https://www.ibm.com/developerworks/opensource/library/os-postgresecurity/index.html
Tags: #database #security #postgreSQL
  
  Tags: #database #security #postgreSQL
Ibm
  
  Total security in a PostgreSQL database
  Database security is the single biggest concern with today's Web-based applications. Without control, you risk exposing sensitive information about your company or, worse yet, your valuable customers. In this article, learn about security measures you can…
  https://bartoszmilewski.com/2014/10/28/category-theory-for-programmers-the-preface/
Tags: #programming
  
  Tags: #programming
  Bartosz Milewski's Programming Cafe
  
  Category Theory for Programmers: The Preface
  Table of Contents Part One Category: The Essence of Composition Types and Functions Categories Great and Small Kleisli Categories Products and Coproducts Simple Algebraic Data Types Functors Functo…
  https://blog.dominodatalab.com/an-introduction-to-model-based-machine-learning/
Tags: #machinelearning
  
  Tags: #machinelearning
Dominodatalab
  
  An Introduction to Model-Based Machine Learning
  This article introduces Model-Based Machine Learning, a new paradigm in machine learning which makes use of Bayesian inference, rather an optimization.
  https://eli.thegreenplace.net/2016/the-chain-rule-of-calculus/
"The chain rule of derivatives is, in my opinion, the most important formula in differential calculus. In this post I want to explain how the chain rule works for ..."
Tags: #math
  "The chain rule of derivatives is, in my opinion, the most important formula in differential calculus. In this post I want to explain how the chain rule works for ..."
Tags: #math
https://www.youtube.com/watch?v=NpN9NzO4Mo8
This documentary talks about a stolen mobile with installed Cerberus, through which a dutch film student spies the phone and its thief.
Tags: #security #privacy
  
  This documentary talks about a stolen mobile with installed Cerberus, through which a dutch film student spies the phone and its thief.
Tags: #security #privacy
YouTube
  
  Short Film: Find my Phone - Subtitled
  Any questions? Check the Reddit AmA: https://redd.it/5jg18f
After my phone got stolen, I quickly realized just how much of my personal information and data the thief had instantly obtained. So, I let another phone get stolen. This time my phone was pre-programmed…
  After my phone got stolen, I quickly realized just how much of my personal information and data the thief had instantly obtained. So, I let another phone get stolen. This time my phone was pre-programmed…
We opened techbinder more than 5 months ago with the aim of offering you the most interesting news and resources about tech world.
To improve your experience and our productivity, we also developed a bot, @techbinderbot, to let you send us feedbacks and news or resources you think might interest to the community.
For the support you gave us during this period, we want to thank you. How? By telling you that the news doesn't finish here. We have a lot of unique ideas, some are awaiting for a full Telegram support and others still have to be developed, everything to improve your experience with the bot and the channel.
Thank you again and keep following us. Merry Christmas (to those who celebrate it) and happy new year to everybody.
–– Syra's Techbinder staff
  To improve your experience and our productivity, we also developed a bot, @techbinderbot, to let you send us feedbacks and news or resources you think might interest to the community.
For the support you gave us during this period, we want to thank you. How? By telling you that the news doesn't finish here. We have a lot of unique ideas, some are awaiting for a full Telegram support and others still have to be developed, everything to improve your experience with the bot and the channel.
Thank you again and keep following us. Merry Christmas (to those who celebrate it) and happy new year to everybody.
–– Syra's Techbinder staff
https://threatpost.com/generic-os-x-malware-detection-method-explained/120503/
Tags: #security #macOS
  
  Tags: #security #macOS
Threatpost | The first stop for security news
  
  Generic OS X Malware Detection Method Explained
  A researcher says the future of OS X malware detection may be rooted in patterns and heatmap visualization.