Gavin Martin

26 Flips | 1 Magazine | 1 Like | @GavinMartin7ak8 | Keep up with Gavin Martin on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Gavin Martin”

Berkeley AI Materials

Project 3: Reinforcement Learning<p>Version 1.001. Last Updated: 08/26/2014.<p>Table of Contents<p>Introduction<br>• Welcome<br>• Q1: Value Iteration<br>• Q2: Bridge Crossing …

Machine Learning

Microsoft Announces SQL Server 2017 for Docker

Microsoft SQL Server 2017 is now available for the first time on Windows, Linux, and Docker. In this <i>Ask the Admin</i>, I’ll look at what this means for …

Deploying Kafka-Dependent Scala Microservices With Docker

In this post we will see how to use docker-compose and sbt-docker to deploy Scala microservices. We will create services to (1) get tweets using the …

Run the First Edition of Unix (1972) with Docker

One major benefit of Docker is you can run packaged up services without having to install them (or their dependencies) directly on your main …

Run Kubernetes on Your Laptop | Amazon Web Services

A recent survey of 550 members of the Cloud Native Computing Foundation confirmed that Kubernetes is the orchestration platform of choice. The survey …

Improving your data science workflow with Docker

Containerization is a trend that is taking the tech world by storm, but how can you, a data scientist, use it to improve your workflow? Let’s start …

Docker Windows SQL Server Containers and Database Clones

Microsoft’s adoption of Docker containers is a boon for continuous integration and DevOps initiatives, with .NET and Java application environments …

Dockerized Shiny App development

Getting on the Docker (container) ship<p>Containers are everywhere, including the realms of data science. You can think of them as small self-contained …

DevOps

A crash course on Docker — Learn to swim with the big fish

The quick start guide you are looking for.If you’ve been following software development trends in the past year, Docker is a term you must have grown …

Mission-critical system alert: 40-year-old OpenVMS hit by exploitable bug

The OpenVMS bug affects systems running on VAX and Alpha processors, and could impact Intel Itanium systems in mixed-architecture clusters.<p><i>Video:</i> …

Information Security

Cisco: You need to patch our security devices again for dangerous ASA VPN bug

Cisco has warned that its original fix for the 10/10-severity ASA VPN flaw was "incomplete".<p><i>Video: Top 10 malware threats in 2017</i><p>on cnet<p>The CNET VPN …

Information Security

US charges two men over ATM ‘jackpotting’

They allegedly used malware to cause ATM machines to eject cash like slot machines<p>The United States Department of Justice (DOJ) has charged two men with bank fraud after they allegedly hacked ATM machines causing them to eject all their cash reserves like a Vegas slot machine. The attack, known as …

The 5 Clustering Algorithms Data Scientists Need to Know

Clustering is a Machine Learning technique that involves the grouping of data points. Given a set of data points, we can use a clustering algorithm …

Crypto Bugs in IEEE Standard Expose Intellectual Property in Plaintext

Due to the use of weak cryptography in the IEEE P1735 electronics standard, attackers can recover highly-valuable intellectual property in …

Backing off towards simplicity - why baselines need more love

November 3, 2017<p><i>This was originally presented as "Backing Off Towards Simplicity" at O'Reilly AI San Francisco and Data Institute's Annual Conference</i> …

Fake WhatsApp fools millions – did you get caught out too? | Trusted Reviews

<b>Millions of Android phone and tablet users have been caught out by a fake WhatsApp listing on the official Google Play store.</b><p>When you download an …

Keeping computers secure is becoming a nearly impossible task

Imagine a lethal form of bird flu in the wild.<p>To prevent infestation, your solution is to station sharpshooters along the border to shoot each bird that flies into your territory and also analyze each bird already within that territory to determine if it is a carrier. But it only takes one breach …

U.S. court rejects Canadian court order requiring Google to remove search results globally

After years of litigation in two countries, a federal court in the US has weighed in on a thorny question: Does Google US have to obey a Canadian court order requiring Google to take down information around the world, ignoring contrary rules in other jurisdictions? According to the Northern …

Averon closes $8.3M funding to make your smartphone the key to ID online

Because of the threat of cyber attacks, sign in and identity verification procedures are becoming utterly cumbersome. There’s no “identity” layer to the internet (until there is a mainstream Blockhain solution perhaps?). However, using signalling and data packets, and the SIM/eSIM chips already …

AI is worth learning and not too tricky – if you can get your head around key frameworks

<b>M³</b> Starting with: TensorFlowThe hype around AI promises interesting work and fat paychecks, so no wonder everyone wants in. But the scarcity in …

The Darknet: A Quick Introduction for Business Leaders

When companies are hacked and their data is stolen, that data often appears for sale on the so-called darknet. Earlier this year, for example, user data from both the mega-hack of Yahoo (500 million accounts) and the uTorrent breach (400,000 accounts) showed up on the darknet’s illicit …

Salespeople Work Differently in Different Parts of the U.S., in 6 Charts

Sales leaders who manage nationwide sales organizations know there is a big difference between selling between New York and North Carolina, between Kansas and California. In new research, we’ve examined the impact that geographic location has on the personal attributes, attitudes, and actions that …