Katherine Bindley of the Wall Street Journal is at CES to take a look at the latest AI-infused cameras on the market.
Two new smart systems use cameras, artificial intelligence and an assortment of sensors to keep watch over you—Patscan looks for threats in public spaces, while Eyeris monitors the driver and passengers in a car. WSJ’s Katherine Bindley visits CES to explores their advantages, as well as their privacy costs.
Join James Penney, CTO, Device Authority, (aka.ms/iotshow/deviceauthority) to learn how Device Authority’s KeyScaler platform can be used to securely onboard IoT devices to the Azure IoT Hub Device Provisioning Service in seconds without human intervention.
The KeyScaler platform solves one of the biggest challenges of IoT: onboarding of devices at scale and managing the owner-controlled identities and credentials across the different services.
Device Authority’s KeyScaler platform provides policy-driven automated PKI management for any IoT device to connect it to any Certificate Authority.
Learn all about the new data classification capabilities built into Azure SQL Database. Data Classification enables discovering, classifying, labeling & protecting the sensitive data in your databases.
Examples of sensitive data include business, financial, healthcare, personally identifiable data (PII). Discovering and classifying your most sensitive data can play a pivotal role in your organizational information protection stature.
Data discovery & classification is part of the Advanced Data Security (ADS) offering, which is a unified package for advanced SQL security capabilities.
As ML is being used for increasingly security sensitive applications and is trained in increasingly unreliable data, the ability for learning algorithms to tolerate worst-case noise has become more and more important.
The reliability of machine learning systems in the presence of adversarial noise has become a major field of study in recent years.
In this talk, I’ll survey a number of recent results in this area, both theoretical and more applied. We will survey recent advances in robust statistics, data poisoning, and adversarial examples for neural networks. The overarching goal is to give provably robust algorithms for these problems, which still perform well in practice.
Machine Learning powers almost every internet service we use these days, but it’s rare to find a full pipeline example of machine learning being deployed in a web app. In this episode, I’d like to present 5 full-stack machine learning demos submitted as midterm projects from the students of my current course. The midterm assignment was to create a paid machine learning web app, and after receiving countless incredible submissions, I’ve decided to share my favorite 5 publicly. I was surprised by how many students in the course had never coded before and to see them building a full-stack web app in a few weeks was a very fulfilling experience. Use these examples as a template to help you ideate on potential business ideas to make a positive impact in the world using machine learning. And if you’d like, be sure to reach out and support each of the students I’ve demoed here today in any way can you offer. They’ve been working their butts off. Enjoy!
freeCodeCamp.org has posted a full 14 hour network penetration testing/ethical hacking in this full tutorial course for beginners.
This course teaches everything you need to know to get started with ethical hacking and penetration testing. You will learn the practical skills necessary to work in the field.
Throughout the course, you will develop your own Active Directory lab in Windows, make it vulnerable, hack it, and patch it. We’ll cover the red and blue sides. We’ll also cover some of the boring stuff like report writing :).
This course was originally live streamed weekly on Twitch and built from lessons learned in the previous week.
Siraj Raval just posted this video on defending AI against adversarial attacks
Machine Learning technology isn’t perfect, it’s vulnerable to many different types of attacks! In this episode, I’ll explain 2 common types of attacks and 2 common types of defenses using various code demos from across the Web. There’s some really dope mathematics involved with adversarial attacks, and it was a lot of fun reading about the ‘cat and mouse’ game between new attack techniques, followed by new defense techniques. I encourage anyone new to the field who finds this stuff interesting to learn more about it. I definitely plan to. Let’s look into some math, code, and examples. Enjoy!