Bob Gourley's Blog, page 205
March 5, 2019
Operationalizing AI
When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models? What does […]
Published on March 05, 2019 05:40
March 4, 2019
W3C approves WebAuthn as the web standard for password-free logins
The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, […]
Published on March 04, 2019 05:59
Regarding Facebook’s cryptocurrency
If Bloomberg and the New York Times are to be believed, later this year Facebook will introduce a cryptocurrency which will allow WhatsApp users to send money instantly. Yes, that’s right: Facebook. Cryptocurrency. Earthquake! Revolution! The world is tilting on its axis! The end times are cometh! Except – um – what exactly are people going […]
Published on March 04, 2019 05:59
What Do Wyoming’s 13 New Blockchain Laws Mean?
Wyoming has now enacted a total of 13 blockchain-enabling laws, making it the only US state to provide a comprehensive, welcoming legal framework that enables blockchain technology to flourish, both for individuals and companies. These laws enable innovation and creativity and are meant to bring capital, jobs, and revenue into Wyoming. Law and technology are discrete […]
Published on March 04, 2019 05:59
5G is still a little magic, a little smoke and mirrors
Read why Shara Tibken says that 5G is still smokes and mirrors on Cnet : The scene on the big display in front of me looks like something from Grey’s Anatomy. A team of doctors and nurses lean over a patient who’s draped with a white cloth, while a TV screen beside the operating table […]
Published on March 04, 2019 05:59
IoT Future-Proofing for the Long Haul
Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […]
Published on March 04, 2019 05:59
March 3, 2019
There Are Ways To Improve The Security of Your Artificial Intelligence Solutions
Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […]
Published on March 03, 2019 05:57
March 1, 2019
RSA Week Is Here
The about 30,000 members of the cybersecurity community come together every year during the RSA conference in San Francisco to catch up with old friends and associates, learn the latest tech approaches and exchange best practices and lessons learned. I’ll be there most of the week, spending most of the time in meetings regarding our […]
Published on March 01, 2019 14:44
February 27, 2019
Vulnerabilities leave devices supporting Thunderbolt open to hacking
Devices offering support to Thunderbolt peripheral and charging connectors are vulnerable to hacking, according to newly published research. Thunderbolt is a peripheral standard developed by Apple Inc. and Intel Corp. that was first seen on Apple computers with Thunderbolt 1 and 2 and then later in other devices through Thunderbolt 3, which is compatible with USB-C […]
Published on February 27, 2019 15:35
What Is A Data Breach?
Read Nicole Martin take a look at different aspects of a data breach on Forbes : We hear about them all the time, another company getting its data breached, another credit card scanner hacked, but do you really know what a data breach is exactly and what it means if it happens to you? Here’s a […]
Published on February 27, 2019 15:35