Posted in Artificial intelligence Natural language processing and text mining Science Work

Marvin – semantic annotator

We created Marvin, an semantic text annotation tool that uses external resources such as DBPedia and WordNet…

Posted in InfoSec

The art of cyber war

This is the post about a lecture. Very interesting one, held on New York information security meetup…

Posted in InfoSec

Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers…

Posted in InfoSec Software

USSD Code List for Android Smartphone

Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the…

Posted in Hobbies InfoSec Leadership and management Software Tales from life Work

Hacker’s lament

But did you, in your three-piece psychology and 1950’s technobrain ever take a look behind the eyes…

Posted in Hobbies Software

GreatUniHack – impressions from hackathon

This weekend (17th-19th April 2015.) I was participating GreatUniHack, so I would like to share here some…

Posted in Artificial intelligence Work

Worries about Artificial Intelligence

Recently big names in science and technology Stephen Hawking and Eon Musk showed publicly their concerns about…

Posted in Tales from life

Blindfolded nation

Recently a friend of mine pointed me to one interesting Pakistani video. To be honest, I don’t…

Posted in Hobbies Leadership and management Tales from life

I vote for Charlie Chaplin

Definitely, if there is a politician who would think and drive as Charlie Chaplin did in the…

Posted in InfoSec Software Tales from life Work

OWASP Seraphimdroid android security published

Follow my blog with Bloglovin Today I have to make one very important announcement. The first version…

Posted in Artificial intelligence Natural language processing and text mining Software Work

xgoogle python library upgrade for google image search

Couple of days ago I realized that I need some library that will allow me search google…

Posted in InfoSec Software

Case of the cyber war: Kosovo conflict

Introduction Kosovo conflict was a conflict that started during the 1998 between FR Yugoslavia police and military…