Blogs
September 9, 2020 / March 22, 2023 by Query
This is a quick introduction on popular Supervised Learning Algorithms. As we may recall, Supervised Learning refers to the set of algorithms that uses training data comprising both of inputs and corresponding output to build a model that subsequently predicts the best output for future inputs. Supervised Learning problems fall in two broad categories: In […]
Read more »
Newsroom
September 2, 2020 / December 24, 2022 by Query
September 1, 2020 / December 24, 2022 by Query
August 26, 2020 / March 22, 2023 by Query
If your organization is running a web application, you are likely to use EC2. Further, there is a high likelihood your instances are all Linux. Linux systems are robust and a suitable first choice for server applications like a MEAN stack express.js web server, an application built using open source LAMP stack, commercial proprietary software, […]
August 19, 2020 / March 22, 2023 by Query
In our previous blog, Supervised vs Unsupervised Learning, we learned that Machine Learning consists of algorithms that learn to solve a problem without expressly being provided step by step instructions by a human agent. Then we differentiated between two major categories of algorithms – Supervised Learning & Unsupervised Learning. In supervised learning, the training data […]
August 12, 2020 / May 24, 2023 by Query
Zeek the new Bro Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review what makes Zeek a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog: Bro: Security’s Swiss Army Knife. A language […]
July 28, 2020 / March 22, 2023 by Query
In our previous blogs on Artificial Intelligence and Everyday Life, we learned the basics of how our computers can be trained to think like humans and work like them. Now let’s move on to some actual application of what we learned and understand about one of the most versatile neural network models – The Autoencoder. […]
July 21, 2020 / February 16, 2023 by Query
Bag of WordsThe bag-of-words model is a simplifying representation technique wherein a text (such as a sentence or a document) is represented as the bag (multiset) of its words, disregarding grammar and even word order but keeping multiplicity. Bottom-up parserThe bottom-up parser has a parsing technique that starts bottom-up by grouping words into phrases, and […]
July 14, 2020 / February 16, 2023 by Query
A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise. Bro, the leading platform for network security monitoring, is quite an exciting ecosystem […]
June 30, 2020 / April 23, 2024 by Query
Looking for some top hacking techniques? Read about the most common ones below! Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/ While we just explored Anomaly Detection as one of the uses of this model, look for its other applications such as Dimensionality Reduction, Information Retrieval, and Machine Translation, […]