Remove Examples Remove Mining Remove Retail
article thumbnail

The Life Cycle of a Breached Database

Krebs on Security

There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords. But a decent crypto-mining rig can quickly crack a majority of password hashes generated with MD5 (one of the weaker and more commonly-used password hashing algorithms).

Passwords 362
article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. Retailers are fully aware that their future relies largely on their ability to use data efficiently. However, in today’s dynamic and highly competitive retail sector, retailers need to accelerate their plans and commit resolutely to the path of data monetization.

Retail 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

NTA refers to using advanced data mining and security analytics techniques to detect and investigate malicious activity in traffic moving between each device and on every critical system in a company network. Simple example. A simple example of how NTA can help is the monitoring of a single endpoint. Complicated example.

article thumbnail

The World Is An Internet Startup Now

John Battelle's Searchblog

But as I scanned the room last night and watched those friends of mine, I realized that each of them was now involved in an Internet startup in some way or another. A few examples - though I have to keep the details cloudy, as I can't breach my friends' confidence. Dan, another anonymized pal of mine, made his name in real estate.

Mining 111
article thumbnail

Process Excellence: A transformational lever to extreme automation

IBM Big Data Hub

What do a Canadian energy company, a Dutch coffee retailer and a British multinational consumer packaged goods (CPG) company have in common right now? All are transforming their procurement operations by leveraging state-of-the-art process mining and intelligent automation technology. dollars annually in direct or indirect procurement.

Mining 66
article thumbnail

Attacks against machine learning — an overview

Elie

This can be used, for example, to steal stock market prediction models and spam filtering models, in order to use them or be able to optimize more efficiently against such models. This post explores each of these classes of attack in turn, providing concrete examples and discussing potential mitigation techniques. adversarial examples.

Mining 107
article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

eBay: One of the world’s most valuable retailer has no inventory. For example, Amazon is vertically integrating the grocery industry with their recent acquisition of Whole Foods. for examples of how Amazon is leveraging customer insights to vertically integrate the grocery industry. Check out “ What is Digital Transformation ?”