ISE Blog

What we have to say, what you want us to hear.

That’s how our blog works. It’s interactive. Let’s learn together.

Key Takeaways from KDD 2017

Aug 31, 2017 | by Tawni Burger, Software Engineer | Tags: Big Data

Two weeks ago I was in Halifax, Nova Scotia attending the 23rd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2017). KDD is one of the largest and most respectable conferences in the data science community. It offers a wealth of knowledge on the latest research in data science, data mining, big data, and predictive analytics. Researchers and professionals come together to learn and discuss novel ideas and technologies to solve challenging problems. My areas of interest lied in time series analysis, IoT streaming, and big data. So here are a few of the interesting things I learned in those areas.


Continuous Integration Applied to Infrastructure

Aug 24, 2017 | by Samuel Thurston, Software Engineer | Tags: Cloud

From a business perspective, cloud migrations are driven largely by a desire for flexibility and resilience. When we move systems to the cloud, we expect them to be both more adaptable and more reliable than on-premise solutions. These two objectives are somewhat competitive, however. The Jenga tower is most likely to fall when you are moving a piece. Adding flexibility naturally introduces change which puts stability at risk. (photo credit:


Meet Our Team: Abhijeet Kher

Aug 17, 2017 | by Daniela Williams, Project Manager | Tags: Meet Our Team

Welcome back to the Meet Our Team Q&A series. My name is Daniela Williams, Project Manager at ISE, and I’ll be asking ISE team members questions to help give insight into what makes us tick.


Fishing for IoT Vulnerabilities

Aug 15, 2017 | by Hudson Ludvigson, Senior Software Engineer | Tags: Internet of Things

This month provides me the opportunity to share several examples of recent IoT hacks, and demonstrate how one can introduce risks when adding smart devices to a network.  Leveraging this survey of happenings in IoT security breaches, it serves as a reminder to the importance of security as IoT evolves. As we’ve talked about in recent posts, MQTT is one example of a standard that is evolving to help address some security concerns in the IoT space.  However, as we’ll see in at least one example, if users of IoT devices are not willing to care about security themselves, no amount of fancy protocols will solve your all your problems. Without further delay, let’s read through some of the more interesting recent IoT hacks.