Chapters
Introduction
Introduction
0:00
Introduction
0:00
Keynote Definition
Keynote Definition
0:20
Keynote Definition
0:20
Value of Skepticism
Value of Skepticism
3:39
Value of Skepticism
3:39
Machine Learning
Machine Learning
4:06
Machine Learning
4:06
Egg Drop
Egg Drop
13:37
Egg Drop
13:37
Other Winners Curse
Other Winners Curse
14:27
Other Winners Curse
14:27
Two Mistakes
Two Mistakes
16:22
Two Mistakes
16:22
Kingsley
Kingsley
17:01
Kingsley
17:01
AI Mission Creep
AI Mission Creep
19:44
AI Mission Creep
19:44
AI Workflow
AI Workflow
20:33
AI Workflow
20:33
Conversation
Conversation
21:05
Conversation
21:05
Tay
Tay
22:56
Tay
22:56
AI Child
AI Child
23:20
AI Child
23:20
Internet People
Internet People
24:00
Internet People
24:00
Twitter Answers
Twitter Answers
25:20
Twitter Answers
25:20
Why Is That
Why Is That
25:45
Why Is That
25:45
Race War
Race War
26:03
Race War
26:03
Grammar Lessons
Grammar Lessons
26:33
Grammar Lessons
26:33
Prejudice Science
Prejudice Science
26:59
Prejudice Science
26:59
Sotae Rant
Sotae Rant
27:35
Sotae Rant
27:35
A Holistic View of Security
A Holistic View of Security
28:17
Cartesian Security
Cartesian Security
28:53
Cartesian Security
28:53
ARPANET
ARPANET
29:19
ARPANET
29:19
Cartesian Approach
Cartesian Approach
30:31
Cartesian Approach
30:31
Gadgets Are Eternal
Gadgets Are Eternal
31:13
Gadgets Are Eternal
31:13
The Liberal Arts Are Getting Upset
The Liberal Arts Are Getting Upset
32:09
Theyve Made Mistakes Too
Theyve Made Mistakes Too
32:54
Theyve Made Mistakes Too
32:54
Machine Learning In The Criminal Justice System
Machine Learning In The Criminal Justice System
33:39
Gender Detection And Faces
Gender Detection And Faces
34:18
White People Have Faces
White People Have Faces
34:37
White People Have Faces
34:37
Flashlight Apps
Flashlight Apps
35:22
Flashlight Apps
35:22
Technological Manifest Destiny
Technological Manifest Destiny
36:49
Statistics
Statistics
38:15
Statistics
38:15
Internet of Things
Internet of Things
40:58
Internet of Things
40:58
IOT Security
IOT Security
41:18
IOT Security
41:18
TLS
TLS
42:01
TLS
42:01
Cheapness
Cheapness
42:39
Cheapness
42:39
Best Seller
Best Seller
43:39
Best Seller
43:39
Have I written a paper about IoT
Have I written a paper about IoT
44:28
Why wouldnt you do this
Why wouldnt you do this
45:52
Why wouldnt you do this
45:52
Avoidable Mistakes
Avoidable Mistakes
46:46
Avoidable Mistakes
46:46
Conclusion
Conclusion
47:18
Conclusion
47:18
Questions
Questions
48:07
Questions
48:07
Would you use machine learning
Would you use machine learning
49:23
Sync to video time
Description
4.4KLikes
197,048Views
2018Aug 16
Transcript
Follow along using the transcript.
Show transcript
USENIX
38.8K subscribers
Transcript
NaN / NaN
Show more