article thumbnail

Mine, Mine, All Mine

John Battelle's Searchblog

Author’s musical preferences not included… No Longer Mine When I write, I like to listen to music. If they change course, or – perish the thought – if they fail, well, what then? In short, everything could be minedmined for insights, for value, for untold usefulness.

Mining 52
article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

Of course it's virtual because let's face it, nobody is going anywhere at the moment. Or don't ask anything and we'll banter away as we normally would anyway which people always seem to love when it happens on my weekly videos. Questions can be asked on any topic anyone feels like and we'll both be there responding together.

Mining 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 216

Troy Hunt

Alrighty, quickie intro before I rush off to hit the tennis court, catch up with old friends, onto the wake park before BBQ and, of course, ??. References We're tracking remarkably well down here COVID wise (and yes, I'm very conscious of how different it is in other parts of the world right now, thoughts are with you guys) Guitar lessons! (ok,

Mining 134
article thumbnail

Embeddable AI saves time building powerful AI applications

IBM Big Data Hub

With embeddable AI, you get a set of flexible, fit-for-purpose AI models that developers can use to provide enhanced end-user experiences—like, automatically transcribing voice messages and video conferences to text. Language-training school ASTEX , based in Madrid, Spain, has seen student careers skyrocket after they completed its courses.

article thumbnail

MY TAKE: The no. 1 reason ransomware attacks persist: companies overlook ‘unstructured data’

The Last Watchdog

Related video: Why it’s high time to protect unstructured data. Most of the unstructured data generated in the course of conducting digital commerce doesn’t get stored in a database or any other formal management system. But with no orderly internal framework, unstructured data defies data mining tools.

article thumbnail

Acuity Who? Attempts and Failures to Attribute 437GB of Breached Data

Troy Hunt

Slightly different column count to mine (and similar but different to the hacker forum post), and slightly different email count, but the similarities remain striking. So how many "Acuity" companies are out there in total?! And it's called Acuity!

Insurance 121
article thumbnail

Malvertising Campaign Targets IoT Devices: GeoEdge

eSecurity Planet

The delivery of malicious code through advertising supply chains is an insidious attack spanning over the course of 15 years. Helping to fuel the change are consumers increasingly embracing social media and digital video. Spending on Digital Display Ads Increasing.

IoT 144