April 15, 2015

GoodData analytics developers on what they look for in a big data platform
Far and away, the most exciting is about real-time personalized analytics. This allows GoodData to show a new kind of BI in the cloud. ... It's for telling you about what’s going on in your electric smart meter, that FitBit that you're wearing on your wrist, or even your cell-phone plan or personal finances. A few years ago, Vertica was blazing fast, telling you what a million people are doing right now and looking for patterns in the data, but it wasn’t as fast in telling you about my data. So we've changed that. With this new feature, Live Aggregate Projections, you can actually get blazing fast analytics on discrete data. That discrete data is data about one individual or one device. It could be that a cell phone company wants to do analytics on one particular cell phone tower or one meter.


Security risk potential linked to young, mobile users
The public sector was the least likely to report lost or stolen data, although that does not mean the public sector is not losing data. Attitudes were also lax among people working in high-tech industries, who were more likely than average to give up their device password if asked for it by IT, and in education, where teachers revealed a tendency to write their passwords down on a piece of paper. ... “Corporations have thought about security historically as very much a perimeter solution and put a big firewall at the gateway,” he said. “We’ve been eroding that for a good 10 years as information becomes more fluid, but we have not yet moved away from the idea that security sits only at the perimeter of the network.”


4 data wrangling tasks in R for advanced beginners
With great power comes not only great responsibility, but often great complexity -- and that sure can be the case with R. The open-source R Project for Statistical Computing offers immense capabilities to investigate, manipulate and analyze data. But because of its sometimes complicated syntax, beginners may find it challenging to improve their skills after learning some basics. If you're not even at the stage where you feel comfortable doing rudimentary tasks in R, we recommend you head right over to Computerworld's Beginner's Guide to R. But if you've got some basics down and want to take another step in your R skills development -- or just want to see how to do one of these four tasks in R -- please read on.


Report: Internet of Evil Things is your next nightmare
"Virtually every organization has some sort of rogue wireless access point or printer," Paget said. Worst of all, many companies don't know what devices are on their networks because employees can easily go out and buy them and install them themselves -- or bring them from home as part of corporate Bring Your Own Device programs. Employee-owned devices are a particular concern, Paget added, because there are limits to what a company can do to secure them. Overall, he said, when scanning corporate systems, Pwnie discovered that companies typically had two to three times more devices than they thought they did.


Intel & Ingenico Announce Secure Payment Agreement for the Internet of Things
“This is a great example of how innovation can simplify the purchasing experience and further enhance the merchant-consumer relationship. Bringing secure payment into connected devices will root our payment acceptance expertise in the Internet of Things.” “The shift in liability this October will be a major milestone in the United States for banks and credit card companies, but especially for retailers,” said Doug Davis, senior vice president and general manager, Internet of Things Group, Intel. “Intel and Ingenico Group are working to bridge the retail experience and security gap while also making sure devices are easy to deploy and manage so we don’t create new burdens for the merchants.”


Navigating An Internet of Things Legal Minefield
This article explores how big data and the rights of data subjects can coexist. With the help of Amor Esteban, an attorney who helps companies navigate these murky and often dangerous waters, we explore the balance that may be struck between a company’s legitimate business interests and respect for the individual’s right to data privacy. ... He currently chairs that group and is editor in chief of its The Sedona Conference International Principles on Discovery, Disclosure & Data Protection: Best Practices, Recommendations & Principles for Addressing the Preservation & Discovery of Protected Data in U.S. Litigation. Together we will delve a little deeper into the development of IoT, the role of analytics in a complex IoT environment and what companies should be considering before embarking on a project.


A 21st Century Way of Life: From 20th Century Work-Life Balance to Lifeworking
The reason that organizations have been slow to truly rethink the concept of work-life is due more to cultural inertia than any other factor. The industrial-age assumptions about technology, organization and processes have become deeply ingrained within society, and have been reinforced through general and business education and the media. In most organizations these deeply entrenched assumptions have become orthodoxy, and this is why the question of work-life balance remains. Some enlightened organizations have made progress in some areas, especially with regard to virtual working and flexible working time, but in most cases these initiatives only patch the much deeper underlying problems


Nearly 1 million new malware threats released every day
Directed attacks and data breaches also grew, according to Symantec. Five out of six large companies were targeted by cybercriminals, a 40% rise on the previous year. The mining industry was the world's most targeted sector. Samir Kapuria, a Symantec executive, recalled one case in which hackers snuck into an energy company's computer network and stole a draft report. The report detailed the secret discovery of a potentially lucrative energy drilling spot. Hackers were trying to sell the information on a black market website to stock traders, Kapuria said. But they were foiled when the energy company (operating under a pseudonym) told prospective black market buyers that the information was false. Kapuria declined to mention the name of the company.


Data breaches may cost less than the security to prevent them
In a March 2015 column on The Conversation, Dean provided a hard to disagree with defense of why things security-wise "ain't gonna change" soon. "When we examine the evidence, though, the actual expenses from the recent breaches at Sony, Target and Home Depot amount to less than 1% of each company's annual revenues," wrote Dean. "After reimbursement from insurance and minus tax deductions, the losses are even less." Dean then administered the knockout punch: "This indicates that the financial incentives for companies to invest in greater information security are low and suggests that government intervention might be needed."


The Hybrid IT Enterprise Demands an End to Network Guessing Games
As visibility, control, and optimization are brought to hybrid networks it will become increasingly important to construct an analytics-driven infrastructure that can take action when problems occur anywhere in the network. We’re already seeing more IT organizations instrumenting network architectures with predictive analytics to create self-correcting, self-generating networks that respond to business needs and intents. Well-instrumented infrastructures provide the foundation for introducing automation. Such automation helps infrastructures react to changing demands without requiring manual intervention. Visibility tools can help to discover and map dependencies in application workloads, a necessary element for true workload portability.



Quote for the day:

"Courage is to never let your actions be influenced by your fears." -- Arthur Koestler