No cloud server or messaging system is completely secure: Just ask Hillary Clinton. Even though these systems are protected with layers of security, these layers can be hacked. Brute force attacks can crack passwords. MITM attacks using tools like sslstrip can turn secure sessions into insecure HTTP sessions. And outright manipulation of human confidence can […]

I am a terrible note taker – My handwriting is appalling, and while I can type pretty fast, I find it very difficult to look people in the eye at the same time – And when I am on the phone, trying to tuck the headset under my chin and type is near impossible (and […]

Following our recent post on the dangers of overselling the capabilities of voice recognition software (see here), we commissioned a poll of over 2,000 Americans to see whether they had used Siri in iOS7, what they thought of Siri’s capabilities, and whether they had been “oversold” by Apple. The results were a little shocking.  Once […]

There was an interesting paper posted on the LinkedIn Automatic Speech Recognition (ASR) group a few days ago. The OUCH project (Outing Unfortunate Characteristics of HMMs) has been commissioned under a US government contract to look at where we are with ASR, and what can be done to make things better, if that is what […]

Look around any office in most large companies. If you spontaneously detonated all of the Apple-manufactured computing equipment in a 100 yard radius, there is little chance of any damage being done. Loosen your definition to include smartphones, and maybe you will hear a few pops, although it’s probably a personal iPhone while the company […]

Stories in the press about “lurid” e-mails that threaten to bring down the world’s financial community seem to occur almost as often as stories about another Greek bailout. These stories demonstrate to me two things: 1. Companies have a lot of the information they need to sniff out wrongdoing 2. They are not analysing that […]

Looking for best eDiscovery Software?

GET STARTED CONTACT US