article thumbnail

Communal Computing’s Many Problems

O'Reilly on Data

After the release of the iPad in 2010 Craig Hockenberry discussed the great value of communal computing but also the concerns : “When you pass it around, you’re giving everyone who touches it the opportunity to mess with your private life, whether intentionally or not. There is a tradeoff between the trust and risk. Source: [link].

Risk 335
article thumbnail

Structural Evolutions in Data

O'Reilly on Data

” There’s as much Keras, TensorFlow, and Torch today as there was Hadoop back in 2010-2012. “Here’s our risk model. Isn’t it nice to uncover that in a simulated environment, where we can map out our risk mitigation strategies with calm, level heads? Those algorithms packaged with scikit-learn?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proposals for model vulnerability and security

O'Reilly on Data

Like many others, I’ve known for some time that machine learning models themselves could pose security risks. An attacker could use an adversarial example attack to grant themselves a large loan or a low insurance premium or to avoid denial of parole based on a high criminal risk score. 2010): 121-148. Barreno, Marco, et al.

Modeling 278
article thumbnail

4 Certificates Data Security Enthusiasts Should Consider

Smart Data Collective

There were only 662 data breaches in 2010. This qualification will prepare you to manage the following in your data security career: attacks, threats, and vulnerabilities architecture and design operation and incidence response governance, risk, and compliance. Data security has become a greater concern than ever in recent years.

Testing 141
article thumbnail

Run high-availability long-running clusters with Amazon EMR instance fleets

AWS Big Data

Configure core nodes for enhanced data availability – To minimize the risk of local HDFS data loss on your production clusters, we recommend that you set the dfs.replication parameter to 3 and launch at least four core nodes. Limited availability of IP addresses in a subnet can also result in cluster launch or scaling failures.

Metrics 68
article thumbnail

Cropin’s agriculture industry cloud to provide apps, data frameworks

CIO Business Intelligence

Cropin Apps, as the name suggests, comprises applications that support global farming operations management, food safety measures, supply chain and “farm to fork” visibility, predictability and risk management, farmer enablement and engagement, advance seed R&D, production management, and multigenerational seed traceability.

B2B 105
article thumbnail

What Are the Most Important Steps to Protect Your Organization’s Data?

Smart Data Collective

Based on figures from Statista , the volume of data breaches increased from 2005 to 2008, then dropped in 2009 and rose again in 2010 until it dropped again in 2011. They can use AI and data-driven cybersecurity technology to address these risks. The instances of data breaches in the United States are rather interesting. In summary.

Testing 131