Super Simple React Native Redux Example

Inspired by http://blog.tylerbuchea.com/super-simple-react-redux-application-example/ Update 14/12/2018: Fixed code errors spotted by Enjin Nine... thank you very much! In this article we explore the barest of solutions to get started with React Native + Redux. The only pre-requisite to the below is to have "create-react-native-app" installed (https://facebook.github.io/react-native/docs/getting-started.html) Setup create-react-native-app superSimple cd superSimple npm install --save redux react-redux redux.js … Continue reading Super Simple React Native Redux Example

Advertisements

What do Smartphone Predictive Text and Cybersecurity have in common?

Maybe the link between your smartphone keyboard and current machine learning research in cybersecurity is not apparent at first glance, but the technology behind both is extremely similar: both leverage deep learning architectures called Recurrent Neural Networks [RNNs], specifically a type of RNN called Long Short Term Memory [LSTM]. One of the main advantages of … Continue reading What do Smartphone Predictive Text and Cybersecurity have in common?

Cyber Security: Sparse coding and anomaly detection

I've recently published the thesis I wrote in fulfillment of my Masters in Computer Security, entitled BioRFID: A Patient Identification System using Biometrics and RFID Anyone interested can download and read the whole thesis here: https://www.researchgate.net/publication/317646400_BioRFID_A_Patient_Identification_System_using_Biometrics_and_RFID In this article I'll give an extremely compressed version of the thesis and how the work therein can be … Continue reading Cyber Security: Sparse coding and anomaly detection

Bleeding edge: The intersection of Bitcoin and cyber-security

The good, the bad, & the ugly... There are some very obvious connections between bitcoin and cybersecurity; almost every hacker who blackmails their victims via ransomware or whatever other hack demand payment in bitcoin. This is the ugly side of bitcoin and cybersec; by it's very nature bitcoin is pseudo-anonymous (read: difficult to trace), decentralized (read: difficult … Continue reading Bleeding edge: The intersection of Bitcoin and cyber-security

From JQuery to ReactJS

I have previously worked with ReactJS - most notably during my Master's dissertation, however the main Javascript library I work with when working for clients and companies still remains the venerable JQuery. This is changing as more and more organizations I interact with move to more modern frameworks like Angular and ReactJS. Where to start … Continue reading From JQuery to ReactJS

Anomaly detection vs Ransomware

A big part of what we do at CyberSift is anomaly detection. The recent WannaCry attack highlighted the growing threat of ransomware in the security landscape. The WannaCry authors may have made amateur mistakes, and there may be more stealthy and profitable attacks than WannaCry, but the negative impact it has had on Windows users … Continue reading Anomaly detection vs Ransomware

Using Technology to enable the creation of an open & decentralized government

Catch my recent guest blog post about using PKI, blockchain, Tor and cryptography to enable decentralized, transparent voting - supporting an open and honest government https://www.facebook.com/LovinMalta/posts/1952145485008603