October 10, 2015

California digital privacy laws boosted, protecting consumers

The new laws will prevent state and local law enforcement from snooping on emails without a warrant and alert the public when they use high-tech surveillance to tap into cellphone calls. The laws also prohibit paparazzi from flying drones over private property and make sure TV manufacturers warn viewers that voice commands may be recorded -- but stop companies from using the information to target ads. ... "It's a very exciting day for privacy in California," said Nicole Ozer, technology and civil liberties policy director for the American Civil Liberties Union of California. "Everybody is using technology is so many diverse ways. But electronic privacy law in the state and federal level have not been updated in decades.''


How Big Data Analytics Is Shining a Light on Anonymous Web Traffic

The key to greater understanding of these data-poor personas lies in the clickstream data that follows everybody on the Internet. Whether you like it or not, there’s certain amount of data that you drag around to each subsequent website you visit, including what kind of Web browser, device, and plug-ins you’re using; you’re IP address and geographical location; your time zone and language preference; and what website you came from. The owner of any particular website knows even more about you, including what website pages you view, what you search for, and how long you stay on each page. This data is a rich source of information that allows website operators to build models of website visitors who don’t otherwise say much about themselves.


Analyzing the Internet of Things

To date, a lot of effort has been put into creating sensors, deploying them, and generating masses of data. However, lagging behind that effort is the analysis of the data. As with any data, no value is driven without analysis and action. It would have been better if more thought was given to how to utilize the data generated prior to creating sensors that stream it out. Given that we are where we are, the best path forward is to begin to aggressively analyze the data of the IoT. This is what I, and others, have begun to call the Analytics of Things (AoT). The value of the AoT is already proven in a wide variety of settings. These examples are still from early adopters and often initial prototypes. However, this type of analysis will be ubiquitous very soon.


Top 10 Technology Trends Signal the Digital Mesh

We sit at the center of an expanding set of devices, other people, information and services that are fluidly and dynamically interconnected. This “digital mesh” surrounds the individual and new, continuous and ambient experiences will emerge to exploit it. In his session revealing Gartner’s Top 10 Strategic Technology Trends at Gartner/Symposium ITxpo 2015 in Orlando, David Cearley, vice president and Gartner Fellow, shared three categories for this year’s trends: the digital mesh, smart machines, and the new IT reality. ... Recent advances make it possible to mix multiple materials together with traditional 3D printing in one build.


Strategic Planning – Ideas to Delivery

DevOps is a term that has been around since the end of the last decade, originating from the Agile development movement and is a fusion of “development” and “operations”. In more practical terms it integrates developers and operations teams in order to improve collaboration and productivity by automating infrastructure, workflows and continuously measuring application performance. The drivers behind the approach are the competing needs to incorporate new products into production whilst maintaining 99.9% uptime to customers in an agile manner. To understand further the increase in complexity we need to look at how new features and functions need to be applied to our delivery of software. The world of mobile apps, middleware and cloud deployment has reduced release cycles to weeks not months with an emphasis on delivering incremental change.


Samsung wants to help IoT speak a common language

At the highest level, SAMI provides an abstraction layer for ingesting device data, processing, storing, routing, and accessing it through very developer-friendly APIs. SAMI deals with everything from data security, to real-time data, to transformations, aggregations, storage, user management, device management, and much more. SAMI also handles crucial aspects around security and privacy, which are mission critical in IoT cloud services. By developing on top of a platform that allows easy and secure access to any kind of data, from any kind of device, and interconnects with other device platforms, IoT developers using SAMI can focus on building their added value to the ecosystem.


How IoT Is poised to drive higher efficiencies for Telecom

Integration of disparate systems will take IoT deployments to a completely different level and we are already seeing that happening. As an example, IoT solutions integrated with procurement systems can ensure that network assets giving trouble or nearing end of life can be procured and replaced before they eventually shut down and impact customer operations. Customers can be informed of potential downtimes well in advance or a real-time basis, thereby helping them take timely decisions on routing traffic through alternative paths/operators. IoT solutions, as I mentioned earlier, give us the ability to know what’s happening on a real-time basis and more importantly, enable us to take decisions on a real-time basis as well.


Taming today's cyberthreat landscape: A CIO checklist

One of the few things the "experts" seem to agree upon is that cybercrime is a clear and present danger to our national security. These issues have gone way beyond the province of esoteric IT journals and cultish science fiction novels -- they have invaded our daily collective consciousness and well-being as individuals, as families, as companies, as governments, as a society and as a culture at large. Many opine at great length on how the cyber landscape has become the new battleground upon which future wars will be fought: Nations will rise and fall based upon their techno-prowess to aggressively attack and defend against the new breed of cybercriminals.


15 female founders building killer tech companies

There are a lot of lists of amazing, inspirational female founders totally crushing it around the web, but they all seem to feature the same people. We know from talking to amazing female founders and working with some awesome female-led customers, that there are so many other women out there building incredible tech companies that will change the world. These women not only deserve the spotlight for all of their hard work, but provide an excellent source of inspiration and tactical advice for anyone trying to build a business. Here are 15 female founders you might not have heard of building killer tech companies.


The Challenges in Handling 1 Billion Resident Business Objects

The term “Big Data” is nothing new. It describes huge volumes in principle; whether on disk, networks or anywhere else. Big Memory facilitates Big Data activities by doing more processing on the server or tight cluster of servers, still keeping stuff in RAM. The Big Memory approach is also conducive to real-time querying/aggregation/analytics. Think map/reduce in real-time, a kind of Hadoop that does not need to “start” and wait until done, rather “real-time Hadoop” that keeps working on data in RAM. Big Memory comes in different forms, primarily: heaps and composite data structures. Just like in any “regular” programming language, all complex/composite data structures like lists, trees, dictionaries, sets etc. are built around the heap primitives like: alloc/read/write/free.



Quote for the day:

"Celebrate what you want to see more of." -- Tom Peters