AI of Things 4 trends in technology for 2019 Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...
AI of Things A Brief History of Machine Learning As members of the Machine Learning community, it would be a good idea for us all to have an idea of the history of the sector we work in....
ElevenPaths DNS over HTTPS (DoH) is already here: the controversy is served Recently, the IETF has raised to RFC the DNS over HTTPS proposal. In other words, this means resolving domains through the well-known HTTPS, with its corresponding POST, GET and certifications...
Santiago Morante Cendrero Warning About Normalizing Data For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
Cascajo Sastre María IoT growth forecast Internet of Things is transforming the world of technology by leaps and bounds. Its evolution enables the development of smart cities, industries and homes, which generates more sustainable and...
AI of Things Big Data & AI changing the music game: IBM Watson BEAT Music is something that unites us. Go anywhere in the world and you will find music: someone singing, playing, rapping or dancing. For thousands of years it has formed...
Beatriz Sanz Baños 7 objects that you did not know are IoT Internet of Things, Big Data and Artificial Intelligence keep expanding to all areas of our lives, improving the productivity of companies, governments and people. The amount of everyday objects integrate...
Cascajo Sastre María IoT and Big Data: the parents of carsharing Mobility is one of the main problems of large cities. Every day, millions of citizens are caught in traffic jams. Although it may seem difficult, this reality can be...
AI of Things Expert Systems in the World of Medicine Written by Sergio Sancho Azcoitia, Security Research en ElevenPaths Since its appearance a few years ago, expert systems have been applied in different fields. Due to their effectiveness they have...
ElevenPaths A story about two minds: the vast difference between real and perceived risk “In our society it is generally not considered justifiable to make a decision purely on an emotional response. We want to be considered scientific and rational, so we come up with...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Showing certificate chain without validating with Windows "certificate store" (C#) Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...