Topic: data

SD Times Blog: Facebook’s business model: Radicalization

It’s oh-so-trendy to beat up on Facebook, but there is good reason. The platform collects an enormous amount of data on each of its users, but does not let you control what it collects; nor does it give you any visibility into how it is being used. Your choices are to be on the platform … continue reading

SD Times Blog: Facebook tips the scale with Libra

Last week Facebook revealed it was entering into the cryptocurrency space with the announcement of its global concurrency Libra. The word Libra is most commonly associated with the zodiac sign meaning balance and harmony. It is interesting Facebook chose this name because of all the different intricacies involved such as blockchain and privacy. Technology often … continue reading

Google adds new level of privacy and insight to data with open-source project

Google has announced the open-source availability of its Private Join and Compute project. Private Join and Compute is a type of secure multi-party computation designed to help organizations work with confidential data sets. The project is a part of the company’s mission to help organizations do more with data while keeping users’ data as safe … continue reading

MongoDB looks beyond databases

MongoDB is looking to expand itself beyond databases and transform into a data platform company. The company made a number of data-focused announcements as well as serverless and security features at its MongoDB World conference this week in New York. MongoDB announced beta versions of Atlas Data Lake, Atlas Full-Text Search and the general availability … continue reading

premium Man and machine learning: Data projects and the opportunities for developers

As businesses increasingly move their operations to the cloud, they’re recognizing the potential to harness the almost limitless compute power available and tap into artificial intelligence and machine learning technologies to deliver insights and value to the business that were previously beyond their reach. Businesses have never been in a better position to create value … continue reading

Industry Watch: Of open source, data breaches and speed

When IBM CEO Ginni Rometty joined Red Hat CEO Jim Whitehurst on stage at last month’s Red Hat Summit to declare that IBM would leave Red Hat alone after its acquisition, cheers went up from the developers in the keynote audience. Their fear, of course, was that IBM would somehow change Red Hat and move … continue reading

Guest View: A new approach to personal data discovery

Why do we seem to emulate the ostrich and put our heads in the sand when it comes to personally identifiable information (PII) discovery? Every other technology throughout history that I can think of has undergone multiple phases of evolution, including anti-virus, perimeter security, cell phones, the car – I could go on. So please … continue reading

Report: More than 50 percent of data remains in the dark

A majority of organizations are vulnerable to hack attacks because they are still in the dark when it comes to their data. A newly released report reveals more than half of all data within organizations remains unclassified or untagged, which results in an organization’s inability to assess the risk or value of more than half … continue reading

Zebra tackles enterprise data challenges with Savanna Data Services

It is becoming increasingly obvious that businesses have too much data to handle, according to Zebra Technologies. Gartner recently forecasted that enterprise spending on public cloud services are on the rise, and businesses need new ways to gain actionable insights for their vast troves of data. Zebra Technologies hopes to tackle that demand with the … continue reading

Privacy as a service

Many Americans seem resigned to not having control over their data profiles on the Internet. As larger and more sophisticated data breaches are reported in growing numbers, and companies such as Facebook and Google engage in mysterious data activities, technology users are left not knowing who’s got their data, or what they’re going to do … continue reading

Chances of data leaks are high in mobile apps

Most mobile applications contain at least some programming flaws that make them susceptible to leaking data containing personal information. In fact, mobile applications distributed in Apple’s App Store and Google Play are more likely to have at least one hidden bug that can compromise privacy than they are of containing a security vulnerability, where the … continue reading

SD Times Blog: Creating a safer Internet

We are living in a world where we are more connected than ever, but that connectivity can leave us vulnerable to attack. We communicate online, we shop online and we trust that our personal and private information will be safe online. However, history has shown that isn’t always the case with even the most prominent … continue reading

HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!