Archive for

Integrating sensor data into the app

Designers at Jacler dpkp/ Make apps smarter Navigation calender dp’t tet and drive adaptive to surrooundong.

data mining for security

Types of attacks on Linkedin Ip Bloc, Heuristic rules machine learning scroing system., reject/accpet abuseDB, Kafka scheduled scorning jobs case stuides: registration, fake accounts accounta takeover. Blocking out Fake accounts nline and offline. Online/offline tradeoffs cons & pros. speed, data soures computer, computation limites. slow to build & iterate, fast to vuild and iterate. effectiveness … Continue reading

Future of computer security

Reactuve to preemptive