article thumbnail

MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing?

The Last Watchdog

Towards this end it has begun sharing videos, whitepapers and reports designed to rally decision makers from all quarters to a common cause. Healthcare providers haven’t yet figured out how to digitalize medical records in a way that robustly preserves patient privacy and keeps patient information out of data thieves’ hands.

Big data 279
article thumbnail

blekko Explains Itself: Exclusive Video (Update: Exclusive Invite)

John Battelle's Searchblog

blekko: how to slash the web from blekko on Vimeo. Blekko is a new search engine that fundamentally changes a few key assumptions about how search works. For a quick overview of blekko's core feature - "slashtags" - check out the new video, above. Now, not many of us actually will do that. But will services take that and run?

Mining 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Infostealer Gangs Steal 50 Million Passwords

eSecurity Planet

Lower-ranked scammers are employed by the groups to drive traffic to scam websites that trick victims into downloading the malware, using links in reviews of popular games on YouTube, in mining software, on NFT forums, and in lotteries on social media. How to Stop Infostealer Malware. Like the attackers observed by Group-IB, SEKOIA.IO

Passwords 127
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

Here’s how Jay Stanley, senior policy analyst for the American Civil Liberties Union , described it for me: “Right now everybody knows that when you walk down the street you’re recorded by a lot of video cameras, and that the video will just sit on some hard drive somewhere and nothing really happens to it unless something dramatic goes down.

Privacy 157
article thumbnail

Neeva Combines AI and Search – Now Comes The Hard Part

John Battelle's Searchblog

Today, for example, I asked it the very same search I asked Google earlier this morning: “ how to remove rear wheel specialized bike through axel.” ” I was struggling with my bike and years of habit taught me that there was likely a video buried somewhere on YouTube that would show me what I was doing wrong.

Marketing 138
article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. This post is the fourth, and last, post in a series of four dedicated to providing a concise overview of how to use AI to build robust anti-abuse protections. as highlighted in the video above.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. This post is the fourth, and last, post in a series of four dedicated to providing a concise overview of how to use AI to build robust anti-abuse protections. as highlighted in the video above.

Mining 91