May 15, 2015

Principal Component Analysis And Singular Value Decomposition
One of the most common dimensionality reduction technique is filtering, in which you leave most of the dimensions and concentrate only on certain dimensions. But that doesn’t always work, when you are dealing with image data, the number of pixels represents the number of dimensions in the image. Now you have lot of dimensions and you don’t want to throw out dimensions inorder to make sense of your overall data set. As the dimensionality of your data increases, the volume of the space increases, in a sense the data you have becomes more and more sparse(scattered). One way to think about it is a very high data set might live in some kind of high dimensional manifold and as you are increasing the number of dimensions, that manifold becomes bigger and bigger.

Why Big Data is bad for science
“Scientific advances are becoming more and more data-driven,” write statistician Jianqing Fan of Princeton University and colleagues. “The massive amounts of … data bring both opportunities and new challenges to data analysis.” For one thing, huge datasets are seductive. They invite aggressive analyses with the hope of extracting prizewinning scientific findings. But sometimes Big Data In means Bad Data Out. Wringing intelligent insights from Big Data poses formidable challenges for computer science, statistical inference methods and even the scientific method itself. Computer scientists, of course, have made the accumulation of all this big data possible by developing exceptional computing power and information storage technologies. But collecting data and storing information is not the same as understanding it.

Lily Is A Self-Flying Drone That Follows You Around And Films You
Whatever you want to call it, the Lily drone uses a combination of GPS and visual processing to track the user. The drone contains an accelerometer, gyroscope, barometer, GPS and three cameras — one camera to do the recording, one that’s looking at the user to visually track them, and another camera looking at the ground to make sure it’s stabilized. Lily also requires a little tracking device you can slip into your pocket or strap onto your wrist. The tracking device has GPS and WiFi that communicates with the drone to make sure it knows where you are — it also has an accelerometer to track how fast you’re moving. The device also has a microphone for picking up sound around you.

Origin EON15-X review: You'll find a desktop CPU in this laptop, and that's a good thing
The EON15-X features two DisplayPorts along with an HDMI out. You get three USB 3.0, a Gigabit ethernet, and a combo USB and eSATA (remember those?) port, plus an SD card reader. There’s also a full set of analog audio ports along with SPDIF. Wireless is an Intel combo 802.11ac and Bluetooth 4.0. The keys have an odd sculpted shape to them that I’m not completely a fan of, but the trackpad isn’t bad. The lid on the laptop and top keyboard deck has a light rubberized coating too. It makes the laptop a little less slippery when hefting. The laptop weighs in at a hefty 7.7 pounds on your lap and pushes 10 with its power brick. You probably won’t lug it with you every day, but it’s manageable for hiking to your buddy’s house for an ad-hoc LAN party or bringing it to your relatives’ house to cut video.

IT suppliers call on new-look GDS for commitment to G-Cloud's future
“One of the most damaging things to all SMEs, and one that has hurt us personally, is the amount of change in G-Cloud over the years. More change at this time would be a bad thing,” she said. Since the framework’s introduction in February 2012, suppliers have had to deal with numerous changes, including a government-wide alteration to the way public sector data is classified in April 2014. Under the new system, public sector information is labelled Official, Secret and Top Secret, based on how sensitive it is, while the previous system was based on a sliding scale of impact levels. This used a scorecard system of zero to six to demonstrate the risk posed to the public sector should data fall into the wrong hands and was used by G-Cloud buyers to ascertain if the services being offered through the framework were equipped to cope with the levels of security they required.

Lean Start-Up, and How It Almost Killed Our Company
Start-ups work rather differently to how large companies run innovation projects. A big company with a portfolio of innovation products is the perfect place to implement the ‘little bets’ strategy – investing more in this seemingly-successful idea, killing off this poor one. For start-ups a poor innovation product is its only product. When it fails or delivers only a small revenue stream, there are a limited number of times that the start-up can pivot, or kill an idea and start again. Each independent start-up is its own ‘little bet’ – the market gains the benefit of the few that succeed, but that’s not much consolation for the 80% of start-ups that close within the first 3 years. Those that succeed will have a mixture of good ideas, good management, good funding and luck. The Lean Start-Up method fails to say much about the equally important, latter two.

Cybersecurity is a team sport
The US is ahead of Europe when it comes to integrating cybersecurity into its foreign and security policies. Europe would be foolish not to follow and learn from its example. As with most security issues, there are signs that in cybersecurity the default behavior for most European countries seems to be to follow the US approach. For the US, the biggest challenges at the moment are: updating all legal frameworks, strengthening cyber rules of engagement for the military, building cyber deterrents, and clarifying the roles and cooperation of the government and private sector. Europeans can learn from five main take-aways from the US’s new cyber strategy. Cybersecurity must be taken more seriously and planned strategically in Europe. The US’s strategy cybersecurity is more holistic and strategic than ever before.

Blended Analytics: That's What's Next for IT Mgmt
While leading vendors and startups alike have made significant progress in leveraging analytics for offering better IT operational insights, the available ITOA solutions still struggle to effectively deal with IT big data -- operating with a focus on data in narrow silos (APM, log etc.). To really reap the benefits and promise of analytics, IT decision makers need to break these silos and apply blended analytics, an approach that blends and analyzes major sources of IT information. Blended analytics can extract insights and draw intelligent correlations from a variety of data produced by multiple systems across IT silos. By analyzing a blend of data sources together IT Decision makers can see more than the individual components and finally get the whole picture.

The rise of Zombie Apps on the mobile landscape
The first and most obvious answer is to keep an eye on any outdated apps and remove them if you don't need them. If you're an Android user, you can install utilities such as Notification History or App Install History to keep track of when apps were last updated. On iOS 8, you can simply swipe from the top of your screen and tap "Notifications" to review your app update history. If you need an app for the functions it provides but its old and outdated it may be worth finding an alternative that is more recent and performs the same function. However, if you support multiple mobile devices, such as in an enterprise environment, you may need a better solution. Centralized mobile device management which provides the ability to analyze apps and find risks can come in handy. One such example of a solution is Appthority.

Google has an Android security problem
Android remains the most popular mobile operating system in the world with over 81 percent of the worldwide market share. But only a fraction of Android's share is running the software's latest version, with the latest bug fixes, vulnerability patches, and security updates. Official stats say just shy of 10 percent are using Android 5.0 "Lollipop," with about 39 percent running the second latest version, Android 4.4 "KitKat." That's a huge gap, but not close to even older versions. It's almost exactly split fifty-fifty down the middle between Android 4.3 and earlier -- including some 930 million devices that remain vulnerable to a security flaw Google won't fix, and Android 4.4 and later. With about two weeks until the next version is announced -- Android "M" -- the fragmentation problem is expected to get worse. And that means security will get worse.

Quote for the day:

"It is not who is right, but what is right, that is of importance." -- Thomas Huxley

No comments:

Post a Comment