Are You Sweeping Big Data Privacy Under the Carpet? 5 Things to Do Instead
Admit it: When you read or hear about big data privacy, you’re ready to move onto the next topic or swipe to the next screen. Or sweep it under the carpet. You know the discussion is important, but let’s be honest: it’s not exciting, it’s sometimes creepy, and it’s not easy to navigate its complexities. ... There’s no question that we all play multiple roles—i.e., that of a consumer, citizen, private sector employee and/or government worker—and that our time is limited, so what can we do? For starters, I suggested five options during my presentation. Here’s the Cliff Notes version:
Software Defined Networking - What's New?
This presentation will give a look at the Open Data Center Alliance rev 2.0 software defined networking (SDN) usage model that incorporates network function virtualization, and five new usage scenarios. SDN is no longer considered an emerging technology; the technology is proven, although it is still at an early stage in its life cycle. In comparison, NFV is at an earlier stage of development, but because the technology effectively complements SDN and is important to service providers, NFV is likely to be widely adopted across the industry. To improve evaluations and decision making, IT departments and cloud subscribers will require standard features and defined metrics.
Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
“Running expired antivirus software can give people the impression that it is still protecting them even if it hasn't downloaded updates in a while,” says Tim Wilson, director of cybersecurity and cloud strategy at Microsoft. “However, data from our latest report indicates that running expired antivirus software is nearly as unsafe as having no protection at all,” Wilson said in comments emailed to Dark Reading. The malware infection rates on Windows 8 clients with expired antivirus tools were almost as high as the infection rate in PCs with no protection at all, the Microsoft researchers discovered.
Global Banking and Big Data: The Challenge of Anti-Money-Laundering Compliance
A series of high-profile decisions by the U.S. Department of Justice against BNP Paribas, JP Morgan Chase, Barclays, and other large, global banks resulting in multi-billion-dollar fines has brought anti-money-laundering (AML) to the top of the financial services industry’s priority list. While the first wave of investment in big data tools and technology has heretofore been targeted at the identification and prevention of nefarious activities that lead to direct costs for banks, payment processors, and their customers, spending in the near term may likely be related to compliance with three key pieces of AML regulation
Top 10 tech conspiracy theories of all time
The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between. Here we take a look at the 10 most infamous conspiracies and conspiracy theories that have made the rounds in the world of high tech.
7 Trends That Can Define the Future of Cloud Computing
There are two big reasons that leaders across every industry are gung-ho about the Cloud. One reason for this huge confidence in Cloud computing is that it is one of the most disruptive technologies to have emerged on the scene in the last decade. The second and what I think is a far more critical reason is what the Cloud, its adoption and application promises for the future. It is when business owners “foresee the future” of the Cloud that they say to themselves, “Yes, this is the technology that I want to tie my business fortunes to”.
Microsoft's Answer To Death By Email: Meet Clutter
Clutter relies on Office Graph, a machine learning technology that maps the user's relationship with people, events, documents, projects, and other types of information. Office Graph allows Clutter to recognize that a user has ignored a co-worker's email about his new cat but read and responded to another colleague's message about an upcoming campaign, for example. Observations such as this help Clutter determine which messages to prioritize. From the user's perspective, Clutter operates something like Gmail's importance ranking, but in reverse; whereas Gmail partitions emails it deems "important" into a secondary folder instead of in the main feed, Clutter puts the important messages front and center, with less important content relegated to a "Clutter" folder.
Unlock Your Computer and Websites with a Glance
The Myris is a squat, palm-sized cylinder that connects to your PC with a USB cable. Its underside has a small mirror in the center with a small camera lens next to it. Any time you meet a login screen after the device has been set up, you hold up the Myris in front of your face so that both eyes are visible in its mirror. A few seconds later, a green ring lights up to signal that you’ve been recognized, and the device’s companion software will log you in without your having to touch a key. You can do that for websites, for desktop applications, or to log in to your user account on a computer.
Are Legacy Vendors Pulling OpenStack in the Wrong Direction?
Over the past couple of years, OpenStack has turned from a small skunkworks effort to build Amazon Web Services-like clouds but open source into a movement backed by some of the IT industry’s biggest legacy vendors. It’s not uncommon nowadays to hear that OpenStack has become the de facto standard for building cloud infrastructure. Such mainstream support, however, comes at a cost, threatening to detract from the project’s original goal. That’s according to Jim Morrisroe, CEO of Piston Cloud Computing, a San Francisco-based startup co-founded by Joshua McKenty (one of OpenStack’s founding fathers) that helps customers stand up OpenStack clouds of their own.
Introducing Essence#: A Smalltalk-based Language for .NET
The Essence# compiler generates DLR dynamic call site for each and every message send, regardless of the receiver. The compiler does not and cannot know the type of the object that is receiving a message, so it just emits a DLR CallSite for all message sends, and the CallSite for a message send is always an instance of the ESMessageSendBinder class. An ESMessageSendBinder figures out, at run time, how to implement the message send. That’s done one way in the case of native Essence# objects, done another way in the case of the CLR primitive types, done yet another way for any non-essence# objects that implement the IDynamicMetaObjectProvider interface
Quote for the day:
"You can, you should, and if you’re brave enough to start, you will." -- Stephen King
Admit it: When you read or hear about big data privacy, you’re ready to move onto the next topic or swipe to the next screen. Or sweep it under the carpet. You know the discussion is important, but let’s be honest: it’s not exciting, it’s sometimes creepy, and it’s not easy to navigate its complexities. ... There’s no question that we all play multiple roles—i.e., that of a consumer, citizen, private sector employee and/or government worker—and that our time is limited, so what can we do? For starters, I suggested five options during my presentation. Here’s the Cliff Notes version:
Software Defined Networking - What's New?
This presentation will give a look at the Open Data Center Alliance rev 2.0 software defined networking (SDN) usage model that incorporates network function virtualization, and five new usage scenarios. SDN is no longer considered an emerging technology; the technology is proven, although it is still at an early stage in its life cycle. In comparison, NFV is at an earlier stage of development, but because the technology effectively complements SDN and is important to service providers, NFV is likely to be widely adopted across the industry. To improve evaluations and decision making, IT departments and cloud subscribers will require standard features and defined metrics.
Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
“Running expired antivirus software can give people the impression that it is still protecting them even if it hasn't downloaded updates in a while,” says Tim Wilson, director of cybersecurity and cloud strategy at Microsoft. “However, data from our latest report indicates that running expired antivirus software is nearly as unsafe as having no protection at all,” Wilson said in comments emailed to Dark Reading. The malware infection rates on Windows 8 clients with expired antivirus tools were almost as high as the infection rate in PCs with no protection at all, the Microsoft researchers discovered.
Global Banking and Big Data: The Challenge of Anti-Money-Laundering Compliance
A series of high-profile decisions by the U.S. Department of Justice against BNP Paribas, JP Morgan Chase, Barclays, and other large, global banks resulting in multi-billion-dollar fines has brought anti-money-laundering (AML) to the top of the financial services industry’s priority list. While the first wave of investment in big data tools and technology has heretofore been targeted at the identification and prevention of nefarious activities that lead to direct costs for banks, payment processors, and their customers, spending in the near term may likely be related to compliance with three key pieces of AML regulation
Top 10 tech conspiracy theories of all time
The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between. Here we take a look at the 10 most infamous conspiracies and conspiracy theories that have made the rounds in the world of high tech.
7 Trends That Can Define the Future of Cloud Computing
There are two big reasons that leaders across every industry are gung-ho about the Cloud. One reason for this huge confidence in Cloud computing is that it is one of the most disruptive technologies to have emerged on the scene in the last decade. The second and what I think is a far more critical reason is what the Cloud, its adoption and application promises for the future. It is when business owners “foresee the future” of the Cloud that they say to themselves, “Yes, this is the technology that I want to tie my business fortunes to”.
Microsoft's Answer To Death By Email: Meet Clutter
Clutter relies on Office Graph, a machine learning technology that maps the user's relationship with people, events, documents, projects, and other types of information. Office Graph allows Clutter to recognize that a user has ignored a co-worker's email about his new cat but read and responded to another colleague's message about an upcoming campaign, for example. Observations such as this help Clutter determine which messages to prioritize. From the user's perspective, Clutter operates something like Gmail's importance ranking, but in reverse; whereas Gmail partitions emails it deems "important" into a secondary folder instead of in the main feed, Clutter puts the important messages front and center, with less important content relegated to a "Clutter" folder.
Unlock Your Computer and Websites with a Glance
The Myris is a squat, palm-sized cylinder that connects to your PC with a USB cable. Its underside has a small mirror in the center with a small camera lens next to it. Any time you meet a login screen after the device has been set up, you hold up the Myris in front of your face so that both eyes are visible in its mirror. A few seconds later, a green ring lights up to signal that you’ve been recognized, and the device’s companion software will log you in without your having to touch a key. You can do that for websites, for desktop applications, or to log in to your user account on a computer.
Are Legacy Vendors Pulling OpenStack in the Wrong Direction?
Over the past couple of years, OpenStack has turned from a small skunkworks effort to build Amazon Web Services-like clouds but open source into a movement backed by some of the IT industry’s biggest legacy vendors. It’s not uncommon nowadays to hear that OpenStack has become the de facto standard for building cloud infrastructure. Such mainstream support, however, comes at a cost, threatening to detract from the project’s original goal. That’s according to Jim Morrisroe, CEO of Piston Cloud Computing, a San Francisco-based startup co-founded by Joshua McKenty (one of OpenStack’s founding fathers) that helps customers stand up OpenStack clouds of their own.
Introducing Essence#: A Smalltalk-based Language for .NET
The Essence# compiler generates DLR dynamic call site for each and every message send, regardless of the receiver. The compiler does not and cannot know the type of the object that is receiving a message, so it just emits a DLR CallSite for all message sends, and the CallSite for a message send is always an instance of the ESMessageSendBinder class. An ESMessageSendBinder figures out, at run time, how to implement the message send. That’s done one way in the case of native Essence# objects, done another way in the case of the CLR primitive types, done yet another way for any non-essence# objects that implement the IDynamicMetaObjectProvider interface
Quote for the day:
"You can, you should, and if you’re brave enough to start, you will." -- Stephen King
No comments:
Post a Comment