Remove 2005 Remove Mining Remove Paper Remove Security
article thumbnail

Attacks against machine learning — an overview

Elie

this paper. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. adversarial examples.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

this paper. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. adversarial examples.

Mining 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Dreaming of Enterprise RSS functionality

ChiefTech

We think there are three big, compelling reasons to use a managed system for integrating RSS in your enterprise communications mix: synchronization, analytics and security. " Attensa is a client of mine, and I live the benefits every day. Further Reading Articles and Papers Book Reviews and More Intranet 2.0

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. Furthermore, they are often addressed to a 1990-2005 audience, as if, for example, we don’t know that there is a thing called “social media” that can be tricky. They were for me. Our Profession and its Tools.

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. That said, we recently started testing YouFig (www.youfig.com), which provides businesses with SaaS collaboration solutions including social networking, user administration, data mining and more, all rolled into one.

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

There are a lot of parallels between computer security and biology. Welcome to the hacker mind and original podcast from Brawl secure, it's about challenging our expectations about the people who hack for a living. Green: So there are a lot of information security parallels. Did I just say biology. It's good question.