Remove IT Remove Mining Remove Retail Remove Video
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

And their grander vision is to help establish a nationwide biometric database in which a hybrid facial ID/fingerprint can be used for things such as fraud-proofing retail transactions, or, say, taking a self-driving vehicle for a spin. SAFR is tuned to identify people walking past a video cam who aren’t looking squarely at the lens.

Privacy 157
article thumbnail

The Sites That Never Get Built: Why Today’s Internet Discourages Experimentation

John Battelle's Searchblog

It’s rare I imagine something bounded in real space – a new restaurant or a retail store. For my best friend’s father, and for mine, there’s no chance of “forever” happening. But a recent thought experiment made me question that assumption. So let’s start with the idea itself.

Mining 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data science vs data analytics: Unpacking the differences

IBM Big Data Hub

Additionally, data science requires experience in SQL database coding and an ability to work with unstructured data of various types, such as video, audio, pictures and text. For example, retailers can predict which stores are most likely to sell out of a particular kind of product.

article thumbnail

Attacks against machine learning — an overview

Elie

Here is a re-recording of this talk: You can also get the. slides here. Disclaimer: This post is intended as an overview for everyone interested in the subject of harnessing AI for anti-abuse defense, and it is a potential blueprint for those who are making the jump. Below are three key design strategies to help with that. Limit information leakage.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

Here is a re-recording of this talk: You can also get the. slides here. Disclaimer: This post is intended as an overview for everyone interested in the subject of harnessing AI for anti-abuse defense, and it is a potential blueprint for those who are making the jump. Below are three key design strategies to help with that. Limit information leakage.

Mining 91
article thumbnail

Leaders need the technical detail

MIKE 2.0

When you think of organisations whose leaders fall into this category, Netflix, Amazon and Tesla immediately come to mind, but there is no reason to assume this management mindset should be limited to these cutting-edge video, retail or car companies! I recently heard a financial services executive on the radio talking about Bitcoin.

article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. This is the user-selected password used for identity verification with store customers wandering past it.