PinnedBee DavisArtificial Intelligence That Can Coordinate Care for Victims of Domestic ViolenceHow and why the JAEL.AI chatbot will assist people looking for help while trying to escape violent situationsApr 14, 20171Apr 14, 20171
PinnedBee DavisAn Uber ride killed my brother, I am fixing it with Data ScienceAlmost two years ago missing safety features in the Uber App contributed to the death of my brother. I am a technical product manager and a…Oct 12, 201730Oct 12, 201730
Bee DavisFrom NASA Engineer to Sex Worker ( forced censored version )Note to the reader: Medium has censored my attempt to expose screenshots of the abusive messages from a person who is actively trying to…Mar 81Mar 81
Bee DavisCountering Vulture: ‘Renaissance’ Through Black Trans EyesExploring the profound impact of Beyoncé’s ‘Renaissance’ on the Black trans queer community beyond critiqueDec 6, 2023Dec 6, 2023
Bee DavisBasic Misconceptions of Security In Privacy by Design (PbD) and Privacy Enhancing Technologies…Privacy by Design (PbD) and Privacy Enhancing Technologies (PETS) as a practice seems to be very focused on the creation of security…Jul 7, 2020Jul 7, 2020
Bee DavisEnforcing Stringent Government Policies to Tackle Global Cyber Security ChallengesSophisticated cyber-attacks and data breaches are external security attacks in the attempt to either disrupt a computer system or get hold…Jul 7, 2020Jul 7, 2020
Bee Davis3 Practical Tips To Resolve Known Threats In An OrganizationOne of the most common hindrances of the war against cyberattacks in most organizations is the unwillingness of the management to release…Jul 5, 2020Jul 5, 2020
Bee DavisHow To Set Up A Live Technology Definition Database (LTDD)In 2019 DEFCON, U.S. Representative, Ted Lieu (D-CA), said that the United States is not ready for a severe cyberattack. This was a strong…Jul 5, 2020Jul 5, 2020