Set Up a Budget-Friendly Application Security Program

CEB IT

At the same time, reduced IT budgets meant that chief information security officers (CISOs) had to cut costs and compromise on risk management programs. Use security testing services to jump-start your application security program.

Budget 278

Facebook?s TransCoder AI converts code from one programming language into another

Venture Beast

Facebook's TransCoder AI model can translate among programming languages like Java, C++, and Python with high computational accuracy. AI Big Data Business Dev ai artificial intelligence C category-/Computers & Electronics/Programming category-/Science/Computer Science Facebook Java machine learning programming programming languages Python research TransCoder transcompiler

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Intel researchers create AI system that rates similarity of 2 pieces of code

Venture Beast

AI Big Data Business Dev ai artificial intelligence category-/Computers & Electronics/Programming category-/Science/Computer Science code developer Intel machine learning machine programming research source code

Intel 87

Facebook’s chief AI scientist: Deep learning may need a new programming language

CTOvision

Deep learning may need a new programming language that’s more flexible and easier to work with than Python, Facebook AI Research director Yann LeCun said today. It’s not yet clear if such a language is necessary, but the possibility runs against very entrenched desires from researchers and engineers, he said. LeCun has worked with neural networks […]. Artificial Intelligence News

3 Mistakes Organizations Make While Developing ABM Programs

While B2B research suggests organizations are thriving through successful ABM programs, getting just one campaign off the ground is more difficult than it seems. From building an account universe to understanding to orchestrating sales and marketing alignment around touchpoint and messaging, there are a number of variables to consider before launching a program.

Researchers develop AI that solves a matrix-based visual cognitive test

Venture Beast

Researchers at Facebook and Tel Aviv University developed a machine learning model that generates answer to a cognitive test. Read More.

OpenAI launches an API to commercialize its research

Venture Beast

AI Big Data Business Dev Enterprise ai artificial intelligence category-/Computers & Electronics/Programming category-/Science/Computer Science machine learning OpenAI researchOpenAI launched an API to commercialize -- and prevent the abuse of -- the AI and machine learning models it's actively developing. Read More.

Google launches health research app

The Verge

Google announced Wednesday that it is launching a new research app for Android phones, which would allow anyone with a device to participate in medical studies. Health Studies is Google’s answer to Apple’s Research app , which runs on iOS devices.

Researchers propose AI system that reverse-engineers black box apps

Venture Beast

In a preprint paper, researchers propose an AI technique that reverse-engineers programs without any privileged knowledge. AI Big Data Dev ai artificial intelligence category-/Computers & Electronics/Programming category-/Science/Computer Science machine learningRead More.

Virginia Announces Research Commercialization Awards

CTOvision

The Commonwealth of Virginia announced research commercialization awards today, including many friends and readers of CTOvision, so we wanted to share this announcement. Governor McAuliffe Announces Research Commercialization Awards. Investments target research and commercialization activities to spur innovation ~ . RICHMOND – Governor Terry McAuliffe announced today 38 Commonwealth Research Commercialization Fund (CRCF) awards totaling more than $2.8

Thinking About “Data Program Governance”

CTOvision

One phrase in regular rotation in my elevator pitch is “data program governance." Program means an organized set of activities designed to accomplish a defined set of objectives. Governance means the program is planned and managed in an organized and sustainable way. Creating a data program governance strategy is not unlike creating other types of enterprise business strategies. Managing Data-Intensive Programs and Projects: Selected Articles. Dennis D.

An update on the bounty programs

IT Pros Rock!

Back in June of this year, we announced three new bounty programs that will pay researchers for techniques that bypass built-in OS mitigations and protections, for defenses that stop those bypasses and for vulnerabilities in Internet Explorer 11 Preview. This past Friday, we provided some additional details about the results of the IE11 Preview bounty program, which covered the first 30 days of the preview period. BlueHat Prize Bounty Programs BlueHat Challenge

Microsoft has paid security researchers $13.7 million for bug bounties in 12 months

Venture Beast

Business Dev Enterprise Entrepreneur Security Bug Bounty bug bounty program category-/Computers & Electronics/Computer Security Microsoft Microsoft Security Response CenterMicrosoft today announced it has paid out $13.7

Cybersecurity Mentorship Program Pairs CISOs and Students

SecureWorld News

And this match came up with $300,000 to get things started in a brand new pilot program. Georgia State University cybersecurity mentorship program. How does the cybersecurity mentorship program work? And the program includes a matchmaking system.

Apple is sending hacker-friendly iPhones to security researchers

TechSpot

Apple is finally making good on its promise to seed hacker-friendly iPhones to those participating in its Security Research Device (SRD) program

Developer survey finds JavaScript remains the most popular programming language

TechSpot

Python was found to have 9 million active developers and came in second-place, but the researchers also highlighted The information comes from analyst firm SlashData's latest developer survey. JavaScript came in first-place once again, and boasts an ever-increasing 12.4

Survey 108

James Madison University Seeks Professor – Intelligence Analysis Program

CTOvision

Please look it over and share it with others that may have an interest: Assistant / Associate Professor - Intelligence Analysis Program. General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). Bob Gourley.

Baidu open-sources Paddle Quantum toolkit for AI quantum computing research

Venture Beast

Tech giant Baidu has released Paddle Quantum, a toolkit for AI quantum computing research that's available in open source on GitHub. AI Big Data Cloud Dev ai artificial intelligence Baidu category-/Computers & Electronics/Programming category-/Science/Computer Science machine learning Paddle Quantum PaddlePaddle quantum computingRead More.

COVID-19 vaccine monitoring program limited to English speakers

The Verge

A text message program designed to track side effects in COVID-19 vaccine recipients is currently only available in English, which could limit the data it is able to collect. The CDC’s v-safe program is currently only available in English. Photo by Joe Raedle/Getty Images.

CTOvision Pro: A Subscription Based Research and Analysis Service

CTOvision

CTOvision Pro is our subscription based research and analysis service. CTOvision Pro provides subscribers with more in-depth research, analysis and reporting on topics that matter to enterprise IT. Subscribers receive a weekly newsletter with up to date context and analysis, as well as logins to our market research, technology assessments and special reports. The post CTOvision Pro: A Subscription Based Research and Analysis Service appeared first on CTOvision.com.

Intel’s ControlFlag taps AI to automatically detect errors in code

Venture Beast

AI Big Data Business Cloud Dev Enterprise Mobile Security ai artificial intelligence category-/Computers & Electronics/Programming category-/Science/Computer Science code review coding ControlFlag development Intel Intel Lab Day 2020 Lab Day machine learning research

Intel 101

CIT Announces Commonwealth Research Commercialization Fund (CRCF) FY2014 Fall Solicitation Awards and Upcoming Solicitation

CTOvision

Awards target academic research and commercialization activities in the Commonwealth . million in funding for 14 awards to Virginia’s colleges, universities, and research organizations as part of the FY2014 fall solicitation of the Commonwealth Research Commercialization Fund (CRCF). During this solicitation, awards were made to ten unique organizations targeting nine strategic industry priorities identified in the Commonwealth Research and Technology Strategic Roadmap.

Security Researchers Ask U.S. Supreme Court to Protect Them

SecureWorld News

Typically, you can distinguish between a cybercriminal and a security researcher. Now, a group of security researchers are begging the Supreme Court to change that. What are security researchers asking the Supreme Court? Supreme Court, the law's overlap is dangerous for security researchers. How do you define the term security researchers? The Broad Interpretation of the CFAA Adopted by the Eleventh Circuit Chills Valuable Security Research.

The controversy behind a star Google AI researcher’s departure 

Vox

Timnit Gebru, a former co-leader of Google’s Ethical AI team, is a leading researcher on biases baked into AI systems | Kimberly White/Getty Images for TechCrunch. It’s a standard process for a company like Google to review the research of its employees before it’s published outside it.

Researchers create synthetic proteins that use logic to choose which cells to kill

GeekWire

Co-authors of the study include researchers from UW and Seattle’s Fred Hutchinson Cancer Research Institute, some of whom are also affiliated with Lyell. Co-LOCKR proteins can be programmed to execute logical functions.

The Red Kettle Campaign: An Inspiration For Digital Changes To Demand Programs

Forrester's Customer Insights

Marketers unsure of how demand programs may perform have held back investments, but reassessing the marketing mix to prioritize a richer set of digital tactics is essential in this changing environment. Demand and Account-Based Marketing SiriusDecisions Research

Twelve (Christmas) Tips To Make Your Virtual Events Go Off With A Bang In 2021!

Forrester Jay McBain

Demand and Account-Based Marketing SiriusDecisions Research Demand and ABM Program Design and ExecutionThe holidays are virtual for many of us this year, and people are starting to think about how to make these interactions meaningful.

Research alliance co-founded by Fred Hutch and Microsoft announces initial cancer studies

GeekWire

Seattle Cancer Care Alliance and the Fred Hutchinson Cancer Research Center are headquartered in Seattle’s South Lake Union neighborhood. The consortium was founded in 2019 by Microsoft and the Fred Hutchinson Cancer Research Center under the name Cascadia Data Discovery Initiative.

What Kind of Management Structure Is Needed to Govern a Data Analytics Program?

CTOvision

When thinking about developing a new data analytics program, two questions you need to address are: What services do you need to provide? I’m assuming here that your organization already provides products or services of some sort and that, through a new or enhanced data analytics program, you want to take advantage of the data associated with these products or services. It provides support for data sharing for cancer research and the people and institutions involved.

New Research: State Of CX Measurement And VoC Programs — We Need You!

Forrester's Customer Insights

To give you insights on the state of voice-of-the-customer (VoC) and customer experience (CX) measurement programs, my colleague Faith Adams and I are collaborating on a new piece of research. It will feature insights from our new State of VoC & CX Measurement Programs, 2020 survey, which is live now!

Google’s MixIT AI isolates speakers in audio recordings

Venture Beast

In a new paper, researchers at Google describe an AI system that isolates speakers' voices in audio recordings using an unsupervised approach. AI Big Data Business Dev ai artificial intelligence audio recordings category-/Computers & Electronics/Programming category-/Science/Computer Science machine learning research speech enhancement speech isolation speech separation unsupervised learning

Suck at CS: GO? Logitech G's program could turn you from noob to pro

TechSpot

Logitech G, Logitech’s gaming arm, says its Playmaster program is “backed by science” and built with professional esports organizations.

Help Inform New Research On The Current State Of VoC And CX Measurement Programs

Forrester's Customer Insights

To continue to offer insights and guidance about voice-of-the-customer (VoC) and customer experience (CX) measurement programs, my colleague Maxie Schmidt and I are collaborating on new research. It will feature the results of our new State of VoC & CX Measurement Programs, 2020 survey.

Santa Claus Or Krampus? A Seasonal Guide To Buying Signals

Forrester Jay McBain

Demand and Account-Based Marketing SiriusDecisions Research Demand and ABM Program Design and Execution Real-Time Buyer Enablement Revenue Engine Optimization

Google’s TF-Coder tool automates machine learning model design

Venture Beast

Google researchers developed a tool, TF-Coder, that automates the process of developing AI and machine learning models in TensorFlow. Read More.

Tools 113

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. manufacturing program (bizjournals.com).

Toward Strategic and Proactive Threat Intelligence Programs

Network World

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. The research revealed that many threat intelligence programs were relatively immature – 40% of threat intelligence programs had been in place less than 2 years at that time (note: I am an ESG employee). Cybersecurity professionals were also asked to identify the top objectives for their organization’s threat intelligence program.

Why you need a bug bounty program

Network World

Every business needs to have a process in place for handling security vulnerability reports , but some organizations take a much more proactive approach to dealing with security researchers. An increasing number of hardware and software vendors have formal bug bounty programs. Google, for example, runs its own vulnerability rewards program , and Microsoft has multiple bug bounties covering Office 365, Azure,NET and Edge as general programs covering exploits and defenses.

2 Chinese Cybercriminals Charged with Hacking COVID-19 Research

SecureWorld News

SecureWorld News continues to cover individual and nation-state attacks on COVID-19 research , particularly from China and Russia. The defendants used their initial unauthorized access to place malicious web shell programs (e.g.,

Strategic Big Brain Science: NIH celebrates grand opening of John Edward Porter Neuroscience Research Center

CTOvision

Strategic Big Brain Science: NIH celebrates grand opening of John Edward Porter Neuroscience Research Center. State of the art research facility on NIH campus will foster new collaborations among scientists studying the brain. The National Institutes of Health will host a scientific symposium and a dedication ceremony March 31- April 1, 2014, to celebrate the completion of the John Edward Porter Neuroscience Research Center. By Bob Gourley.

Proposed voice analysis framework preserves both accuracy and privacy

Venture Beast

Researchers at the Imperial College London propose a voice data framework that can provide privacy while preserving speech recognition accuracy. Read More.

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Track sessions will focus on: Enabling Business Results with Big Data — How to enable agency programs that will yield enormous value through big data to deliver actionable information and measureable results. Hittle is a Level III, top-ranked, Acquisition Program Manager and Systems Planning Research, Development, and Engineering Professional. Government is ever more reliant on data to deliver on mission and programs. By Bob Gourley.

Build The Case For A Customer Success Management Program Now

Forrester's Customer Insights

Build The Case For A Customer Success Management Program Now Business leaders recognize that there is great value in retaining their best customers. Forrester’s research bears this out: devoted customers pay price premiums, buy additional services, and help attract other good customers.