An infinite set of security tools
Window Snyder says security basics are hard to implement consistently, but they're worth the effort.
Window Snyder says security basics are hard to implement consistently, but they're worth the effort.
Multi-model database architectures provide a flexible data governance platform
Crypto Docs, Ultrasound, Anti-Innovation Investors, and IoT Security
Watch highlights covering security, defense, culture, and more. From the O'Reilly Security Conference in New York 2017.
Chris Wysopal explains how defenders can help developers create secure software through coaching, shared code, and services.
Katie Moussouris explains how to turn the forces that resist defense activities into the biggest supporters.
Haroon Meer says a new type of security engineering is taking root, which suggests hope for effective corporate security at enterprise scale.
Fredrick Lee shines a light on the ways security can be allowed into the world to do more.
AI for Databases, One-Pixel Attacks, Adtech Uncanny Valley, and Mindreading Video
README Maturity Model, Open Source Project Maturity Model, Walmart Robots, and Sparse Array Database
Gentle PR, Readable Arxiv, Sentiment Bias, and AI Coding from Sketches
License Plates, Speech Recognition, Social Proof, and Engineering Growth
Simpson's Paradox, Attention Economics, Dynamic Programming, and Retro Unit Testing
If You Build It, Bias not Behavior, Cognitive Biases, and Future of SaaS Businesses
To become a “machine learning company,” you need tools and processes to overcome challenges in data, engineering, and models.
Applying methods from Agile software development to data science projects.
Web Performance, Fact Checks, DIY Computer, and Performance Reviews
Catherine Mulligan discusses the implications of blockchain on distributed systems and what needs to be addressed to build and maintain these systems effectively.