Blog

Train-Test split and Cross-validation: Visual Illustrations & Examples

Creating an optimal model that strikes a balance between underfitting and overfitting requires careful consideration. To assess how well our model performs on new, unseen data, we employ the train-test split technique and cross-validation. Train-Test Split: To evaluate a model’s performance, we split the dataset into a training set (approximately

READ MORE

Asking the right questions

I very often see false choices about paths forward. One of the most common ones is the question about the future of humanity regarding AI, robotics, computers, cloning, vaccines, genetic engineering, you name it. Any new area of technology with a tremendous potential is always a multi-edged sword, and someone

READ MORE

Enhancing Accessibility and Inclusivity in Education with ChatGPT

Education is the cornerstone of progress, but for it to be truly impactful, it must be accessible and inclusive to all. In recent years, technology has played a pivotal role in transforming the educational landscape, making strides towards greater accessibility and inclusivity. Among these technological advancements stands ChatGPT, an AI-powered

READ MORE

Ethical Considerations in AI-Powered Education

Did you know that ethical considerations in AI-powered education are becoming increasingly crucial? Or that ensuring data privacy is a top concern in the integration of AI tools in classrooms? It is important for educators to stay on top of ethical considerations in AI-powered education so they can foster responsible

READ MORE

Understanding Confidence Intervals with an Intuitive Example

Confidence intervals (CIs) are a fundamental concept in data science. In this informative guide, we’ll delve into the world of confidence intervals using an intuitive example to help you grasp this concept with confidence. The Bus Stop Scenario: Imagine yourself at a bus stop where the expected arrival time of

READ MORE

The do nothing defense

Of course until you are successfully attacked, doing nothing about security is a great approach. It saves money and time and costs you nothing. So lots of folks do nothing, or almost nothing, and I include myself in this latter approach – almost nothing. As little as I can get

READ MORE

Firewalls are alive and well: here’s why

Many years ago, Gartner declared “Firewalls are Dead”, but some 20 years later (give or take) they are still reporting on “next-generation” firewalls. Why is that? Right to the answer Firewalls provide an economy of scale by substantially reducing the input sequences and noise that can contact interfaces. Let’s break

READ MORE

API Security vs AUI security

How is an application program interface different from an other application interface? At a basic level, they are the same – in the sense that anything that can be exploited from one can be exploited from another – or at least it should be that way from a security perspective.

READ MORE

The Threat Environment – 6 questions

People who don’t have to do it seem to not understand the nature of the cyber threat. This very short summary is intended for everyone who is responsible for it to hand to everyone else to help start a conversation and gain mutual understanding. The 6 questions people are commonly

READ MORE

The do nothing defense

Of course until you are successfully attacked, doing nothing about security is a great approach. It saves money and time and costs you nothing. So

READ MORE

REQUEST DEMO