Techincal Copywriting Samples
Artificial Intelligence vs. Computational Intelligence
Phillip Durst
Assured Information Security, April 15 2024
Suffice it to say, Artificial Intelligence (AI) is enjoying its moment in the sun. From science to games to art, AI has become present in nearly everything. But, what about AI’s oft-overlooked cousin, Computational Intelligence (CI)? The two terms are often used synonymously, which makes sense given that CI is considered a sub-field of AI. After all, the term CI was coined at the same time and same place as AI – the original Turing Test. However, AI and CI are quite different in form, function and application. This blog aims to shed some light on the AI vs. CI debate and how AIS is using CI to improve context-aware optimization.
Explainable Artificial Intelligence (XAI) Research
Phillip Durst
Assured Information Security, November 1 2023
When it comes to finding ways to leverage Artificial Intelligence and Machine Learning (AI/ML), analysts are frequently overwhelmed by choice. Often, finding the right ways to leverage AI/ML requires in-depth technical knowledge that is hard to come by. A significant challenge that faces the community and AI/ML practitioners is how to move these tools from development to the real world. The biggest hang-up is that AI/ML models are inherently a “black box”. The black box makes it hard for users and practitioners alike to explain what happens between input and output.
Functionize as a New User
Ghostwritten for Functionize’s blog, April 2021
It has been my privilege to work in machine learning and AI for over a decade as a robotics engineer. In that time, I have seen machine learning grow from basic image and language processing algorithms to powering fully-fledged software tools. Thus, I was intrigued to find AI being used to enhance software test automation. Here, I describe my experiences with using Functionize as a new user.
Talent Retention for Top Cybersecurity Talent
Phillip Durst
Cybrary, July 2 2020
The number of certified cybersecurity professionals is not growing to meet demands, as an estimated three and a half million cybersecurity positions will go unfilled by 2022. The lack of talent to hire is not the only threat companies face when staffing for cybersecurity. Retaining cybersecurity talent is a new challenge, and traditional retention strategies often do not work for cybersecurity employees. Cybersecurity is a unique and fast-paced field, and retaining talent presents unique challenges.
How to Do Shift Left Testing Right
Phillip Durst
Ghostwritten for Functionize’s blog, November 2020
“Shift Left” testing is one of the darling new keywords in software development. A quick bit of research will tell you that shifting left will solve all your testing problems. Which raises the question, what is shift left testing? More importantly, how is shift left testing properly leveraged for software development?
Shift left testing, also known as the shift left approach, simply means testing earlier in software development. For decades, software development followed the waterfall development cycle. Software development started from the left with collecting requirements, flowed left to right through design to coding, and ended far right by throwing in some quick testing just before release. As intuitively awful as this process strikes us today, waterfall development and traditional testing have clung to life for decades.
US Information Privacy
Cybrary Course, 2022
https://www.cybrary.it/course/us-information-privacy
Are you overwhelmed by the intricacies of U.S. information privacy and data security laws? Privacy and data security are critical in today’s digital world. Gain the insight you need to navigate the realm of information privacy in the U.S. public and private sectors by taking this U.S. Information Privacy course.
The Rise of Technology in the Growth Marketer’s World
Phillip Durst
Genus AI, 2022
The world of technology has changed dramatically in the last decade. As a result, the world of marketing has changed dramatically. These days the marketing world is on fire about “growth hacking.” Growth has become as much about retention as attraction. The idea is to not only attract customers but also provide an experience that keeps customers around for years to come.
Ten years ago, marketing for growth looked like firing a shotgun: blast as much media out there as possible and see where it hits. Mailers, sales, and bulk emails were all sent out into the world on a wing and prayer…
User Guides and Tutorials
Findings of the AVT-255: Unmanned Systems Mission Performance
NATO Techincal Report, October 2021
Unmanned Systems (UMS) play an increasingly vital role in NATO military operations and will form a large part of the fighting forces of the future. However, due to the rapidly advancing technologies used in UMS, very few standards exist in terms of how UMS performance is measured. This is particularly true in the case of autonomous performance. This lack of agreed-upon definitions and test methods has greatly hindered the use of UMS in full-scale NATO operations…
Long-form Content Samples
Creating a Competitive Research and Development Lab for AI and Machine Learning
Phillip Durst, 2022
The competitive edge of AI
Artificial intelligence and machine learning have the potential to take today’s businesses to the next level. Implemented correctly, AI has the capability to increase productivity, save time, and provide key insights into new revenue streams. The capabilities AI can bring to a company include…
Safeguarding Mobile Data with Samsung’s ‘Plug and Play’ Secure Element IC
Phillip Durst
Samsung Semiconductor, 2021
For better or worse, smartphones now rule our lives. They connect us 24/7 via text and social media, manage our finances, unlock our vehicles, turn on the lights, and even let the dog out when we’re not home. We trust our phones with access to almost every aspect of our lives and don’t ask questions.
The New PCI 4x4 PM9A3 Solid State Drive
Phillip Durst
Samsung Semiconductor, 2021
The success of a company depends on many factors. Arguably, one of the most important factors is the company’s ability to safely and effectively store data. No matter the product, data has to be collected and stored. Maybe it’s financial reports, or user login information, or a library of documents; no matter the format, data is at the heart of it all. Subsequently, businesses must find a way to store and access all these data.