Modernizing cybersecurity approaches

Utilizing machine intelligence to facilitate proactive cybersecurity operations. Cybersecurity incidents are among the greatest concerns of businesses, government agencies, and private citizens today. In the modern world, protecting our data and information assets is nearly as important as maintaining the security of our physical assets. It should not be surprising, then, that data analytics play a key role in cybersecurity. Analytics and machine intelligence, a field concerned with producing machines able to autonomously perform tasks that would normally require human intelligence, can drive an organization from reactive to proactive when coupled with organizational change. This capability enables organizations of all types to move from simply measuring signals (data), to creating sentinels (machine learning algorithms), and then moving ahead to sense-making (actionable machine intelligence).

Extracting meaningful signals from mountains of data

The quantity and complexity of digital network information has skyrocketed in recent years due to the explosion of internet-connected devices,
Continue reading "Modernizing cybersecurity approaches"

Four short links: 14 March 2018

Flow Diagrams, Multiplayer Editing, Inductive Programming, and Manipulating Data
  1. SankeyMATIC -- A Sankey diagram depicts flows of any kind, where the width of each flow pictured is based on its quantity. [...] SankeyMATIC builds on the open source tool D3.js and its Sankey library, which are very powerful but require a fair amount of work and expertise to use. SankeyMATIC unlocks the capabilities of the D3 Sankey tool for anyone to use.
  2. Type in Tandem -- Decentralized, cross-editor, collaborative text-editing. A protocol, back end, and plugins for various editors.
  3. Approaches and Applications of Inductive Programming -- Inductive programming (IP) addresses the automated or semi-automated generation of computer programs from incomplete information such as input-output examples, constraints, computation traces, demonstrations, or problem-solving experience. I'm watching because I believe that a lot of software will eat itself.
  4. Your Data is Being Manipulated (danah boyd) -- text of a talk given
    Continue reading "Four short links: 14 March 2018"

Getting the most from the AI Business Summit

The AI Conference in NY will feature tutorials, conference sessions, and executive briefings to help business leaders understand and plan for AI technologies. Artificial intelligence has certainly been the most heavily hyped topic of the past year. There’s a lot of smoke and confusion—and, incidentally, a lot of fire. Businesses are using AI to transform themselves: they’re using it to help their employees do more meaningful work, they’re using it to satisfy customers, and they’re using it to find opportunities they didn’t know existed. But with all the frenzy, there’s also been a lot of thrash. Many execs want to “develop an AI strategy,” but they don’t know what that strategy is, or what it’s for. You won’t get anywhere in AI without a concrete plan that relates to your current business environment and needs. AI won’t magically solve your problems. Nor can we, but we can give you the
Continue reading "Getting the most from the AI Business Summit"

Four short links: 13 March 2018

El Paquete, Ingenious Malware, Region Evacuation, and Deck Template
  1. Inside El Paquete, Cuba’s Social Network -- In a country where the government keeps tight control over the media, citizens are able to access an extraordinary amount of information from around the world in the form of a terabyte-sized weekly file dump, Bring Your Own Hard Drive. Nation-scale sneakernet. (via Andy Baio)
  2. The Slingshot APT FAQ --malware that disabled disk defragmentation because it stores its own encrypted filesystem in the unused sectors of yours.
  3. Netflix Region Evacuation -- This article describes how we re-imagined region failover from what used to take close to an hour to less than 10 minutes, all while remaining cost neutral.
  4. YC Seed Deck Template -- The deck below is a template for how I think companies should build seed decks. While the main target for this template is a company raising its seed round, the
    Continue reading "Four short links: 13 March 2018"

Four short links: 12 March 2018

Health Care, Learning Coding, Reverse-Engineering Sandbox, and Secret Management
  1. Health Care (Kellan Elliot-McCrea) -- I walked away with a single insight: it’s that the problems of the U.S. health care system are very tractable. The high cost and mixed results are unique to our system. There are incumbents fighting fiercely to maintain the status quo, but no more so than in other industries that technology has overturned. The regulatory environment is complex, but again not uniquely so. There are industries where one has to dig to find the problems that technology is well suited to solve, but U.S. health care, an industry that communicates via fax, is not one of them.
  2. How to Design Programs (2nd Edition) -- The purpose of this book is to introduce readers without prior experience to the systematic design of programs. In tandem, it presents a symbolic view of computation, a method that
    Continue reading "Four short links: 12 March 2018"

Four short links: 9 March 2018

Truth vs. Falsehoods, Shitizen Science, Open Source Guides, and The Great Slate
  1. The Spread of True and False News Online (Science) -- It took the truth about six times as long as falsehood to reach 1,500 people and 20 times as long as falsehood to reach a cascade depth of 10. As the truth never diffused beyond a depth of 10, we saw that falsehood reached a depth of 19 nearly 10 times faster than the truth reached a depth of 10. Falsehood also diffused significantly more broadly and was retweeted by more unique users than the truth at every cascade depth.
  2. American Gut: An Open Platform for Citizen-Science Microbiome Research -- Although much work has linked the human microbiome to specific phenotypes and lifestyle variables, data from different projects have been challenging to integrate, and the extent of microbial and molecular diversity in human stool remains unknown. Welcome to
    Continue reading "Four short links: 9 March 2018"