Remove 2015 Remove Examples Remove Exercises Remove Mining
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. They were for me. It’s almost ubiquitous.

article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). Figure 3: PNC Financial Services Group 2015 Annual Report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). Figure 3: PNC Financial Services Group 2015 Annual Report.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. For example, logging on to a mobile app is dead easy: Password managers are one of the few security constructs that actually make your life easier. How long ago were these sites breached? What can you do if you were in the data?

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Wearco produces "mining consumables". Wearco produces "mining consumables". It's the little things that keep popping up, for example the language and grammar in the aforementioned user manual.

Passwords 111
article thumbnail

Gab Has Been Breached

Troy Hunt

differs: For example, because they couldn't find any public discussion about the breach they assumed that @WIRED reporters were "essentially assisting the hacker in his efforts to smear our business" There are *always* discussions held in private about a breach before it's made public. Gab's approach. Coincidence?

Passwords 145