Remove Examples Remove Exercises Remove Meeting Remove Mining
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. They were for me. It’s almost ubiquitous.

article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And in this hacker mine episode, I'm going to be giving some practical insight around the world of bug bounties through the eyes of various hackers I have previously interviewed on the show. I would say primarily two and a half years and I still don't do exercises that well because I never look for exercise. I'm Robert Vamosi.

Mining 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). The results of this exercise might look like Figure 7.

article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. A perfect example is that the house purchase fell through due to the vendor not being agreeable to the terms I set forth. Schedule a meeting. Legal jargon in contracts is a prime example.

Sales 142
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Meet Stok; he’s one of them. And in a moment, you’ll meet one of them. Here’s a really common example. So I would say primarily two and a half years, and I still don't do exercises that well, because I never look for XSSes. You’ve probably heard of bug bounties. Vamosi: Two things here.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Meet Stok; he’s one of them. And in a moment, you’ll meet one of them. Here’s a really common example. So I would say primarily two and a half years, and I still don't do exercises that well, because I never look for XSSes. You’ve probably heard of bug bounties. Vamosi: Two things here.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Meet Stok; he’s one of them. And in a moment, you’ll meet one of them. Here’s a really common example. So I would say primarily two and a half years, and I still don't do exercises that well, because I never look for XSSes. You’ve probably heard of bug bounties. Vamosi: Two things here.