Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Not enough inputs (Score 1) 87

An ML model is only as good as its inputs. In many cases preprocessing needs to be done, when there are too many inputs to consider. Stocks definitely fall into this realm, first because there are so many financial indicators, but secondly because there are so many non-financial indicators. The daily news affects the stocks, this was hinted in the last couple of paragraphs of the article. An algorithm to preprocess large swaths of new articles and calculate some sort of "market sentiment" could assist the model understand things we take for granted. Things like if there is a terror attack then stocks will go down, and of there is an election win by a candidate with certain financial policies this will affect the market. Going deeper would be analyzing news that could affect individual stocks.

Comment Just phishing (Score 1) 146

Name and phone number are pretty easy to get, and if you have ever made an online post referring to your bank then they just made that connection. Maybe you just follow that bank on social media, but that's enough to put things together. Just keep a regular watch on your accounts, and if someone calls you do not believe they are whom they say they are.

Comment Yes, teach how to manage money with current tools! (Score 1) 160

The world is going to a cashless system regardless of people's affinity for handling cash. Better to teach the kids how to manage their money digitally. Besides, most of the previous generation has experience with games using "digital" currencies/resources (i.e. WoW, Eve, Elite, etc)

Comment Itâ(TM)s been tried (Score 1) 284

Think about OT networks running critical infrastructure, ICS, SCADA, etc. They work well and are secure until someone connects a bridge to the Internet. That bridge lets the anonymous people in. The bridges are always going to exist because nobody wants to have two separate devices, one for the Internet and one for the âoesafenetâ.

Comment Companies have been doing this for years (Score 1) 604

Company recruiters "ghost" candidates all the time. They do this because they have a candidate in the process of ahiring but if that candidate does not accept they want to be able to offer the job to one of the other candidates. So recruiters never want to tell any candidate they did not get the job. The result is recruiters just avoid talking to candidates. Candidates "ghosting" seem to be a thing now because it is making recruitment difficult, especially in hot industries where candidates have multiple offers going. Perhaps this will cause recruiters to be more open in their conversations with candidates.

Comment Re: Didn't we all assume this was already happenin (Score 1) 69

Yes, this has been going on for years. When I started working in the telecom industry in 2008 this was available. The issue is that the 911 call triggers the phone to do a GPS locate. That can take up to 30 seconds to get a good GPS position and send it, and in some cases the 911 call might be disconnected in that time. We would get 911 calling the telecom to ask for a GPS lookup on a subscribers number because it didnâ(TM)t come through. At that point itâ(TM)s just cell phone signal strength data off the towers so not as accurate but it was the best positioning available at that point. It sounds like they think this system will be more efficient.

Comment No Smart Speaker. (Score 1) 234

Ignore the argument about the speaker manufacturer listening in, these are still computers that have vulnerabilities that can be exploited. Next thing you have someone who is not the manufacturer listening to you, or using the speaker for other purposes. The less devices you have the less attack surface you present.

Comment Probably because most people didn't realize they s (Score 2, Interesting) 218

Back in the 90's it was made very clear in all the technical literature that an internet was a generic network that anyone could create for the purpose of networking, whereas the Internet was the name for the common public Internet that we all know and use today. Much like the term "hacker" (as opposed to "cracker", the technical people that knew about the definitions understood its proper meaning. The problems came when the media couldn't seem to grasp the concepts, and wanted to keep in simple for ordinary people to understand. Much like hacker, the media used the term incorrectly and thus we have a trend towards lowercase being used for the Internet. #KeepInternetCapitalized

Comment Who says increased cost is the better way to go? (Score 1) 267

No more speed increases coupled with decreases in power consumption and cost. Fair enough, but who says increasing cost is the way to go? (That's rhetorical, we all know it's the business people saying that). Focus on less power consumption and at least keep costs the same. Use the chips we have to make systems with more processors. Take advantage of the cloud and Hadoop. Refocus on more efficient coding practices. We're so focused on chips getting faster, but parallel processing is a viable method of getting more processing done.

Comment Priorities: Do you really need to read that now? (Score 2) 214

It's great that we can be so connected, but ask yourself this: how urgent is that email from Amazon? Or that calendar invitation about a party next month? Are you living your life or just sifting through emails and instant messages? If you're on-call for your job, have a friend or family member in the hospital, or some similarly important event going on, then that's definitely a valid reason for interrupting a conversation and attending to your device. If you want to read emails while pretending to pay attention to someone, then perhaps face-to-face socialization isn't for you. While people *think* they can covertly read emails while holding a conversation, I've never met anybody that could actually do so. I've been guilty of trying that myself and realized how silly the whole situation is. Anyone trained in business or interpersonal communication will tell you the same thing: Pay attention to the person with whom you're speaking, or excuse yourself to read your emails.

Comment Maybe Qradar? (Score 1) 923

I'm sure it wasn't actually Qradar, but collecting Google searches is a built in function of the QRadar product. Qradar is a SIEM that uses packet sniffing appliances called Qflow to watch corporate network traffic. An out-of-the-box feature is to capture all Google searches. Same functionality as wireshark, but with a much easier interface.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...