Information Technology
15 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Cecile Bourguignon from Technology & Business
Scoop.it!

How Netflix Reverse Engineered Hollywood

How Netflix Reverse Engineered Hollywood | Information Technology | Scoop.it

To understand how people look for movies, the video service created 76,897 micro-genres. We took the genre descriptions, broke them down to their key words, … and built our own new-genre generator.


Via odysseas spyroglou
more...
odysseas spyroglou's curator insight, January 6, 2014 5:51 PM
This is a quite long but amazing piece about big data and Hollywood movies. It's really an experiment with all the data and results in place and it can inspire similar initiatives.
Scooped by Cecile Bourguignon
Scoop.it!

CommitStrip - The coders' life blog

CommitStrip - The coders' life blog | Information Technology | Scoop.it
CommitStrip, le blog qui raconte la vie des codeurs
more...
No comment yet.
Rescooped by Cecile Bourguignon from Reality Hacking
Scoop.it!

The Future Of Hacktivism | newmatilda.com

The Future Of Hacktivism | newmatilda.com | Information Technology | Scoop.it
After some high-profile arrests, hacker groups like Anonymous are changing the way they work.

Via Enoch Blackwater
more...
No comment yet.
Scooped by Cecile Bourguignon
Scoop.it!

Les mails que j'envoie contiennent-ils l'adresse ip de mon ordinateur?

Les mails que j'envoie contiennent-ils l'adresse ip de mon ordinateur? | Information Technology | Scoop.it
un méthode pour savoir si les mails qu'on envoient contiennent ou nons l'adresse ip de mon ordinateur

 

Quand on envoie un mail, il y a pas mal d’informations qui sont “invisibles dans le mail”. Ces informations figurent dans l’en-tête du mail et on y trouvera une petite somme d’informations intéressantes comme l’adresse ip de l’expéditeur. Personnellement, il y a bien longtemps que j’ai analysé une en-tête d’email et ce n’est, en fait,  pas très compliqués. A titre d’exemple sur gmail, il faut aller dans le menu d’option du mail qu’on lit et de sélectionner “Afficher l’original”.

 

more...
No comment yet.
Rescooped by Cecile Bourguignon from Informatique Professionnelle
Scoop.it!

Creative Tuesday #26 | Oculus Rift, Google Glass, montres connectées : Quelles nouvelles fonctionnalités pour quels usages ? Le Node Bordeaux 29/10

Creative Tuesday #26 | Oculus Rift, Google Glass, montres connectées : Quelles nouvelles fonctionnalités pour quels usages ? Le Node Bordeaux 29/10 | Information Technology | Scoop.it

CT #26 : Oculus Rift, Google Glass, montres connectées : Quelles nouvelles fonctionnalités pour quels usages ?

 

Ce mois si nous vous proposons de participer à un workshop ou vous pourrez tester par vous même l’oculus rift (http://www.oculusvr.com/) sur trois ateliers dédiés.
Vous aurez aussi accès aux Google Glass et aux dernières montres connectées de Samsung et Sony.

 

Cet évènement sera aussi l’occasion de débattre avec les professionnels de Bordeaux Games de comment ces périphériques peuvent changer notre façon de jouer ou être utilisés en entreprise.


Via Guillaume de Lafontaine
more...
No comment yet.
Rescooped by Cecile Bourguignon from La veille en ligne d'Open-DSI
Scoop.it!

SaaS et législation européenne : ce qu'il faut savoir

SaaS et législation européenne : ce qu'il faut savoir | Information Technology | Scoop.it
Cet article présente un résumé des aspects législatifs et réglementaires que les entreprises européennes doivent prendre en compte lorsqu'elles choisissent un fournisseur de SaaS. Notamment en matière de protection des données.

Via Open-DSI
more...
No comment yet.
Scooped by Cecile Bourguignon
Scoop.it!

An Introduction To Full-Stack JavaScript | Smashing Coding

An Introduction To Full-Stack JavaScript | Smashing Coding | Information Technology | Scoop.it
An overview of why full-stack JavaScript might be right for you and how it works its magic.
more...
No comment yet.
Rescooped by Cecile Bourguignon from Digital-News on Scoop.it today
Scoop.it!

Top Hacking Vunerabilities by Programming Languages

Top Hacking Vunerabilities by Programming Languages | Information Technology | Scoop.it
Are You Practicing Safe Coding
In 2011, hackers made a significant dent on the security of platforms, that year proved to be the year of the hack.

Via Thomas Faltin
more...
No comment yet.
Rescooped by Cecile Bourguignon from The Rise of the Algorithmic Medium
Scoop.it!

#Bayesian Methods for Hackers | #datascience

#Bayesian Methods for Hackers | #datascience | Information Technology | Scoop.it
Bayesian Methods for Hackers : An intro to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view.

Via luiy, Pierre Levy
more...
luiy's curator insight, October 14, 2013 11:35 AM

Bayesian Methods for Hackers is designed as a introduction to Bayesian inference from a computational/understanding-first, and mathematics-second, point of view. Of course as an introductory book, we can only leave it at that: an introductory book. For the mathematically trained, they may cure the curiosity this text generates with other texts designed with mathematical analysis in mind. For the enthusiast with less mathematical-background, or one who is not interested in the mathematics but simply the practice of Bayesian methods, this text should be sufficient and entertaining.

 

The choice of PyMC as the probabilistic programming language is two-fold. As of this writing, there is currently no central resource for examples and explanations in the PyMC universe. The official documentation assumes prior knowledge of Bayesian inference and probabilistic programming. We hope this book encourages users at every level to look at PyMC. Secondly, with recent core developments and popularity of the scientific stack in Python, PyMC is likely to become a core component soon enough.

PyMC does have dependencies to run, namely NumPy and (optionally) SciPy. To not limit the user, the examples in this book will rely only on PyMC, NumPy, SciPy and Matplotlib only.

Leonardo Auslender's curator insight, October 15, 2013 7:40 AM

Not at this moment.

 

Rescooped by Cecile Bourguignon from healthcare technology
Scoop.it!

Five different ways to understand self-tracking

Five different ways to understand self-tracking | Information Technology | Scoop.it

Google Glass is the typical example of what wearable computing technologies can achieve. By this we mean the integration of small technological components—cameras, sensors, connectivity chips—into normal clothes and daily fashion accessories. The development of the Mountain View company is remarkable for its ambition and possibilities, but there are other alternatives equally remarkable.


Angel, a bracelet that can go a long way

We are almost used to the release of bracelets by giants of the likes of Nike with its Fuelband or FitBit—with its latest development, Force. These bracelets are essentially designed to track your daily physical activity, and the audience segment that may be interested in them is especially sporty.


BluFit Bottle, a smart bottle

BluFit is a ‘smart’ water bottle connected to your mobile device. The connection to the mobile application allows setting parameters such as your weight, age, or the temperature and humidity of your environment to enable this bottle to suggest you how much water you have to consume, and when.


TellSpec analyzes what you are about to eat

Diet is another field in which these devices can be very useful, as shown by the scanner TellSpec, a small device that ‘studies’ your food and allows you to know its components or the calories contained in every 100 grams (0.220 pounds) of any food. Moreover, it points out the possible elements that could provoke you allergies


QuASP, an assistant to improve your training

The monitoring of fitness activity goes a step further with QuASP, a device in the shape of a sensor integrated in your clothes that evaluates various aspects of your physical activity such as acceleration or deceleration patterns, reaction times when changing direction and, of course, distances, speeds, and even high jumps.

 

Ringbow, a different way to play

Another segment in which the technology integrated into the clothing and accessories has special interest is video games. Systems like Oculus Rift prove it, but there are alternatives like Ringbow, a ring that allows you to interact with touch devices specifically aimed at mobile games.



Via nrip
more...
No comment yet.
Rescooped by Cecile Bourguignon from L'actualité logicielles et informatique en vrac
Scoop.it!

Google Chrome bloque le téléchargement de malwares

Google Chrome bloque le téléchargement de malwares | Information Technology | Scoop.it
Glisser un malware au milieu d'un téléchargement en apparence inoffensif est une pratique courante dont Google s'inquiète.

Via Michel
more...
No comment yet.