https://info.tigergraph.com/graph-gurus-22
A new weapon in the struggle against cyber security is now available. Graph analytics offer exciting possibilities for an organization to develop an intelligent approach to securing its IT environment with data-driven analytics.
By watching this webinar you will learn how to:
Detect and mitigate attacks against a firewall with unprecedented accuracy
Identify and block devices used in denial of service attacks
Build “footprint” profiles that can be used for machine learning.
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...TigerGraph
This webinar will demonstrate seven key data science capabilities using TigerGraph’s intuitive GUI, GraphStudio and GSQL queries. In this episode, we:
-Share the capabilities and tie those to specific use cases across healthcare, pharmaceutical, financial services, Telecom, Internet and government industries.
-Walk you through a sample dataset, GraphStudio UI flow, and GSQL queries demonstrating the capabilities.
-Cover client case studies for Amgen, Intuit, China Mobile, Santa Clara County, and other enterprise customers
Graph Gurus Episode 25: Unleash the Business Value of Your Data Lake with Gra...TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-25
A new weapon is available for businesses wanting to accomplish more with Hadoop: native parallel graphs can reveal the connections across multiple domains and datasets in data lakes and provide powerful insights to deliver superior outcomes. In this webinar we will explain how native parallel graphs can analyze the information in data lakes to enable the following outcomes:
Recommending next best actions such as promoting a student loan to someone heading off to college, advocating life insurance to a newly married couple, and so on
Improving network utilization by analyzing petabytes of data collected from millions of IoT devices across a smart grid
Accelerating M&A activity by intelligently merging data lakes from multiple businesses.
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms.
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-26
Have you ever wondered how routing apps like Google Maps find the best route from one place to another? Finding that route is solved by the Shortest Path graph algorithm. Today, graph algorithms are moving from the classroom to a host of important and valuable operational and analytical applications. This webinar will give you an overview of graph algorithms, how to use them, and the categories of problems they can solve, and then take a closer look at path algorithms. This webinar is the first part in a five-part series, each part examining a different type of problem to be solved.
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...TigerGraph
Graph-based investigation often enables us to identify individuals who are of special interest, and their uniqueness is due in part to their pattern of interactions. For example:
-A patient whose carepath journey leverages best-practices gained from using pattern matching algorithms that find similar issues among the data of 50 million patients
-An individual who builds a successful portfolio by implementing actions recommended by similarity algorithms that find equivalent actions by successful investors
-A participant in a criminal ring whose attempts at swindling are blocked by matching them to patterns of known fraudulent activity
Once you have identified such a pattern and a key individual, you want to search your data for similar occurrences. Similarity algorithms are the answer.
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms.
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationTigerGraph
What atmospheric data will help you predict if it's going to rain, snow, or be windy? What position should that new athlete play? How well can you guess a person's demographic background, based on their chat activity? These are all classification problems -- trying to pick the right category or label for an entity, based on observable features. They can also be solved with machine learning.
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...TigerGraph
This webinar will demonstrate seven key data science capabilities using TigerGraph’s intuitive GUI, GraphStudio and GSQL queries. In this episode, we:
-Share the capabilities and tie those to specific use cases across healthcare, pharmaceutical, financial services, Telecom, Internet and government industries.
-Walk you through a sample dataset, GraphStudio UI flow, and GSQL queries demonstrating the capabilities.
-Cover client case studies for Amgen, Intuit, China Mobile, Santa Clara County, and other enterprise customers
Graph Gurus Episode 25: Unleash the Business Value of Your Data Lake with Gra...TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-25
A new weapon is available for businesses wanting to accomplish more with Hadoop: native parallel graphs can reveal the connections across multiple domains and datasets in data lakes and provide powerful insights to deliver superior outcomes. In this webinar we will explain how native parallel graphs can analyze the information in data lakes to enable the following outcomes:
Recommending next best actions such as promoting a student loan to someone heading off to college, advocating life insurance to a newly married couple, and so on
Improving network utilization by analyzing petabytes of data collected from millions of IoT devices across a smart grid
Accelerating M&A activity by intelligently merging data lakes from multiple businesses.
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms.
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-26
Have you ever wondered how routing apps like Google Maps find the best route from one place to another? Finding that route is solved by the Shortest Path graph algorithm. Today, graph algorithms are moving from the classroom to a host of important and valuable operational and analytical applications. This webinar will give you an overview of graph algorithms, how to use them, and the categories of problems they can solve, and then take a closer look at path algorithms. This webinar is the first part in a five-part series, each part examining a different type of problem to be solved.
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...TigerGraph
Graph-based investigation often enables us to identify individuals who are of special interest, and their uniqueness is due in part to their pattern of interactions. For example:
-A patient whose carepath journey leverages best-practices gained from using pattern matching algorithms that find similar issues among the data of 50 million patients
-An individual who builds a successful portfolio by implementing actions recommended by similarity algorithms that find equivalent actions by successful investors
-A participant in a criminal ring whose attempts at swindling are blocked by matching them to patterns of known fraudulent activity
Once you have identified such a pattern and a key individual, you want to search your data for similar occurrences. Similarity algorithms are the answer.
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms.
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationTigerGraph
What atmospheric data will help you predict if it's going to rain, snow, or be windy? What position should that new athlete play? How well can you guess a person's demographic background, based on their chat activity? These are all classification problems -- trying to pick the right category or label for an entity, based on observable features. They can also be solved with machine learning.
Graph Gurus 23: Best Practices To Model Your Data Using A Graph DatabaseTigerGraph
Watch the webinar at info.tigergraph.com/graph-gurus-23
Learn:
-What can be vertices and edges
-How to choose an edge type (undirected, directed, reversed)
-How to decide between attributes or vertices
-How to model temporal data
-How to model multiple events and/or /transactions between two entities
-How to use derived edges to speed up queries
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-27
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms. Join us for Part 2 of our five-part webinar series on using graph algorithms for advanced analytics.
By attending this webinar you will:
- Hear about use cases for centrality graph algorithms
- Learn how to select the right algorithm for your use case
- Be able to run and tailor GSQL graph algorithms
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-31
By watching this webinar you will:
-Become more confident in GSQL query writing
-Know more about GSQL mechanism and accumulators
-Be able to write medium level difficulty GSQL queries.
During the presentation we cover the the following:
Review GSQL basics
Explain how to design a graph traversal plan
-Describe how to choose the best accumulator
-Explore how accumulators are populated
-Show how to produce results.
Graph Gurus 24: How to Build Innovative Applications with TigerGraph CloudTigerGraph
This Graph Gurus episode walks you through the development of a simple application based on the TigerGraph Cloud Customer 360 Starter Kit. Specifically, we will:
-Share the use case for the Customer 360 Starter Kit.
-Walk you through a step-by-step tutorial based on the sample dataset, the prepackaged GSQL queries, the GraphStudio UI flow from the Starter Kit, and the integration process with a simple front-end application.
-Demonstrate the end-to-end full stack application development based on TigerGraph Cloud.
Covers basics Artificial neural networks and motivation for deep learning and explains certain deep learning networks, including deep belief networks and autoencoders. It also details challenges of implementing a deep learning network at scale and explains how we have implemented a distributed deep learning network over Spark.
The problem of scene classification in surveillance footage is of great importance for ensuring security in public areas. With challenges such as low quality feeds, occlusion, viewpoint variations, background clutter etc. The task is both challenging and error-prone. Therefore it is important to keep the false positives low to maintain a high accuracy of detection. In this paper, we adapt high performing CNN architectures to identify abandoned luggage in a surveillance feed. We explore several CNN based approaches, from Transfer Learning on the Imagenet dataset to one-shot detection using architectures such as YOLOv3. Using network visualization techniques, we gain insight into what the neural network sees and the basis of classification decision. The experiments have been conducted on real world datasets, and highlights the complexity in such classifications. Obtained results indicate that a combination of proposed techniques outperforms the individual approaches.
Author: Utkarsh Contractor
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
HELK offers another approach for advanced cyber-hunting analytics, focusing on the importance of data documentation, quality, and modeling when developing analytics and making sense of disparate data sources inside the contested environment.
Tales from an ip worker in consulting and softwareGreg Makowski
Discussion around intellectual property, leverage over consulting projects to build vertical application software. In my use case, data mining, artificial intelligence and intelligence augmentation are part of the value add. Also, discuss software frameworks, open source software and clauses on prior inventions in hiring contracts
Graph enhancements to Artificial Intelligence and Machine Learning are changing the landscape of intelligent applications. Beyond improving accuracy and modeling speed, graph technologies make building AI solutions more accessible. Join us to hear about 4 areas at the forefront of graph enhanced AI and ML, and find out which techniques are commonly used today and which hold the potential for disrupting industries. We'll provide examples and specifically look how: - Graphs provide better accuracy through connected feature extraction - Graphs provide better performance through contextual model optimization - Graphs provide context through knowledge graphs - Graphs add explainability to neural networks
Speakers: Jake Graham, Alicia Frame
Large-Scale Malicious Domain Detection with Spark AIDatabricks
Malicious domains are one of the main resources used to mount attacks over the Internet. It is important to detect such activities by mining the large-scale network traffic data and identifying malicious URLs, domains or IPs. The attackers often take advantages of vulnerabilities in DNS and commit activities such as stealing private information, spamming, phishing, and DDoS attacks, and tend to by-pass botnet detection by generating domain clusters from Domain Generation Algorithms (DGA). We have billions of DNS records per day. Spark AI platform hence serves as an efficient distributed platform for the processing and mining of this huge amount of data. We work on the following two cybersecurity use cases. 1. Detect DGA, Porn, and Gambling domains Each malware-compromised host machine will have a large amount of DNS request in sequential order. The domain names are either generated by DGAs or preserve particular string patterns by design. We use spark to generate DNS request domain sequences and use Word2Vec to estimate the embedding of the domains. We then estimate the similarity and the most similar domains in the embedding space are discovered as the potential malicious domains. 2. Detect cryptocurrency mining pool domains The attackers are interested in accessing computing resources to mine cryptocurrency. The malware infected computers will be directed to attacker-controlled mining pool domains. This type of DNS request does not preserve sequential order and is relatively random. Since each mining pool domain cluster is visited by a wide range of different host machines, we used LSH to evaluate the similarity among sets of hosts. As a result, LSH generates domain-bucket bipartite graph and FastUnfolding algorithm is used to discover the domain clusters. We leveraged spark AI for large scale DNS data analysis and discovered hundreds of thousands of malicious domains each day at high precision.
Authors: Ting Chen, Hao Guo
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...Shift Conference
Today's analytical graph databases are taking organizations to another level by connecting all their data, representing knowledge better, and obtaining answers to deeper questions in real time. These benefits extend to the world of machine learning and AI. This talk will illustrate several ways in which graph databases and graph analytics can deliver smarter AI:
1. Unsupervised learning with graph algorithms.
2. Feature extraction and enrichment with graph patterns.
3. In-database ML techniques for graphs
Scaling AI in production using PyTorchgeetachauhan
Slides from my talk at MLOps World' 21
Deploying AI models in production and scaling the ML services is still a big challenge. In this talk we will cover details of how to deploy your AI models, best practices for the deployment scenarios, and techniques for performance optimization and scaling the ML services. Come join us to learn how you can jumpstart the journey of taking your PyTorch models from Research to production.
Explain Yourself: Why You Get the Recommendations You DoDatabricks
Machine learning recommender systems have supercharged the online retail environment by directly targeting what the customer wants. While customers are getting better product recommendations than ever before, in the age of GDPR there is growing concern about customer privacy and transparency with ML models. Many are asking, just why am I receiving these recommendations? While the current Implicit Collaborative Filtering (CF) algorithm in spark.ml is great for generating recommendations at scale, its currently lacks any method to explain why a particular customer is getting the recommendations they are getting. In this talk, we demonstrate a way to expand collaborative filtering so that the viewing history of a customer can be directly related to their recommendations. Why were you recommended footwear? Well, 40% of this recommendation came from browsing runners and 20% came from the shorts you recently purchased. Turns out, rethinking of the linear algebra in the current spark.ml CF implementation makes this possible. We show how this is done and demonstrate its implemented as a new feature to spark.ml, expanding the API to allow everyone to explain recommendations at scale and create a more transparent ML future.
Authors: Niels Hanson Kishori Konwar
Building Interpretable & Secure AI Systems using PyTorchgeetachauhan
Slides from my talk at Deep Learning World 2020. The talk covered use cases, special challenges and solutions for building Interpretable and Secure AI systems using Pytorch.
- Tools for building Interpretable models
- How to build secure, privacy preserving AI models with Pytorch
- Use cases and insights from the field
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
- Detect and mitigate attacks against a firewall with unprecedented accuracy
- Identify and block devices used in denial of service attacks
- Build “footprint” profiles that can be used for machine learning.
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
Full Webinar: https://info.tigergraph.com/graph-gurus-21
In this Graph Gurus episode, we:
Explain the architecture and technical implementation for a TigerGraph + Spark graph-enhanced Machine Learning pipeline
Use TigerGraph both before training to extract (graph and non-graph) features and after training to apply the model on streaming data
Use Spark to train and tune machine learning models at scale
Present a solution in production at China Mobile that detects and prevents phone-based scams using machine learning with TigerGraph
Demo the data flow between Spark and TigerGraph via TigerGraph’s JDBC driver
Graph Gurus 23: Best Practices To Model Your Data Using A Graph DatabaseTigerGraph
Watch the webinar at info.tigergraph.com/graph-gurus-23
Learn:
-What can be vertices and edges
-How to choose an edge type (undirected, directed, reversed)
-How to decide between attributes or vertices
-How to model temporal data
-How to model multiple events and/or /transactions between two entities
-How to use derived edges to speed up queries
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-27
What does finding the best location for a warehouse/office/retail store have in common with finding the most influential person in a referral network? Answer: they are both Centrality problems and can be solved with graph algorithms. Join us for Part 2 of our five-part webinar series on using graph algorithms for advanced analytics.
By attending this webinar you will:
- Hear about use cases for centrality graph algorithms
- Learn how to select the right algorithm for your use case
- Be able to run and tailor GSQL graph algorithms
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1TigerGraph
Full Webinar: https://info.tigergraph.com/graph-gurus-31
By watching this webinar you will:
-Become more confident in GSQL query writing
-Know more about GSQL mechanism and accumulators
-Be able to write medium level difficulty GSQL queries.
During the presentation we cover the the following:
Review GSQL basics
Explain how to design a graph traversal plan
-Describe how to choose the best accumulator
-Explore how accumulators are populated
-Show how to produce results.
Graph Gurus 24: How to Build Innovative Applications with TigerGraph CloudTigerGraph
This Graph Gurus episode walks you through the development of a simple application based on the TigerGraph Cloud Customer 360 Starter Kit. Specifically, we will:
-Share the use case for the Customer 360 Starter Kit.
-Walk you through a step-by-step tutorial based on the sample dataset, the prepackaged GSQL queries, the GraphStudio UI flow from the Starter Kit, and the integration process with a simple front-end application.
-Demonstrate the end-to-end full stack application development based on TigerGraph Cloud.
Covers basics Artificial neural networks and motivation for deep learning and explains certain deep learning networks, including deep belief networks and autoencoders. It also details challenges of implementing a deep learning network at scale and explains how we have implemented a distributed deep learning network over Spark.
The problem of scene classification in surveillance footage is of great importance for ensuring security in public areas. With challenges such as low quality feeds, occlusion, viewpoint variations, background clutter etc. The task is both challenging and error-prone. Therefore it is important to keep the false positives low to maintain a high accuracy of detection. In this paper, we adapt high performing CNN architectures to identify abandoned luggage in a surveillance feed. We explore several CNN based approaches, from Transfer Learning on the Imagenet dataset to one-shot detection using architectures such as YOLOv3. Using network visualization techniques, we gain insight into what the neural network sees and the basis of classification decision. The experiments have been conducted on real world datasets, and highlights the complexity in such classifications. Obtained results indicate that a combination of proposed techniques outperforms the individual approaches.
Author: Utkarsh Contractor
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
HELK offers another approach for advanced cyber-hunting analytics, focusing on the importance of data documentation, quality, and modeling when developing analytics and making sense of disparate data sources inside the contested environment.
Tales from an ip worker in consulting and softwareGreg Makowski
Discussion around intellectual property, leverage over consulting projects to build vertical application software. In my use case, data mining, artificial intelligence and intelligence augmentation are part of the value add. Also, discuss software frameworks, open source software and clauses on prior inventions in hiring contracts
Graph enhancements to Artificial Intelligence and Machine Learning are changing the landscape of intelligent applications. Beyond improving accuracy and modeling speed, graph technologies make building AI solutions more accessible. Join us to hear about 4 areas at the forefront of graph enhanced AI and ML, and find out which techniques are commonly used today and which hold the potential for disrupting industries. We'll provide examples and specifically look how: - Graphs provide better accuracy through connected feature extraction - Graphs provide better performance through contextual model optimization - Graphs provide context through knowledge graphs - Graphs add explainability to neural networks
Speakers: Jake Graham, Alicia Frame
Large-Scale Malicious Domain Detection with Spark AIDatabricks
Malicious domains are one of the main resources used to mount attacks over the Internet. It is important to detect such activities by mining the large-scale network traffic data and identifying malicious URLs, domains or IPs. The attackers often take advantages of vulnerabilities in DNS and commit activities such as stealing private information, spamming, phishing, and DDoS attacks, and tend to by-pass botnet detection by generating domain clusters from Domain Generation Algorithms (DGA). We have billions of DNS records per day. Spark AI platform hence serves as an efficient distributed platform for the processing and mining of this huge amount of data. We work on the following two cybersecurity use cases. 1. Detect DGA, Porn, and Gambling domains Each malware-compromised host machine will have a large amount of DNS request in sequential order. The domain names are either generated by DGAs or preserve particular string patterns by design. We use spark to generate DNS request domain sequences and use Word2Vec to estimate the embedding of the domains. We then estimate the similarity and the most similar domains in the embedding space are discovered as the potential malicious domains. 2. Detect cryptocurrency mining pool domains The attackers are interested in accessing computing resources to mine cryptocurrency. The malware infected computers will be directed to attacker-controlled mining pool domains. This type of DNS request does not preserve sequential order and is relatively random. Since each mining pool domain cluster is visited by a wide range of different host machines, we used LSH to evaluate the similarity among sets of hosts. As a result, LSH generates domain-bucket bipartite graph and FastUnfolding algorithm is used to discover the domain clusters. We leveraged spark AI for large scale DNS data analysis and discovered hundreds of thousands of malicious domains each day at high precision.
Authors: Ting Chen, Hao Guo
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...Shift Conference
Today's analytical graph databases are taking organizations to another level by connecting all their data, representing knowledge better, and obtaining answers to deeper questions in real time. These benefits extend to the world of machine learning and AI. This talk will illustrate several ways in which graph databases and graph analytics can deliver smarter AI:
1. Unsupervised learning with graph algorithms.
2. Feature extraction and enrichment with graph patterns.
3. In-database ML techniques for graphs
Scaling AI in production using PyTorchgeetachauhan
Slides from my talk at MLOps World' 21
Deploying AI models in production and scaling the ML services is still a big challenge. In this talk we will cover details of how to deploy your AI models, best practices for the deployment scenarios, and techniques for performance optimization and scaling the ML services. Come join us to learn how you can jumpstart the journey of taking your PyTorch models from Research to production.
Explain Yourself: Why You Get the Recommendations You DoDatabricks
Machine learning recommender systems have supercharged the online retail environment by directly targeting what the customer wants. While customers are getting better product recommendations than ever before, in the age of GDPR there is growing concern about customer privacy and transparency with ML models. Many are asking, just why am I receiving these recommendations? While the current Implicit Collaborative Filtering (CF) algorithm in spark.ml is great for generating recommendations at scale, its currently lacks any method to explain why a particular customer is getting the recommendations they are getting. In this talk, we demonstrate a way to expand collaborative filtering so that the viewing history of a customer can be directly related to their recommendations. Why were you recommended footwear? Well, 40% of this recommendation came from browsing runners and 20% came from the shorts you recently purchased. Turns out, rethinking of the linear algebra in the current spark.ml CF implementation makes this possible. We show how this is done and demonstrate its implemented as a new feature to spark.ml, expanding the API to allow everyone to explain recommendations at scale and create a more transparent ML future.
Authors: Niels Hanson Kishori Konwar
Building Interpretable & Secure AI Systems using PyTorchgeetachauhan
Slides from my talk at Deep Learning World 2020. The talk covered use cases, special challenges and solutions for building Interpretable and Secure AI systems using Pytorch.
- Tools for building Interpretable models
- How to build secure, privacy preserving AI models with Pytorch
- Use cases and insights from the field
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...Amanda Morris
- Detect and mitigate attacks against a firewall with unprecedented accuracy
- Identify and block devices used in denial of service attacks
- Build “footprint” profiles that can be used for machine learning.
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
Full Webinar: https://info.tigergraph.com/graph-gurus-21
In this Graph Gurus episode, we:
Explain the architecture and technical implementation for a TigerGraph + Spark graph-enhanced Machine Learning pipeline
Use TigerGraph both before training to extract (graph and non-graph) features and after training to apply the model on streaming data
Use Spark to train and tune machine learning models at scale
Present a solution in production at China Mobile that detects and prevents phone-based scams using machine learning with TigerGraph
Demo the data flow between Spark and TigerGraph via TigerGraph’s JDBC driver
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Storage Switzerland
Join Storage Switzerland and Micro Focus for this on demand webinar where we discuss the key disruptors in the market that could impact your data protection plan and what you need to consider to avoid them.
Understand the key 5 trends and their implications on your data center:
●The Shift to Hybrid IT
●Ransomware and other Cyber Threats
●The Proliferation of Mission Critical Applications
●Cloud Storage and Cloud Applications
●The Rise of Remote Office Computing (ROBO)
Evolution security controls towards Cloud ServicesHugo Rodrigues
Cloud services require appropriated security controls to extend trust and reduce uncertainty. Formal controls reveal to be ineffective. By focusing on the intersection between cloud services can support reliable management and financial health.
Despite huge investments in anti-virus software, next-gen firewalls, and IPS platforms, companies are still getting hacked. The new generation of advanced targeted attacks bypasses traditional defenses and put sensitive data at risk. It takes just minutes from the time an organization is compromised to the exfiltration of sensitive data. What's needed is a security solution that can detect and block data center threats while allowing easy, appropriate access to the assets essential to running your business. This presentation from Imperva and FireEye addresses data center security requirements and solutions.
Automation: Embracing the Future of SecOpsIBM Security
Join Mike Rothman, Analyst & President of Securosis and Ted Julian, VP of Product Management and co-founder of IBM Resilient, for a webinar on common automation use cases for the Security Operations Center (SOC).
Security Orchestration, Automation and Response (SOAR) tools are garnering interest in enterprise security teams due to tangible short-term benefits.
Watch the recording: https://event.on24.com/wcc/r/2007717/385A881A097E8EFCE493981972303416?partnerref=LI
Leverage the security & resiliency of the cloud & IoT for industry use cases ...Amazon Web Services
This non-technical two-hour Internet of Things (IoT) tabletop exercise benefits business and technology leaders and regulators in the Energy, Oil and Gas, Transportation, Healthcare, Financial, and Manufacturing sectors. Through discussion of a simulated cyber IoT incident, you explore required capabilities and processes. You learn how to leverage AWS for security, high availability, incident response, and continuity of operations for systems that include IoT. You also discuss the advantages of cloud security and resiliency over traditional on-premises environments to understand your opportunities. Finally, the effectiveness of international cybersecurity frameworks in improving an organization’s posture is highlighted. No laptops required.
View on-demand recording: http://securityintelligence.com/events/x-force-threat-intelligence-protect-sensitive-data/
Malicious or inadvertent, an insider threat to your enterprise “crown jewels” can cause significant damage. In this webcast, learn which attack trends you need to be prepared to address, explore options to protect against these threats and how you can combat this area of risk. We will also share best practices and recommendations for implementing an end-to-end data protection strategy including data encryption, monitoring, dynamic data masking and vulnerability assessment for all data sources and repositories.
In this presentation, you will learn:
- The latest findings from the X-Force Threat Intelligence Report
- How various threats and vulnerabilities are evolving
- How companies can mitigate this exposure
Adoption of G Suite has increased year over year. Despite this increased adoption, securing data still remains a challenge as employees want access to cloud apps from any device, anywhere.
In this webinar, we will discuss the the security gaps within G Suite and how to give power back to your security team through tools that provide visibility and control of your data across all of your cloud apps.
Where in the world is your Corporate data?Ashish Patel
Your employees – and your company data – are on the go every day. As a result, your employees are relying on the use of 3rd party online services without IT approval – that is Shadow IT in your own organization. That’s some risky business. Where in the world is your Corporate Data?
With TeraGo Cloud Drive we are giving you back control of your most valuable asset, your data.
In this webinar you will learn about:
How Shadow IT is picking up velocity due to the accessibility and ease of cloud applications
Consequences of weak corporate security mechanisms
How to give your IT department control of your data and its’ security
Reducing Attack Surface in Budget Constrained EnvironmentsDenim Group
Sprawling networks, streaming vendor vulnerability updates, and an application portfolio that remains a mystery keep you up late wondering where your weakest link exists. Budget constraints make you wonder where to begin, given that the responsibility to protect your organization remains firmly on your shoulders. How do savvy leaders identify the most pressing exposures and prioritize their efforts given limited budgets? What are the strategies that sophisticated IT and security leaders pursue to identify the scariest vulnerabilities and fix them before attackers find them? This session will lay out actionable plans to immediately identify and reduce more of your organization’s attack surface.
Similar to Graph Gurus Episode 22: Cybersecurity (20)
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas