You know how sometimes, when an app requires you to sign in, it will give you the option of signing in via Facebook, or Google mail? And you think, ‘Wow, this is nice of them to make it so convenient for me. I’ll have to send Facebook a card or something to thank them.’ (Well, … continue reading
Apple released its latest report showing that most of U.S. requests to access customer data by the government and private parties have to do with stolen device and fraud investigations. The report also outlined similar requests its receives worldwide. The data shows that Germany made the most requests at 12,343 and Apple provided data for … continue reading
It’s oh-so-trendy to beat up on Facebook, but there is good reason. The platform collects an enormous amount of data on each of its users, but does not let you control what it collects; nor does it give you any visibility into how it is being used. Your choices are to be on the platform … continue reading
Last week Facebook revealed it was entering into the cryptocurrency space with the announcement of its global concurrency Libra. The word Libra is most commonly associated with the zodiac sign meaning balance and harmony. It is interesting Facebook chose this name because of all the different intricacies involved such as blockchain and privacy. Technology often … continue reading
Google has announced the open-source availability of its Private Join and Compute project. Private Join and Compute is a type of secure multi-party computation designed to help organizations work with confidential data sets. The project is a part of the company’s mission to help organizations do more with data while keeping users’ data as safe … continue reading
MongoDB is looking to expand itself beyond databases and transform into a data platform company. The company made a number of data-focused announcements as well as serverless and security features at its MongoDB World conference this week in New York. MongoDB announced beta versions of Atlas Data Lake, Atlas Full-Text Search and the general availability … continue reading
As businesses increasingly move their operations to the cloud, they’re recognizing the potential to harness the almost limitless compute power available and tap into artificial intelligence and machine learning technologies to deliver insights and value to the business that were previously beyond their reach. Businesses have never been in a better position to create value … continue reading
When IBM CEO Ginni Rometty joined Red Hat CEO Jim Whitehurst on stage at last month’s Red Hat Summit to declare that IBM would leave Red Hat alone after its acquisition, cheers went up from the developers in the keynote audience. Their fear, of course, was that IBM would somehow change Red Hat and move … continue reading
Why do we seem to emulate the ostrich and put our heads in the sand when it comes to personally identifiable information (PII) discovery? Every other technology throughout history that I can think of has undergone multiple phases of evolution, including anti-virus, perimeter security, cell phones, the car – I could go on. So please … continue reading
A majority of organizations are vulnerable to hack attacks because they are still in the dark when it comes to their data. A newly released report reveals more than half of all data within organizations remains unclassified or untagged, which results in an organization’s inability to assess the risk or value of more than half … continue reading
It is becoming increasingly obvious that businesses have too much data to handle, according to Zebra Technologies. Gartner recently forecasted that enterprise spending on public cloud services are on the rise, and businesses need new ways to gain actionable insights for their vast troves of data. Zebra Technologies hopes to tackle that demand with the … continue reading
Many Americans seem resigned to not having control over their data profiles on the Internet. As larger and more sophisticated data breaches are reported in growing numbers, and companies such as Facebook and Google engage in mysterious data activities, technology users are left not knowing who’s got their data, or what they’re going to do … continue reading