article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

And in this hacker mine episode, I'm going to be giving some practical insight around the world of bug bounties through the eyes of various hackers I have previously interviewed on the show. I would say primarily two and a half years and I still don't do exercises that well because I never look for exercise. I'm Robert Vamosi.

Mining 40
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Mine has been a positive one, and I thank the ICRM for supporting the opportunity for measurable, professional validation. While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. They were for me. It’s almost ubiquitous.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). The results of this exercise might look like Figure 7.

article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. Schedule a meeting. It was an exercise that enabled me to look much further down the road and consider whether it aligned to an earlier point in this blog post - my big picture. 15 mins to go!

Sales 142
article thumbnail

Artificial Intelligence: 6 Step Solution Decomposition Process

Bill Schmarzo - Dell EMC

Note: throughout this blog, when I use the term “artificial intelligence,” I mean that to include other advanced analytics such as deep learning, machine learning (supervised, unsupervised, reinforcement), data mining, predictive analytics, and statistics (see Figure 1). The results of this exercise might look like Figure 7.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Meet Stok; he’s one of them. And in a moment, you’ll meet one of them. So I would say primarily two and a half years, and I still don't do exercises that well, because I never look for XSSes. You’ve probably heard of bug bounties. Welcome to the Hacker Mind, an original podcast from ForAllSecure.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

Meet Stok; he’s one of them. And in a moment, you’ll meet one of them. So I would say primarily two and a half years, and I still don't do exercises that well, because I never look for XSSes. You’ve probably heard of bug bounties. Welcome to the Hacker Mind, an original podcast from ForAllSecure.