Author Archives
-
Tool maintenance and the Lifestyle Licence
Seedling development happens entirely indoors now, under lamps. In the shortest days of the year I set up folding tables in the back room, fill trays with damp promix, and press tomato seeds no deeper than the edge of a… Read More ›
-
My NoCap Experience
[update] I recently learned NoCap can’t understand videos =) I’ve run small companies for decades and I was stunned to see other “solo-founders” describing their experience on YouTube or Twitter/X. After a good friend recommended NoCap a AI VC I… Read More ›
-
6 Bit DNA Encoding with Complements via XOR (biowisdom)
A 6-bit encoding for DNA, with a binary operation for generating complements, can be designed to represent the four nucleotide bases—adenine (A), thymine (T), cytosine (C), and guanine (G)—while drawing an intriguing parallel to the I Ching, an ancient Chinese… Read More ›
-
Leveraging Malware Sandboxes for Threat Analysis: How They Work, What They Reveal — Decision-Making Processes
In the fast-paced world of cybersecurity, malware sandboxes are critical tools for analyzing and understanding malicious software in a safe, controlled environment. As data professionals and security analysts, understanding how sandboxes operate, the insights they provide, and how they determine… Read More ›
-
Unveiling the Power of Hilbert Curves in Clustering:
In the ever-evolving landscape of data science, clustering remains a fundamental technique for discovering hidden patterns, segmenting customers, or even processing images. However, when dealing with spatial or high-dimensional data, traditional methods like K-means or DBSCAN often grapple with the… Read More ›
-
Hunting Hashes
I’ve been working on a thing that looks and acts like a hash but it isn’t designed to uniquely identify a set of bytes. It’s designed to represent a group of similar files, like a bucket it can contain many… Read More ›
-
Validating Malware Classification with Genomic Data
The problem I’d like to describe here is the lack of a well defined corpus of cyber security related threat intelligence. Lacking a well defined corpus of data to prevent us from qualifying the utility of various solutions. While there… Read More ›
-
Early 2023 Update
Last year I had a couple of new events, new to me. The first came as the farm I leased was finally sold and I needed to move. The second was that I got mixed up with Legionnaires. Yep, I… Read More ›
-
Smoke or Fire
I have a zippo lighter and I recently refilled it with lighter fluid and placed it in my front pocket with my wallet. I’d added too much fuel, usually I light it and burn off the extra fuel, slowly the… Read More ›
-
6th Sense
I greatly dislike the movie “The Sixth Sense” with Bruce Willis along with the ideas from Physics describing a multiverse. Over the last decade I’ve come close to loosing my life a few times — always over stupid silly things,… Read More ›
You must be logged in to post a comment.