Big Data HealthcareDataOpsData CurationAnnouncement January 8, 2018 John Snow Labs Data Catalog is recognized by the CLOUD AWARDSDeterminedly Growing the John Snow Labs Data Catalog Earns Recognition from 2017-2018 CLOUD AWARDS PROGRAM… Irmee Love0
Big Data HealthcareDataOps November 13, 2017 What Indicators of Compromise are and why you should care – Part 2Seeking out the Attacker’s Methodology Potentially, the most powerful way of creating an Indicator is to… Jonathan Suldo Love0
Big DataDigital HealthDataOps September 25, 2017 Usermind builds its data science platform from scratch to production in 3 months with John Snow Labs’ Data LabThe Usermind customer engagement hub now has a platform & team who apply advanced analytics… Ida Lucente Love1
Big Data HealthcareDataOpsData CurationAnnouncement September 25, 2017 Usermind builds its data science platform from scratch to production in 3 months with John Snow Labs’ Data LabThe Usermind customer engagement hub now has a platform & team who apply advanced analytics… Ida Lucente Love1
Big DataData ScienceDataOps September 11, 2017 Data Engineering – Maturity Model of Productive Analytics PlatformThere’s always been some debate over what data operations means and still term DataOps is… Svitlana Rybka Love1
Cyber SecurityThreat IntelligenceDataOps September 4, 2017 Cybersecurity – Indicators of Attack and Indicators of CompromiseWhat is an Indicator of Attack (IOA) and why is it necessary to take an… Jonathan Suldo Love2
Cyber SecurityThreat IntelligenceDataOps July 24, 2017 Is Threat Intelligence the Key to Defeating Ransomware?One of the more disconcerting developments in the malware world over the past few years… Jonathan Suldo Love1
Big Data HealthcareCyber Security June 26, 2017 What Are Hackers Seeking in Your Medical Records?May be paper-based patient files are not shareable, but they could be more secure than… Mohamed Tharwat Love2
Big Data HealthcareData CurationAnnouncement April 23, 2017 John Snow Labs’ Threat Intelligence as a Service delivers live, corroborated, ranked & automatically actionable cyber security threats from 80+ sourcesOut-of-the-box support for multiple data formats including STIX & TAXII and direct integrations into SIEM,… Ida Lucente Love1
Data PhilanthropyHackathon February 27, 2017 ThreatSync – When The Cyber Security Threat Is Global, The Response Should Be Too!ThreatSync is the winner of the John Snow Labs Prize for exceptional use of our… Ida Lucente Love0