March 16, 2013

Hackers can cause traffic jams by manipulating real-time traffic data, researcher says
If, for example, an attacker drives a route and collects the data packets sent to Google, the hacker can replay them later with a modified cookie, platform key and time stamps, Jeske explained in his research paper. The attack can be intensified by sending several delayed transmissions with different cookies and platform keys, simulating multiple cars, Jeske added.


4 key takeaways from Samsung's Galaxy S4
Samsung took the wraps off the Galaxy S4 last night, giving the world its first peek at the device in what can only be described as an odd theatrical circus. ... No matter how you look at it, though, the Galaxy S4 is a significant new phone -- and there's a lot to digest about it. But don't get overwhelmed: Beyond all the marketing glitz, these four takeaways will tell you everything you really need to know.


Locating the Health Care Value in RTLS
Location systems can automatically document intervals of time:-when a patient was put in a waiting room, how long until the triage nurse visited, when the patient was moved to radiology or an inpatient bed. "We do all that tracking behind the scenes," Deady says. If a milestone isn't completed or is taking longer than usual, it's tracked both retrospectively, to help fix chronic workflow problems, and in real time, so that staff can intervene for the patient.


How to Redefine Architecture for Real-Time Data
We’ve been using the term for years to talk about a wide range of things, from embedded C to extreme, low-latency analytics, but all of these miss what the business is really after — the ability to use more information more quickly to take rapid action in response to unanticipated changes in their environment. Companies like Barclays Wealth Management, Sears and USAA are redefining their architecture with new tricks ...


Introducing IT chargeback to meter private cloud use
The downside of the all-you-can-eat approach is that while a few entities will make out well -- namely the primary users of the private cloud services -- the cost moves to entities that may have very little use for the private cloud, but are billed for it nonetheless. Kind of like gym memberships after everyone has given up on their New Year's resolutions.


Catch 22: To avoid IT, end-users need IT's help
"To a large extent, leveraging the true power of an Enterprise API today in the form of an app for a mobile device requires the skills of a developer. Not many of the end-users that are able to create MS Access databases for their own purposes have the required skills to code HTML5, Xcode or Java and are not familiar with how to interpret a JSON payload."


Former Tribune staffer accused of conspiring in Anonymous hack
Matthew Keys, who according to his LinkedIn and Twitter profiles is deputy social media editor at Thomson Reuters, has been charged with one count each of conspiracy to transmit information, transmitting information and attempting to transmit information to damage a protected computer, according to a federal indictment filed Thursday in the U.S. District Court for the Eastern District of California.


Big Data Analytics and Data Science at Netflix (Video)
Chris Pouliot, the Director of Analytics and Algorithms at Netflix: “…my team does not only personalizations for movies, but we also deal with content demand prediction. Helping our buyer down in Beverly Hills figure out how much do we pay for a piece of content. The personalization recommendations for helping users find good movies and TV shows. ...


Cisco: Cloud Is A Fundamental Shift In Way IT Is Delivered
“There is no doubt, the cloud has come of age,” notes Sam Barnett, directing analyst for data center and cloud at Infonetics Research. “While investments in cloud outsourcing are small in comparison to internal IT/data center spending, they are growing each year, with the number of enterprise organizations turning to cloud technology to manage budgets and transform service delivery increasing significantly in the last two years.”


Data Visualization and BI Tools Selection
Data Visualization plays a very significant role in the world of Business Intelligence (BI). By efficiently identifying trends and patterns, Data Visualization helps the user quickly understand and relate to the data, without having to painstakingly sift through it. However, there are many factors to consider when evaluating a BI tool in this regard.



Quote for the day:

"The journey of a thousand miles must begin with a single step." -- Lao Tzu