Home » Internet
Category Archives: Internet
This is a post that lists down my talks or conferences on Analytics and will be updated as I keep talking.
It also lists sponsors.
1) Big Data Big Analytics - http://krishnarajpm.com/bigdata/abstract.pdf Workshop on Statistical Machine Learning and Game Theory Approaches for Large Scale Data Analysis 9 July 2012 – 14 July 2012 Sponsored by Mathematical Sciences, Division of Science and Engineering Research Board at Bangalore India
Department of Science & Technology Government of India. (sponsored airfare-hotel accomodation-honorium)
2) Data Analytics using the Cloud- Challenges and Opportunities for India at 1st International Symposium on Big Data and Cloud Computing Challenges(ISBCC-2014) March 27-28, 2014 VIT University, Chennai, India Sponsored by BRNS (flight)
3) Open Source Analytics at OSSCamp 2014 http://osscamp.in/
1) First Big Data Conference -New York sponsored by Aster Data (flight-stay)
2) Data Mining 2009 Sponsored by SAS Institute ( flight-stay)
1) Using R in HR Analytics -HR Tech Europe 2012 http://blog.hrtecheurope.com/2012/08/more-r-in-hr/ also http://blog.revolutionanalytics.com/2012/11/using-r-in-the-human-resources-department.html
2) R for Business Analytics- Analytics India Magazine
3) Data Mining Research People Award 2010: Data Mining Blog http://www.dataminingblog.com/data-mining-research-interview-ajay-ohri/
4) Statsjobs – April 2008 http://statjobs.blogspot.in/2008/04/interview-with-ajay-ohri-data-mining.html
1) Blogger of the Week Social Media Collective http://socialmediatoday.com/SMC/67268
2) Member of the Month (2 times) on Analyticbridge $250 awarded twice
If you need me to talk on analytics - drop me a line at http://linkedin.com/in/ajayohri and I can talk.
“NSA was not aware of the recently identified vulnerability in OpenSSL, the so-called Heartbleed vulnerability, until it was made public in a private sector cybersecurity report,” the Office of the Director of National Intelligence said in a statement to HuffPost. “Reports that say otherwise are wrong.”
Thanks to Mr Snowden , NSA slide showing how NSA had cracked SSL before???
In an NSA presentation slide on “Google Cloud Exploitation,” however, a sketch shows where the “Public Internet” meets the internal “Google Cloud” where their data resides. In hand-printed letters, the drawing notes that encryption is “added and removed here!” The artist adds a smiley face, a cheeky celebration of victory over Google security.
with added stuff
ps- Dont be Evil Google. Just give all the data to the Government ;)
Here is an interview with Torch browser which embeds bit torrents within the Chromium open source browser and is compatible with all Chrome downloads. With a new 1 million users in 2014, Torch is lighting up the Internet at http://www.torchbrowser.com/
Ajay- Why did you create torch and how did you create it. your startup story:
Torch- Torch browser was a project born out of the demand for easy one-click media and file sharing. Rather than bogging down ones browser with multiple file sharing, torrenting, and media sharing software or extensions, we wanted to streamline these concepts into a one-click, user friendly experience. As well as eventually integrate the simplicity and one step solution in a way that would give the user instant access to their desired media or file share. For this reason we have advanced Torch to include features such as no wait torrenting, once the torrent starts to download, it can already be played. Drag & Drop, which allows for simple and quick searching, instant audio extraction, file download accelerator, Torch Music, and so much more.
What has been user feedback and stats:
The user feedback has been extremely positive. You can see this by following our Facebook page at http://facebook.com/torchbrowser, where we proudly boast over 1MM likes
We constantly take polls requesting user feedback and feature requests. Even though one cannot please everyone, we do our best to develop Torchaccording to the majorities requests. If enough people want it, we will build it. Because ultimately it’s the user’s browser, not ours.
How do you intend to monetize:
This is a valid and common question. Currently our focus is on filling the needs of our users, developing for multiple platforms, adding features and improving overall system performance. At the same time, we are discussing possible future premium services that will generate revenues.
Any plans to embed tor in torch, to enable relay server through single clickbrowser and what about chrome plugins like mafiaafire:
All Chromium plugins available at the Chrome web store are compatible with Torch. The issue of by-passing unwarranted blocks is under serious consideration by our team. We are all for the complete and public access to all things internet. If it’s on the net, and it’s intended to be shared, then it should be accessible to all. Censorship and unjustified blocks are not things that we feel comfortable with and we don’t believe that our users need to tolerate this.
What legal concerns if any did you encounter or plan for during the product design phase:
There are no legal concerns. Like other browsers and similar applications,Torch is a general purpose tool for browsing, sharing and downloading internet content.
Do you collect user data:
Your views on NSA spying internationally:
This question is a bit vague and beyond the scope of our development being that system security should be managed via personal OS firewall settings. However, unwarranted intrusions into ones personal domain is not something that makes anyone feel comfortable, nor should it be tolerated. With that said, we are evaluating the benefits of including added browsing protection into a future build.
Again, thank you for the opportunity, and we hope that this has been helpful.
The Torch Team.
I have been writing freelance for kdnuggets.com
Its a great learning for me to be a better writer especially in my discipline.
These are a list of articles -interviews are in bold and I will keep updating this list
- Book Review: Data Just Right 2014/04/03
- Exclusive Interview: Richard Socher, founder of etcML, Easy Text Classification Startup 2014/03/31
- Trifacta – Tackling Data Wrangling with Automation and Machine Learning 2014/03/17
- Paxata automates Data Preparation for Big Data Analytics 2014/03/07
- etcML Promises to Make Text Classification Easy 2014/03/05
- Wolfram Breakthrough Knowledge-based Programming Language – what it means for Data Science? 2014/03/02
Torch is a delightful browser with embedded bit torrents. Even downloading any Youtube video or directly any torrent is now once click away. No wonder it hits 10 million users- and its based on the open source chrome browser. though I would want to know if it is secure enough ;) for the boys from Maryland
Try it out here
I look around and I see myself surrounded by people promising a new dawn of a glorious civilization by machine learning, with perfect data capture, incredible computational and remorseless algorithms crunching to give you a glimpse of the future. Some even say a few billion here and there and you could approach a new singularity in time.
So I wonder, and I wonder, if the human race , particularly the common man, the plebians, ever stand a chance against the machine learning plutocrats.
And I am heartened by that old friend of mankind, the sheer elegant romance of random number creation.And of tools like sarcasm, and implied association using lingustic tools that no database can capture.Of for some more randomness, more romantic entropy, onwards to a brave new utopian internet in an increasingly dystopian world.
Quo Vadis, Brutus? Quo Vadis, indeed!!