Machine Learning: The High-Interest Credit Card of Technical Debt
Machine learning offers a fantastically powerful toolkit for building complex systems
quickly. This paper argues that it is dangerous to think of these quick wins
as coming for free. Using the framework of technical debt, we note that it is remarkably
easy to incur massive ongoing maintenance costs at the system level
when applying machine learning. The goal of this paper is highlight several machine
learning specific risk factors and design patterns to be avoided or refactored
where possible. These include boundary erosion, entanglement, hidden feedback
loops, undeclared consumers, data dependencies, changes in the external world,
and a variety of system-level anti-patterns.
1807  dev  wrk 
14 days ago
W Polsce brakuje start-upów z zakresu cyberbezpieczeństwa - Bankier.pl
Nadreprezentacja inicjatyw biotechnologicznych oraz inżynieryjnych. Niedostatek zaawansowanych technologii i rozwiązań z zakresu cyberbezpieczeństwa - tak polski krajobraz start-upowy opisuje partner zarządzający funduszem TDJ Pitango Ventures Wojciech Fedorowicz.
1806  wrk  sec 
5 weeks ago
Rozwiązywanie problemów z usługą Windows Update
Windows Update good problem solving microsoft page
1805  dev  windows 
10 weeks ago
Appcanary shuts down its vulnerability scanning service as the team joins GitHub | TechCrunch
Come June 1st, Appcanary’s services will all shut down and the founders are directing users to services like Spacewalk, Landscape, CoreOS Clair, Nessus Agents and ThreatStack for their vulnerability scanning needs
1803  sec 
march 2018
* Key Management Find out which algorithms are recommended, when to expire keys, etc.
* Kubernetes A high level guide of basic security needs for Kubernetes
* OpenSSH How to configure and use OpenSSH server and client securely
* Web Security What headers, setup, etc. should you follow for your web site?

Risk assessment
* Assessing Security Risk An open framework to assess security risk from an operational perspective
* Likelihood Indicators A model for determining how security controls affect risk
*Rapid Risk Assessment (RRA) A rapid methodology to perform risk analysis and create a lightweight threat model.
* Scoring and other levels Standardized scoring and other levels that aren't directly representing risk levels.
* Standard Levels Standardized levels for security risk, effort and other measurements.

* OpenID Connect How to use OpenID Connect securely and make user’s session experience better
* SAML How to use SAML securely and make user’s session experience better

* Rationales Explains and justifies the use of specific controls, principles
* Security Principles Most important security principles to follow - the baseline
sec  1802 
march 2018
« earlier      
0704 0811 1107 1110 1203 1206 1208 1301 1305 1307 1401 1403 1405 1412 1501 1502 1503 1504 1505 1506 1507 1508 1510 1511 1512 1601 1602 1603 1608 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1801 1802 1803 1804 1805 1806 1807 2buy 2read 2watch ai apple bash bike bitcoin bots brag clang climbing cooking cpu crawl crypto dev edu elixir erlang excel fin font freebsd gaming gdp git github golang graphics gtd hackernews hard hbr health history hosting idlewords ifttt intel jails javascript linux list lng lora lst macos mail modem network nlp passwords pdf pinboard postgresql psy python qrcode radio react read recruitment reread satel sec sft sleep ssh the travel trello trystero twitter video vim way windows wrk

Copy this bookmark: