Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]
At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]
In today’s data economy, we’re sharing a ton of personal information about ourselves online. And this privacy discussion is only going to get bigger, especially as companies and government agencies get better at collecting, analyzing, and sometimes selling the data we’re freely sharing with them. Trust is at the heart of the privacy issue and is the glue that will keep the data ecosystem together.[read more]
The BYOD trend presents its own concerns when it comes to protecting confidential workplace data. As the trend continues to gain steam, CIOs and IT departments are faced with a whole different set of variables due to the variety of devices and the relative level of security that comes with each device. The push to be able to your own mobile device to work is also a push to house personal information and apps alongside company data. It can be a risky endeavor.[read more]
As shown in the recent Oscar-winning documentary Citizenfour, people were up in arms about the NSA tapping people’s phone calls under the pretense of protecting the freedom of American citizens. Whistleblower Edward Snowden’s primary mission was to point out that personal information was unethically being handed over to the government without the permission of millions of U.S. citizens. But what about when you do give permission?[read more]
In this big data world in which we live, we are being forced to address privacy issues - whether we want to or not – as consumers, citizens, and employees in the private and public sectors. Let’s get our facts straight about big data privacy and help others do the same.[read more]
To put a nice bow on this year’s big data discussion, I’d like to share some of my favorite content from 2014 from around the web. It wasn’t easy, but I narrowed the list down to 7 items, including articles, a comic book, a white paper, an infographic, and a video. Check out the list and see what you think.[read more]
What is the relationship between big data and the Internet of Things? There is clearly a relationship between big data and IoT. The Mauritius conference helps confirm that. In fact, I would propose that big data is a subset of the IoT discussion.[read more]
Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]
Today’s cybercriminals are inventive. They’re creative and find an increasing number of ways to access and exploit personal and professional information. Criminals aren’t respectful of the work-life balance. If we use our personal computer at work, and then bring it home for personal use, our work information on the device is still up for grabs.[read more]
Cloud has matured from a fringe technology into being the preferred delivery model for those who want to deliver IT resources but stay within the bounds of laws such as HIPAA. At the end of 2013, Frost & Sullivan estimated that the cloud services market for healthcare IT stood at $903.1 million.[read more]
Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]
As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]
The moderated business community for business intelligence, predictive analytics, and data professionals.
|How do you innovate effectively and maintain a competive edge?|
Learn how in our exlcusive ebook, "Bad Data Need Not Apply: Designing the Modern Data Warehouse Environment."