Remove tag national-security
Remove Examples Remove Manufacturing Remove Meeting Remove Security
article thumbnail

10 everyday machine learning use cases

IBM Big Data Hub

For example, many use it to contact users who leave products in their cart or exit their website. ML also helps drive personalized marketing initiatives by identifying the offerings that might meet a specific customer’s interests. Then, it can tailor marketing materials to match those interests.

article thumbnail

Shifting the Lens on WWI: Stories from the Home Front

Unwritten Record

Historypin teamed up with the US National Archives (NARA) to develop the Remembering WWI tablet app, part of the Anonymous Donor Project. You can learn more about the national collaborative Remembering WWI project here. Today’s post comes from Marissa Friedman, intern at Historypin. 165-WW-582-A1. Schoberg in Kentucky.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. Security /= George blocking — Vatsalya Goel (@vatsalyagoel) January 9, 2018.

Security 111