article thumbnail

Privacy and Security of Data at Universities

Schneier on Security

The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII.

Privacy 83
article thumbnail

MLOps and the evolution of data science

IBM Big Data Hub

Machine learning (ML), a subset of artificial intelligence (AI), is an important piece of data-driven innovation. Machine learning engineers take massive datasets and use statistical methods to create algorithms that are trained to find patterns and uncover key insights in data mining projects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

A relatively new method of fraud on the ICO market was stealing a White Paper of ICO project and presenting an identical idea under a new brand name. In 2018 Group-IB detected five successful “51% attacks”, when attackers take control over at least 51% of mining power.

article thumbnail

Security Affairs newsletter Round 223 – News of the week

Security Affairs

Paper Copy. Israel surveillance firm NSO group can mine data from major social media. Poland and Lithuania fear that data collected via FaceApp could be misused. Former NSA contractor sentenced to 9 years for stealing classified data. A new round of the weekly SecurityAffairs newsletter arrived!

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

Given what some tech assessments portend (and I hope they’re wrong), the only remaining human task for RMs may one day be to manage residual paper files and press the “Are you sure you want to delete?” As expert Vicki Lemieux and her U of BC team simply put it, “Blockchain technology is fundamentally a recordkeeping technology.”