Tag Archive for: Models

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. 

So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.

To read this article in full or to leave a comment, please click here

Network World Security

FBI director renews push for back doors, urging vendors to change business models

The FBI still wants backdoors into encrypted communications, it just doesn’t want to call them backdoors and it doesn’t want to dictate what they should look like.

FBI Director James Comey told the Senate Judiciary Committee that he’d been in talks with unspecified tech leaders about his need to crack encrypted communications in order to track down terrorists and that these leaders understood the need.

In order to comply, tech companies need to change their business model – by selling only communications gear that enables law enforcement to access communications in unencrypted form, he says, rather than products that only the parties participating in the communication can decrypt.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Chevrolet Offers Android Auto & Apple CarPlay In More Models Than Competition

Overall I like the looks of both Android Auto and Apple CarPlay. The only thing that still raises my concerns is security. With the amount of hours hackers are putting in to cracking companies systems I hope the companies are putting in double to make sure …
mac hacker – read more

VMware’s dual-persona tech hits big-name Android models, but not iPhone

The HTC One is among the premium phones getting VMware’s dual-persona technology.
HTC

SAN FRANCISCO—VMware’s quest to virtualize the smartphone is gaining steam on Android, with some premium devices now getting access to the company’s dual-persona technology.

VMware started talking about virtualizing Android smartphones back in late 2010. The idea is to run a second instance of Android on the phone inside a virtual machine, creating a secure workspace (a second “persona”) that can be managed by a user’s employee without affecting the user’s personal items. VMware finally brought this software to market on the LG Intuition and Motorola Razr M in May of this year.

Today at the VMworld conference, VMware said dual-persona is ready for some of the most popular Android phones. “The list of smartphones supporting Horizon Workspace now includes the recently launched LG G2 that will be on all major US carriers, Motorola DROID family of smartphones (DROID Mini, DROID Ultra, and DROID Maxx), as well as HTC One through Verizon Wireless,” VMware said in an announcement. “This adds to the expanding lineup of VMware Ready devices already in-market that includes the LG Intuition, Samsung Galaxy S3 and S4, Droid Razr HD, and Razr M by Motorola.”

Read 18 remaining paragraphs | Comments


    




Ars Technica » Technology Lab