September 29, 2013

Steve Jobs Left a Legacy on Personalized Medicine
It turns out that Jobs was one of the first people—and certainly the best-known—to try this kind of all-in genetic strategy to beat cancer. As recounted in Walter Isaacson’s biography of the Apple CEO, Jobs spent $100,000 to learn the DNA sequence of his genome and that of the tumors killing him. Jobs was jumping between treatments and hoped DNA would provide clues about where to turn next.

Strategies for Information Governance
Information Governance is a combination of business practices, technology and human capital for meeting the compliance, legal, regulatory, security requirements, and organizational goals of an entity. Information governance provides a means to protect, access, and otherwise manage data and transform it into useful information.

The First Carbon Nanotube Computer
For the first time, researchers have built a computer whose central processor is based entirely on carbon nanotubes, a form of carbon with remarkable material and electronic properties. The computer is slow and simple, but its creators, a group of Stanford University engineers, say it shows that carbon nanotube electronics are a viable potential replacement for silicon when it reaches its limits in ever-smaller electronic circuits.

Privacy and Security by Design: An Enterprise Architecture Approach
The new paper explores the strong synergy that exists between the related disciplines of privacy and security. Privacy seeks to respect and protect personally identifiable information by empowering individuals to maintain control over its collection, use and disclosure. Information security seeks to enable and protect activities and the assets of both people and enterprises. While on the one hand, strong security is essential to meet the objectives of privacy, on the other hand, well-known privacy principles are valuable in guiding the implementation of security systems.

Data Integration: From Dark Art to Enterprise Architecture
There’s a renewed push across the industry to elevate data integration from being a series of one-off projects shrouded in mystery to the core of a multidisciplinary, enterprise architecture—incorporating new and existing approaches such as master data management, data virtualization, and data integration automation. By introducing enterprise architectural sensibilities to data integration, it can be turned into a process for innovation and delivery of productive change for organizations.

Layered Application Design Pattern
In critical application development, the most important thing is project architecture or project framework which comprises of various modules involved in request processing or business handling.  If the framework is clear and robust, and completely designed with proper planning then its very easy to do the code and develop the particular requirement for business. For any application if a developer knows the project framework/architecture then 50% work is done after that we need to focus on functionality only and need not to worry about the inter connected business component involved in the project.

10 Things to Know Before Moving E-Discovery to the Cloud
Cloud computing is attractive because it enables users to do more with less; however, with this great power comes great responsibility and risk. This risk comes in the form of legal, security, business continuity and compliance issues. When e-discovery is involved, the risk considerations become increasingly complex. If your organization is considering moving data to the cloud, or transitioning e-discovery systems to the cloud, follow this checklist of the top 10 things to consider before taking the leap.

Tokenization for De-Identifying APIs
Once the PII has been identified, the data can be de-identified using tokenization or encryption (including format-preserving encryption). Or the data can be anonymized completely via redaction. This policy can be generalized to proxy several APIs and replace any PII that passes through. This works particularly well for credit card or social security numbers, both of which follow a very well-defined and relatively unique pattern.

Developing a Legal Risk Model for Big Volumes of Unstructured Data
Unfortunately, mass-deleting information carries cost as well, including the loss of data that might be important to the business, and the risk of deleting information required for regulatory compliance. But perhaps the biggest cost of unidentified data comes when a company must pay to categorize data as part of a legal electronic discovery process. Opposing attorneys can—and will—force companies to produce every piece of data that might be relevant to the case.

An Enterprise Security Program and Architecture to Support Business Drivers
An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. The business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than an obstacle to be avoided.

Quote for the day:

“To be yourself in a world that is constantly trying to make u something else is the greatest accomplishment.” -- Emerson

No comments:

Post a Comment