Santiago Morante Cendrero Artificial Intelligence in Fiction: The Bestiary Chronicles, by Steve Coulson It is common in the era of Artificial Intelligence (AI) to hear about how this technology can revolutionise different areas of human life, from medicine to manufacturing. However, in...
Santiago Morante Cendrero Artificial Intelligence in Fiction: The Circle (2017), by James Ponsoldt Plot The film The Cricle by James Ponsoldt, based on Dave Eggers‘ novel of the same title, introduces Mae Holland (Emma Watson) as a young intern who joins The Circle...
Santiago Morante Cendrero AI in Science Fiction Films: A Recurring Pattern of Fascination and Horror In today’s post we are going to explore how Hollywood films have dealt with the subject of technological advances, especially robotics and Artificial Intelligence. You will be surprised to...
Santiago Morante Cendrero Deep Learning in Star Wars: May Computation Be With You Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Santiago Morante Cendrero Artificial Intelligence in fiction: Eva, by Kike Maíllo Are you afraid your food processor will rebel and poison your lentils? Do you think your Roomba is watching you? Do you wear a hat when you see a...
Santiago Morante Cendrero Warning About Normalizing Data For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths How to cause a DoS in Windows 8 explorer.exe We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...