article thumbnail

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

I want to talk about 3 upcoming events which Scott Helme and I are going to be running our Hack Yourself First workshop at starting with this one: NDC Security Australia, 26-27 March, AU$800 This is an extra special event that we've only just decided to run. The website is up and running and you can go and register right now.

Mining 107
article thumbnail

Weekly Update 175

Troy Hunt

I've had heaps of dramas in the past with recordings being lost and the first time I do a 3-person weekly update only 2 of them recorded (mine being the exception). Alright, let me get this off my chest first - I've totally lost it with these bloody Instamics. I was left with a zero-byte file on my unit which we tried to recover to no avail.

Mining 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to unlock a scientific approach to change management with powerful data insights

IBM Big Data Hub

Grasping these opportunities at IBM, we’re increasingly building our specialism in process mining and data analysis tools and techniques we believe to be true ‘game changers’ when it comes to building cultures of continuous change and innovation. Do you know how your business really operates on the ground?

Mining 52
article thumbnail

Exploring art resources on the web as data: A hands-on workshop for data analysis and instruction

Archive-It

Attendees left the workshop with an understanding of web archive research use cases and how to support them. Like the previous workshop held at the Art Librarians Society of North America (ARLIS/NA) conference in Mexico City, this event was supported by a generous grant from the Institute of Museum and Library Services (IMLS).

article thumbnail

Introducing ARCHWay

Archive-It

In line with our goal to make computational research (text and data mining, AI, machine learning, etc.) In addition to this documentation, you can also participate in virtual ARCH workshops we are offering throughout the Spring. Get started with ARCHWay by expressing interest here.

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

It was a change in business model that not only made the deal infeasible from their perspective, but also from mine; some of the most important criteria for the possible suitor were simply no longer there. We whittled the original 141 companies down to the 43 that were best aligned to the goals I outlined in the original blog post.

IT 140
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

From mining cryptocurrency to launching DDoS attacks against networks, there are countless ways in which malware can access and utilize victim’s computers and data. Employees are aware of the cybersecurity best practices, and regular security awareness workshops are conducted. Warning signs.