Page 1 of 1

The information that Far North

Posted: Sun Feb 09, 2025 9:23 am
by asimd23
A quick word about data security. Enterprises collects can be very sensitive, and they are not immune from cyberattacks. Extreme care is taken to secure the data both in motion and at rest. They call their security team the “Men in Black” because you don’t want to know what they’re seeing. And obviously, the perpetrators are written into the Naughty List.

The event is then described using a standard usa rcs data glossary of terms. This all used to be done by hand and, like chunking, was labor-intensive and required special training. Today, AI transcription and description services are sufficiently reliable. Mistakes do still occasionally occur, and the more consequential episodes receive special attention and review.

Each event description is passed along to a decision process that determines whether the event gets categorized as Naughty, Nice, or Neutral. After all, “He knows if you’ve been bad or good.” This decision process is very proprietary.

I did learn that massive neural networks are being trained to differentiate Naughty and Nice, but only on an experimental basis.