AI of Things The Deep Learning Hype Written by Alfonso Ibañez, Data Science manager at LUCA consulting analytics In the era of Big Data a day does not pass without us reading some news about Artificial Intelligence, Machine...
AI of Things 5 in 5: How to successfully implement AI into your business (EP 2) As many firms embark upon their digital transformation, confusion is growing around the use of Artificial Intelligence and what it will mean for the business world. As we have...
AI of Things The Chief Data Officer: What can they do for your company? Written by Antonio Pita Lozano, Operations & Solutions Director at LUCA Consulting Analytics. Head of Big Data Science Data economy, Big Data, Machine Learning, Artificial Intelligence or Internet of Things...
AI of Things 5 in 5: How AI can benefit your business (EP 1) Over the last 10 years, we have experienced a monumental shift in the way in which businesses operate. Terms such as Big Data and Artificial Intelligence are common place, and as the full...
AI of Things 4 trends in technology for 2019 Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...
AI of Things A Brief History of Machine Learning As members of the Machine Learning community, it would be a good idea for us all to have an idea of the history of the sector we work in....
Santiago Morante Cendrero Warning About Normalizing Data For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
Richard Benjamins Artificial Intelligence – Five Fears Explained While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
AI of Things Human Intelligence driving AI: Demand for Data Scientists Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Paloma Recuero de los Santos Artificial Intelligence: a “very human” technology What makes us human? The answer to this question is not simple, it’s not easy to define what makes us human.We can try to find the answer from a...
Innovation Marketing Team Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Showing certificate chain without validating with Windows "certificate store" (C#) Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...