article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

And their grander vision is to help establish a nationwide biometric database in which a hybrid facial ID/fingerprint can be used for things such as fraud-proofing retail transactions, or, say, taking a self-driving vehicle for a spin. SAFR is tuned to identify people walking past a video cam who aren’t looking squarely at the lens.

Privacy 157
article thumbnail

Data science vs data analytics: Unpacking the differences

IBM Big Data Hub

Additionally, data science requires experience in SQL database coding and an ability to work with unstructured data of various types, such as video, audio, pictures and text. For example, retailers can predict which stores are most likely to sell out of a particular kind of product.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine.

Mining 91
article thumbnail

Leaders need the technical detail

MIKE 2.0

When you think of organisations whose leaders fall into this category, Netflix, Amazon and Tesla immediately come to mind, but there is no reason to assume this management mindset should be limited to these cutting-edge video, retail or car companies! Similarly, augmented reality developers are looking for real-world applications.

article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. No video recording or photos needed. This is the user-selected password used for identity verification with store customers wandering past it.

article thumbnail

The Gap Scenario

John Battelle's Searchblog

* It's been a longstanding thesis of mine that Google's ability to reorder information in microseconds, based on our declared intent through a search query, has habituated us to expect an immediate and relevant response from nearly every website - and in particular, commercial sites. You came in for your own retail therapy, after all.

Retail 92