7,477 Results for:algorithms
- Sort by:
Block ciphers: REESSE3+ vs. International Data Encryption Algorithm
15 Jul 2015Expert Michael Cobb explains the difference between the REESSE3+ and IDEA block ciphers and explores when each is applicable in an enterprise setting. Read More
Computer scientists use algorithm to predict Bitcoin prices
24 Oct 2014An MIT professor and his student have written a paper describing the use of an algorithm to predict the price of Bitcoin Read More
CISSP training video: Cryptography algorithms and encryption keys
03 Oct 2014In this CISSP Essentials Security School presentation, Shon Harris explains the basics of the Cryptography domain, including definitions, cryptography algorithms, encryption keys and more. Read More
Machine learning's training data is a security vulnerability
31 Oct 2017Microsoft's Danah Boyd has a sobering message for CIOs: The data used to train machine learning algorithms is at risk. Read More
Up to 270 women may have died due to breast cancer screening IT failure, says health secretary
02 May 2018Computer algorithm failure caused 450,000 women to miss their breast cancer screenings – some of whom will have "had their lives shortened" by the error, Jeremy Hunt has admitted Read More
Improve your user engagement metrics with emotional analytics
28 Aug 2017Find out how new emotion analytics algorithms are bringing feeling, emotional connection, and engagement to modern apps. Read More
How machine learning is used to detect fraud
27 Apr 2018One of machine learning’s most well-known use cases is fraud detection, an area that has drawn the attention of a growing number of technology suppliers looking to develop the best algorithms and ... Read More
The suburban rogue trader's algorithms behind the 2010 US flash crash
24 Apr 2015US authorities accuse British trader Navinder Singh Sarao of manipulating the stock market with fraudulent trades, triggering the 2010 flash crash Read More
iXBRL inventor: my algorithm turns UK company data into 'useless PDFs'
11 Aug 2015The UK business registrar has been rendering its revolutionary company data useless with software written by the very man who invented the principle way to make it meaningful.It has taken Companies ... Read More
RSA-1024 keys: How does a Libgcrypt vulnerability expose them?
31 Jan 2018A Libgcrypt vulnerability could allow attackers to recover private RSA-1024 keys, as it allows a left-to-right sliding window that shows how specific parts of the algorithm work. Read More