I tend to listen more to opinions when people have placed money on their espoused outcome—having “skin in the game”, as Nicholas Taleb calls it in his latest book. However, this robotics developer seems to have gone one better. He literally has skin in the game. Good scientists aren’t supposed to experiment on themselves, but […]
CIA’s malware development guidelines
I thought the CIA’s “best practices” for coding malware were interesting. It’s basically a list of things you have to consider when dealing with a sophisticated attacker. Basic audit features aren’t enough if your data and systems present an attractive target.
US lotteries rigged using malicious code
The Des Moines Register reports that an information security officer used malicious code to manipulate lottery results in Wisconsin, Colorado and Oklahoma. Apparently Examiners found out-of-place programs known as dynamic link libraries, or DLLs, that had been written onto the Wisconsin computer. The programs were designed to “redirect” a drawing if certain conditions were met… […]
17000 UK male pregnancies reported in 2012
A 2012 study of National Health Service data in the UK found that there were over 17000 male inpatient admissions to obstetric services over 8000 male inpatient admissions to gynecology nearly 20000 male inpatient admissions to midwifery Before jumping to the conclusion that the UK is at the forefront of an exciting/disturbing evolutionary trend we […]
Microsoft R Server is now on the Microsoft Data Science Virtual Machine
The Microsoft Data Science Virtual Machine (DSVM) now comes pre-configured with Microsoft R Server Developer Edition. As you can scale the DSVM according to your needs, this is an easy way to get going with some heavy duty R computations.