Skip to content
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
TELEGRID
TELEGRID
 
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
Home Archive for category "Uncategorized"

Category: Uncategorized

Using AI to Identify the Resistance
Uncategorized

Using AI to Identify the Resistance

By Eric Sharret October 12, 2018 October 12, 2018

Last month the New York Times published a now famous op-ed from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  …

Read more"Using AI to Identify the Resistance"
Machine Learning Marketing: Ignore Size
Uncategorized

Machine Learning Marketing: Ignore Size

By Eric Sharret June 28, 2018 June 29, 2018

TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend …

Read more"Machine Learning Marketing: Ignore Size"
Getting Started with the Robot Operating System (ROS)
Uncategorized

Getting Started with the Robot Operating System (ROS)

By Beth Flippo June 25, 2018 June 25, 2018

When I first heard of the Robot Operating System (ROS) I thought it was just that – an operating system for robots.  Well I was wrong it is not an OS but rather an open-source …

Read more"Getting Started with the Robot Operating System (ROS)"
THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!
Uncategorized

THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!

By Beth Flippo June 18, 2018 March 3, 2020

Growing up I had a friend who was into Amateur radio also known as Ham.  You could spot his house a mile away with the huge antenna on his roof.  Back then kids interested in …

Read more"THE B-HIVE: Cheap Software Defined Radio (SDR) Changes Everything!"
THE B-HIVE: Hacking the CAN Bus
Uncategorized

THE B-HIVE: Hacking the CAN Bus

By Beth Flippo June 12, 2018 June 22, 2018

Let’s face it, when it comes to hacks we have become, well, quite complacent.  We figure it is out of our control anyway and it’s not like we are going to go off grid. Right? …

Read more"THE B-HIVE: Hacking the CAN Bus"
How to Protect Anonymity in Machine Learning
Uncategorized

How to Protect Anonymity in Machine Learning

By Eric Sharret May 29, 2018 May 29, 2018

The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and …

Read more"How to Protect Anonymity in Machine Learning"
Forged Passports, CBP and Digital Signatures
Uncategorized

Forged Passports, CBP and Digital Signatures

By Eric Sharret March 1, 2018 April 9, 2018

Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the …

Read more"Forged Passports, CBP and Digital Signatures"
Mental Hypervisors and Hardware Cybersecurity
Uncategorized

Mental Hypervisors and Hardware Cybersecurity

By Eric Sharret April 17, 2017 February 5, 2018

Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others.  The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there …

Read more"Mental Hypervisors and Hardware Cybersecurity"
Credential Stuffing – Just Like Grandma Used to Make
Uncategorized

Credential Stuffing – Just Like Grandma Used to Make

By Eric Sharret February 16, 2017 February 5, 2018

Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post.  It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, …

Read more"Credential Stuffing – Just Like Grandma Used to Make"
The Rise of the CISO and Cybersecurity Tool Development
Uncategorized

The Rise of the CISO and Cybersecurity Tool Development

By Eric Sharret October 14, 2016 October 14, 2016

PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries.  In the results PwC found that “59% of survey respondents say they …

Read more"The Rise of the CISO and Cybersecurity Tool Development"

Posts navigation

1 2

CONNECT WITH US!

Facebook
Twitter
YouTube
LinkedIn
Back to Top
Powered by Fluida & WordPress.