Category Archives: Uncategorized

Using AI to Identify the Resistance

Last month the New York Times published a now famous op-ed from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  Watching this unfold I began to wonder whether Artificial Intelligence could have identified the author.  I have applied machine learning

Read More

Machine Learning Marketing

Machine Learning Marketing: Ignore Size

TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend in Machine Learning marketing whereby size is being promoted as the ultimate differentiator.  I believe this ignores the math behind

Read More

Protect Anonymity in Machine Learning

How to Protect Anonymity in Machine Learning

The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and the enforcement of strict data usage policies.   Companies, specifically those that employ machine learning, have complained about the onerous regulation,

Read More

3 Ways Blockchain Can Improve PKI

3 Ways Blockchain Can Improve PKI

3 Ways Blockchain Can Improve PKI When it comes to technology buzzwords there are few bigger than blockchain.  Speak with any overexcited technologist and you will get an hour lecture about how it is the future of secure transactions.  The benefits of blockchain technology are that it is public, distributed, and tamper-resistant.  Indeed blockchain technology

Read More

Mental Hypervisors

Mental Hypervisors and Hardware Cybersecurity

Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others.  The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there was one quote that I found particularly interesting. When quoting the security expert Dr Andrew Zonenberg the author wrote “SimpliSafe

Read More

Social Media Auto Publish Powered By : XYZScripts.com