Sign up | Login with →
exclusive

Warning! When Big Data Turns Bad

November 18, 2014 by Bernard Marr

As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]

China's "Great Firewall" Targets Cloud Services

November 19, 2014 by Natalie Lehrer

A plethora of websites including a popular content distribution network is currently inaccessible inside of China. GreatFire.org reports that EdgeCast's Content Delivery Network has been blocked from China for the past day. EdgeCast officially recognized the Chinese ban by releasing a statement on its website.[read more]

exclusive

Protecting Your Business from Shellshock

November 19, 2014 by Rick Delgado

Shellshock

Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]

iBeacons, Retail and Information Overload: How Macy's Is Kickstarting Retail's Data Warehousing Needs

November 19, 2014 by Tracey Wallace

Macy's

Macy’s is using iBeacon technology in combination with Shopkick, a location-based coupon dispenser app used by top national retailers, to finally capitalize on what those in the big data and Internet of Things industries have said was long coming: an offline data-driven retail experience.[read more]

exclusive

Spotlight on Traitify: Who The Hell Are You, Anyway?

November 18, 2014 by Shawn Gordon

Traitify

DataWeek/API World this past September earned my ink as an overall exceptional conference, and as a spotlight on big data company SiSense. I did not, however, cover any of the API companies in attendance, other than a brief mention. But one I found super interesting and compelling is Traitify.[read more]

Self-Healing Virtual Machines Coming to Datacenter Near You?

November 18, 2014 by Natalie Lehrer

One of the more exciting inventions in data center technology has been developed by a team of computer scientists from the University of Utah. The invention is being called A3 which is short for Advanced Adaptive Applications. When unusual activity is detected, A3 tries to automatically repair the code infraction.[read more]

Will Obama Be the Last Open Data President?

November 17, 2014 by Joshua New

President Barack Obama

Barack Obama has taken a series of executive actions to further the ideal of open government through data, and there is still much to be done. It remains to be seen if the progress made over the past few years will continue in future administrations, or if President Obama will be the last open data president.[read more]

exclusive

6 Experts Explain How IT Infrastructure Matters to Your Organization's Data Sets

November 17, 2014 by Aaron Aders

A new interactive infographic by IBM features insights from six industry experts and shows how putting big data to use isn’t just a matter of using the right analytics, but having the right infrastructure in place to accommodate the scale of data being gathered.[read more]

3 Ways to Adapt to the Shift Toward Online Privacy (Ethically, Nonetheless)

November 17, 2014 by Rishi Shah

Online privacy / shutterstock

The push toward online privacy continues to gain momentum. Those of us in the industry need to be prepared as the transition occurs so that we have strong business practices in place, understand how data collected today is different from data collected yesterday, and figure out real value exchanges.[read more]

exclusive

What Every Business Owner Needs to Know About Data Sovereignty

November 16, 2014 by Ajay Patel

Protecting your data

Lately data protection has become the number one concern for business owners. However, if you want full data protection, you should understand what’s behind data sovereignty. From knowing up-to-date laws and regulations to understanding cloud technology, you can ensure data privacy for your business and your customers.[read more]

Police Body Cams to Use Government Cloud to Store Data

November 15, 2014 by Natalie Lehrer

Police body cams

Vievu, an innovator of police body cams, has announced that they have plans to begin selling cloud connected body cams that is fully compliant with government cloud regulations. The cloud body cams allow police officers to avoid the hassle of dealing with traditional storage means.[read more]

Miss the Right Connections at Your Own Peril

November 14, 2014 by Bill Franks

connection analytics / shutterstock

Part of what makes the analysis of connections so powerful is that while virtually every metric typically used for analysis focuses only on facts about each individual entity, the analysis of connections makes it possible to also understand each entity’s relationships to others[read more]

Meeting the Business Technology Needs of Midsized Companies

November 14, 2014 by Julie Hunt

Current technology trends are important for all organizations. Most midsized companies have these technologies at the top of their lists: Mobile, Analytics, Cloud, and Security. And each year many midsized organizations dedicate more budget for technology as a strategic investment, as Deloitte noted in a recent study.[read more]

exclusive

IT MPG: Measuring the Value of IT Is Simple Math

November 14, 2014 by Bob Dvorak

Nearly 65 percent of U.S. organizations reported an increase in IT budgets in 2014, according to the annual SIM IT Trends Study, with the average percentage of revenue allocated to IT this year at more than five percent. But what exactly do we get for all that money?[read more]

exclusive

Are You Sweeping Big Data Privacy Under the Carpet? 5 Things to Do Instead

November 13, 2014 by Tamara Dull

Admit it: When you read or hear about big data privacy, you’re ready to move onto the next topic or swipe to the next screen. Or sweep it under the carpet. You know the discussion is important, but let’s be honest: it’s not exciting, it’s sometimes creepy, and it’s not easy to navigate its complexities.[read more]

Social Business and Digital Strategy

November 13, 2014 by Michael Fauscette

digital transformation

Social business, collaboration, community and content: is there real business value tucked away in those words? Are businesses really feeling the pressure to do some things differently, and by changing can they be more competitive, grow faster and be more successful?[read more]

It's Time to Get Serious About Using Sensitive Data to Save Lives

November 13, 2014 by Joshua New

unlocking sensitive data / shutterstock

The use of sensitive data to address healthcare needs has a demonstrated history of being effective and necessary, and going forward, researchers and others working on healthcare issues should be encouraged to further embrace the use of sensitive data to save lives.[read more]