Waf

6 posts

Introduction After years of adjustments, it’s finally here – the European Union’s General Data Protection Regulations have just come into effect. The new regulation substantially affects both the businesses in the EU and the business outside the EU working with EU companies and clients. Without the further ado, let’s have a closer look at what’s new. Do you need to comply with…

Imagine that you live in the world without any protection. But there is a place where all information concerning you is stored together with the balance of your bank account. Everyone can access this place and change its data, pay in or pay out money from its account but also... modify other people's data. Even in the perfect world, there will be a person who will want to steal your…

This article is part of a series. Part I can be found here and part II here . The full code of this tutorial was posted on Github . In the previous part we continued work on our binary classifier. We showed how to use scikit-learn's Pipeline class to combine feature calculation and prediction into one simple step. In this part we will improve performance of our model by adding new…

A modern technology causes that we are connected with the entire world. The extended network which is the Internet makes that we have everything within our reach. It is enough to switch your laptop on, take a smartphone or tablet and you can log into social media, do shopping, book a flight, log to your bank account or play your favourite game. Access to information has never been so simple.…

This article is part of a series. Part I can be found here . The full code of this tutorial was posted on Github . In the previous article we walked through the process of creating a simple predictive model for detection of malicious HTTP requests. We learned how to: load and explore our datasplit the data into training, development and test setuse scikit-learn's CountVectorizer and…

×

For media

Provide us with contact details.

Thank you