitter
Published on March 05, 2019 05:40

March 4, 2019

W3C approves WebAuthn as the web standard for password-free logins

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, […]
 •  0 comments  •  flag
Share on Twitter
Published on March 04, 2019 05:59

Regarding Facebook’s cryptocurrency

If Bloomberg and the New York Times are to be believed, later this year Facebook will introduce a cryptocurrency which will allow WhatsApp users to send money instantly. Yes, that’s right: Facebook. Cryptocurrency. Earthquake! Revolution! The world is tilting on its axis! The end times are cometh! Except – um – what exactly are people going […]
 •  0 comments  •  flag
Share on Twitter
Published on March 04, 2019 05:59

What Do Wyoming’s 13 New Blockchain Laws Mean?

Wyoming has now enacted a total of 13 blockchain-enabling laws, making it the only US state to provide a comprehensive, welcoming legal framework that enables blockchain technology to flourish, both for individuals and companies. These laws enable innovation and creativity and are meant to bring capital, jobs, and revenue into Wyoming. Law and technology are discrete […]
 •  0 comments  •  flag
Share on Twitter
Published on March 04, 2019 05:59

5G is still a little magic, a little smoke and mirrors

Read why Shara Tibken says that 5G is still smokes and mirrors on Cnet : The scene on the big display in front of me looks like something from Grey’s Anatomy. A team of doctors and nurses lean over a patient who’s draped with a white cloth, while a TV screen beside the operating table […]
 •  0 comments  •  flag
Share on Twitter
Published on March 04, 2019 05:59

IoT Future-Proofing for the Long Haul

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […]
 •  0 comments  •  flag
Share on Twitter
Published on March 04, 2019 05:59

March 3, 2019

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]
 •  0 comments  •  flag
Share on Twitter
Published on March 03, 2019 05:57

March 1, 2019

RSA Week Is Here

The about 30,000 members of the cybersecurity community come together every year during the RSA conference in San Francisco to catch up with old friends and associates, learn the latest tech approaches and exchange best practices and lessons learned. I’ll be there most of the week, spending most of the time in meetings regarding our […]
 •  0 comments  •  flag
Share on Twitter
Published on March 01, 2019 14:44

February 27, 2019

Vulnerabilities leave devices supporting Thunderbolt open to hacking

Devices offering support to Thunderbolt peripheral and charging connectors are vulnerable to hacking, according to newly published research. Thunderbolt is a peripheral standard developed by Apple Inc. and Intel Corp. that was first seen on Apple computers with Thunderbolt 1 and 2 and then later in other devices through Thunderbolt 3, which is compatible with USB-C […]
 •  0 comments  •  flag
Share on Twitter
Published on February 27, 2019 15:35

What Is A Data Breach?

Read Nicole Martin take a look at different aspects of a data breach on Forbes : We hear about them all the time, another company getting its data breached, another credit card scanner hacked, but do you really know what a data breach is exactly and what it means if it happens to you? Here’s a […]
 •  0 comments  •  flag
Share on Twitter
Published on February 27, 2019 15:35