Evaluating Near Duplicates in Twitter – Part 1

Introduction Twitter has become a very popular micro blogging tool used for the expression of views and to broadcast news or events. As people post to Twitter in real time, millions of microblogs (tweets) are generated every second for major events. Near-duplicate detection in Twitter is of increasing importance due to the primary role it plays in first story detection, spam detection, and many other clustering processes. In this blog series, we evaluate how different combinations of similarity measurement techniques,

Continue Reading

More than Tools and Gadgets

What’s an Engineer without his/her tools and gadgets? You can hardly separate one from the other. In fact you could ask any engineers you know about their childhood and you’ll get answers centred around the same theme. A childhood spent building things, tearing them down, figuring out how it all fit together, their plethora of tools never out of arm’s reach. Yes, I dare say an Engineer who isn’t crazy about tools really isn’t an Engineer at all. Yet, like

Continue Reading

A Day of Software and Internet Bugs!

My day started innocuously enough. I had to meet with different product teams to check if any of their past or current projects included specific cryptographic packages. This was required for one of various research initiatives at the company and I didn’t attach much importance to it at the time. Afterwards, I spent some sometime analysing the communication between one of our Android products and its back end servers using the Burp Proxy Suite. Deep house was playing on my

Continue Reading

The Thrill Of Software Security

Except you’ve been living on Saturn, you must have heard about certain software bugs that seem to threaten the very essence of the Internet, our digital air. They’ve got scary names too like heartbleed and shellshock (for the few who don’t know what they mean I’ll be touching on them in future posts). There’s hardly a dull moment in the world of software and information security. Ours is a continuous roller-coaster ride, an endless loop of security evangelism, bug hunts,

Continue Reading