article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. Since the pandemic I’ve fallen into the habit of reading paper books at night, and listening to books while walking. In short, everything could be minedmined for insights, for value, for untold usefulness.

Mining 52
article thumbnail

Why & Where You Should You Plant Your Flag

Krebs on Security

Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags. YOUR GOVERNMENT.

Passwords 339
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

Persona bots have histories, personalities, and communication styles. They act as normal members of those communities, posting and commenting and discussing. Systems like GPT-3 will make it easy for those AIs to mine previous conversations and related Internet content and to appear knowledgeable.

Mining 95
article thumbnail

else 11/25: The Collective Hallucination of Currency

John Battelle's Searchblog

Bitcoin mining operation. “These definitions do not restrict the use of pen registers or trap-and-trace devices to communication facilities associated with individual users, it is finding that these definitions encompass an exceptionally broad form of collection.” And tweet us links! ” N.S.A.

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Utilities need to maintain situational awareness through communications and dashboards of the critical data that informs all of these considerations. How technology can help: An effective workforce management solution can help utilities optimize resources and schedules and communicate changes in real time. Situational awareness.

article thumbnail

Illegal Content and the Blockchain

Schneier on Security

There’s the Bitcoin logo, and the original paper describing Bitcoin by its alleged founder, the pseudonymous Satoshi Nakamoto. Most Bitcoin mining happens in China. That is because the value of an open network relates to how many others you can communicate with — and, in a blockchain, transact with.

article thumbnail

Doing digital right for consumer healthcare products

CGI

The aim is to mine data quickly and uncover actionable information for companies and brands to enhance their customer experience. Consumers research and experience products through every conceivable communication channel, and brands must provide these consumers with relevant product information to support purchase decisions.