https://www.wsj.com/tech/cybersecurity/unsubscribe-email-security-38b40abf
Archive for the '–' Category
Band Theory Fundamentals
June 29, 2025The great high-energy write-off – Physics World
June 29, 2025Andersen v Weinberg
https://physicsworld.com/a/the-great-high-energy-write-off/
Holevo’s theorem
June 29, 2025quantum mechanics – How to understand the Holevo capacity intuitively? – Physics Stack Exchange
https://physics.stackexchange.com/questions/711441/how-to-understand-the-holevo-capacity-intuitively
How Long-term Compounding Multiplies the Awesome Power of the Stock Market – The New York Times
June 29, 2025Blavatnik Awardees | Yale Ventures
June 29, 2025Your personality type: Architect (INTJ-T)
June 29, 2025Personality type: Architect (INTJ-T)
Traits: Introverted – 82%, Intuitive – 51%, Thinking – 58%, Judging – 69%, Turbulent – 57%
Role: Analyst
Strategy: Constant Improvement
The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning) | July 2021 | Communications of the ACM
June 28, 2025Differential privacy is not a silver bullet for all privacy problems. By Josep Domingo-Ferrer, David Sánchez, and Alberto Blanco-Justicia Posted Jul 1 2021
QT:{{”
The traditional approach to statistical disclosure control (SDC) for privacy protection is utility-first. Since the 1970s, national statistical institutes have been using anonymization methods with heuristic parameter choice and suitable utility preservation properties to protect data before release. Their goal is to publish analytically useful data that cannot be linked to specific respondents or leak confidential information on them.
In the late 1990s, the computer science community took another angle and proposed privacy-first data protection. In this approach a privacy model specifying an ex ante privacy condition is enforced using one or several SDC methods, such as noise addition, generalization, or microaggregation. The parameters of the SDC methods depend on the privacy model parameters, and too strict a choice of the latter may result in poor utility. The first widely accepted privacy model was k-anonymity, whereas differential privacy (DP) is the model that currently attracts the most attention.
…
“}}
Slipping Through My Fingers – Wikipedia
June 28, 2025https://en.wikipedia.org/wiki/Slipping_Through_My_Fingers
From Last Day
ABBA