AI of Things Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
AI of Things These free Google courses will get you started with generative-AI Learn about the concepts and principles of generative AI or how to create and deploy AI solutions: language models, image generation... and also about responsible AI.
AI of Things GDPR 101: What you need to know On 25 May, the much talked about General Data Protection Regulation (GDPR), came into force. This new regulation has the primary objective of governing the gathering, using and sharing...
AI of Things Mum, when I grow up I want to be a hacker The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? A...
AI of Things Deep Learning and satellite images to estimate the impact of COVID19 Motivated by the fact that the Coronavirus Disease (COVID-19) pandemic has caused worldwide turmoil in a short period of time since December 2019, we estimate the negative impact of...
AI of Things Success Story: LUCA Transit and Highways England The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
AI of Things Can Big Data reshape the Outdoor Media sector? Out-of-home (OOH) adspend in the UK rose to £1 billion 2014, and is predicted to grow by 4.8% in 2016 according to a recent report. To ensure they benefit...
AI of Things Understanding clients of La Vaguada shopping center Understanding the profile of clients, and their wants and needs, is vital for any brand. Companies that know what their target audience wants will be able to reach their...
Richard Benjamins Big Data Week 2016: Forget Big Data, Artificial Intelligence is the new kid on the block Yesterday, the LUCA team attended the first day of Big Data Week. BDW is a global community that organizes an annual event focusing on the social, political, and technological...
Richard Benjamins From Data Exhaust to Data-Driven: How CEOs face Big Data Since Big Data became a buzzword in the board room of companies some years ago (thanks to McKinsey’s report “Big Data: The next frontier for innovation, competition, and productivity”), many...
Florence Broderick ElevenPaths Talks: The ISF Standard of Good Practice for Information Security REGISTER HERE! On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...