What is Software Composition Analysis and What Are the Limitations? By Michael Bommarito|2022-04-23T11:50:49-04:00April 5th, 2022|Categories: Blog|Tags: data, dependencies, machine learning, SBOM, SCA, software| Read More
SBOMs: the Premise, the Promise, the Peril By Michael Bommarito|2022-04-23T11:48:43-04:00March 30th, 2022|Categories: Blog|Tags: SBOM, security, software| Read More
How Data Provenance Drives Machine Learning Risk + Value By Jillian Bommarito|2022-04-07T09:30:49-04:00March 26th, 2022|Categories: Blog|Tags: ai, ai policy, data, machine learning, machine learning policy, provenance| Read More
AI without Compliance: A Cautionary Tale of FTC Enforcement By Jillian Bommarito|2022-04-12T15:47:56-04:00March 25th, 2022|Categories: Blog|Tags: ai, compliance, data, machine learning, regulation, technology diligence| Read More
Surveying scikit-learn Usage — Part III: Clustering and Overall Popularity By Michael Bommarito|2022-04-12T15:48:45-04:00March 23rd, 2022|Categories: Blog|Tags: data science, machine learning, python, research, scikit-learn| Read More
Surveying scikit-learn usage — Part II: The (Un)reasonable Popularity of Random Forests By Michael Bommarito|2022-04-12T15:49:48-04:00February 23rd, 2022|Categories: Blog|Tags: data science, machine learning, python, research, scikit-learn| Read More
Surveying Scikit-learn Usage — Part I By Michael Bommarito|2022-04-20T21:08:34-04:00February 21st, 2022|Categories: Blog|Tags: data science, machine learning, python, research, scikit-learn| Read More
The Exponentially Zero Valuation of IPython — or, Why Valuing Software is so Hard. By Michael Bommarito|2022-04-12T15:53:10-04:00February 10th, 2022|Categories: Blog|Tags: open source, python, research, software valuation, valuation| Read More
Snake JARs, Part III: Data Science Sssssss-security By Michael Bommarito|2022-04-12T15:54:00-04:00February 9th, 2022|Categories: Blog|Tags: data science, data science policy, dependencies, Java, python, research, risk management, security, vulnerabilities| Read More
Snake JARs, Part I: Hidden log4j Dependencies in Python Packages By Michael Bommarito|2022-04-12T15:54:32-04:00January 24th, 2022|Categories: Blog|Tags: dependencies, python, research, SBOM, security, vulnerabilities| Read More