Author archive: Ibrahim Sajid Malick

Articles Featured Videos
Artificial Intelligence: Transferring biases to machines
February 2, 2018
0
, , , ,
Are we transferring our biases to computers? With supervised learning, machines learn what we teach them. Just like our kids often perpetuate our belief systems, biases, and preferences, will machine also carry forward our implicit biases? Leading research on prejudice, the study of implicit social cognition, highlight the distinction between “controlled” and “automatic” information processing. […]
Articles Featured
TensorFlow is gaining currency!
January 31, 2018
0
,
This rock-paper-scissors science experiment is a novel use of TensorFlow.  Last year TensorFlow was seen automating cucumber sorting, finding sea cows in aerial imagery, sorting diced potatoes to make safer baby food, identifying skin cancer, helping to interpret bird call recordings in a New Zealand bird sanctuary, and identifying diseased plants in the most popular […]
Articles
Amazon-Google Feud
December 6, 2017
0
,
Are you following Google-Amazon feud? Google has decided to remove YouTube from all Fire TV products and the Echo Show apparently after Amazon’s decided to delist new Nest products. Amazon claims that “Google is setting a disappointing precedent by selectively blocking customer access to an open website.” Amazon has also refused to sell Google products […]
Articles Featured
Privacy: Can WiFi data be anonymous?
October 19, 2017
0
, ,
While in the past, mobility traces were only available to mobile phone carriers, the advent of smartphones and other means of data collection has made these broadly available. Last year Transport for London (TfL) launched trial to gather “de-personalised WiFi connection data collected at 54 London Underground stations within Zones 1-4 to help improve the […]
Articles Featured
KRACK Attack: Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
October 17, 2017
0
, , , ,
We are all exposed to the Krack Wi-Fi security vulnerability—a flaw that puts any person using wireless internet at risk of being hacked. The Krack security exploit was discovered by Mathy Vanhoef, a cybersecurity expert at Belgian university KU Leuven, who will present his research at the Computer and Communications Security (CCS) conference later this […]
Articles Featured
Priceless Product Placement of FireEye Cyber Threat Map
September 30, 2017
0
, , , , , ,
It appears Department of Homeland Security has put it's trust on FireEye (NASDAQ: FEYE), the intelligence-led security company. VICE feature on Cybersecurity gave us a glimpse of DHS control room. Of course, I spotted the security product and an oraganic product promotion.