Ana Zamora Hackathons are not just for developers By Glyn Povah, Head of Global Product Development at LUCA. Hackathon is derived from the English words “hack” and “marathon”, and if you Google the word “hackathon” you’ll get something...
Paloma Recuero de los Santos Python for all (4): Data loading, explorative analysis and visualisation Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
Cascajo Sastre María Smart Mobility, distances connected Thanks to the rapid advances in mobility, we have realized that the systems that facilitate the transport of people and that connect different points of the city are undoubtedly...
Beatriz Sanz Baños A much safer world is possible thanks to IoT The police forces usually use reactive methods to stop the damage generated when a crime occurs. However, security measures are being transformed into more preventive actions by allowing them to predict...
ElevenPaths Detected an extension in Chrome Web Store, active from February, that steals credit cards We have detected an extension for Google Chrome, still active, that steals data from web site forms visited by the victims. This extension, which is still available on Chrome...
Sergio De Los Santos OpenPGP: Desperately Seeking Kristian Open Source applications run on a server system that has never worked properly. Why does this happen?
LUCA LUCA Talk: RCS for Business Messaging, a New Generation It is undeniable that we are in the midst of a revolution in communications. With more than five billion active accounts in mobile messaging applications and a strong upward...
Paloma Recuero de los Santos Python for all (5): Finishing your first Machine Learning experiment with Python We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
Paloma Recuero de los Santos Python for all (4): Data loading, explorative analysis and visualisation Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
Paloma Recuero de los Santos Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need? We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries. We will see what purpose some of them...
Paloma Recuero de los Santos Python for all (2): What are Jupyter Notebooks? What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Paloma Recuero de los Santos Python for all (1): Installation of the Anaconda environment Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
Paloma Recuero de los Santos Dare with Python: An experiment for all (intro) As we did in our experiment on the Titanic dataset in Azure Machine Learning Studio, we will continue with the “Learning by doing” strategy because we believe that the...
Santiago Morante Cendrero Warning About Normalizing Data For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
LUCA Deep Learning vs Atari: train your AI to dominate classic videogames (Part II) Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this article, the second about our experiment using Reinforcement Learning (RL) and Deep Learning in...
LUCA Deep Learning vs Atari: train your AI to dominate classic videogames (Part I) A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
Diego Samuel Espitia Detecting the Indicators of An Attack We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
ElevenPaths Cyber Security Weekly Briefing January 23-29 Attack against SonicWall by exploiting a possible 0-day in its VPN appliances Firewall manufacturer SonicWall has issued a security alert warning that it has detected a sophisticated attack against...
ElevenPaths 4 Tips to Secure Your Data We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
Innovation and Laboratory Area in ElevenPaths #CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer There are many reports on security trends and summaries, but at ElevenPaths we want to make a difference. From the Innovation and Laboratory team, we have just launched our...
Olivia Brookhouse Can Artificial Intelligence understand emotions? When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...