Business intelligence (BI) has two different meanings related to the use of the term "intelligence", first is the human intelligence capacity applied in business affairs/activities and the second relates to the intelligence as data assets i.e. information valued for its currency and relevance.
Datafication (also referred as Datafy) is a modern technological trend turning many aspects of our life into computerised data and transforming this information into new forms of value, says Wikipedia. Today all aspects of our life is surrounded by multitude of technologies that generate data.
The General Data Protection Regulation (GDPR) is a regulation to strengthen and unify the data protection of all EU citizens / residents by giving the choice and control of use of their personal data usage, processing and storage by the data controller (an organization that collects data from EU residents) or processor (an organization that processes data on behalf of data controller e.g. cloud service providers) or the data subject (person) is based in the EU. It also applied to organizations based outside the European Union if they collect or process personal data of EU residents. This regulation was adopted by European Parliament, the council of European union and European Commission on 27 April 2016. After two year transition period this becomes enforceable effective May 2018.
The cloud computing is well adapted and enabling most of the innovative technologies today, I am attempting a compilation from various sources to bring a closer look at Fog Computing, a "Cloud of Things" i.e. ecosystem of Cloud computing and IoT Systems enabler. The edge computing is becoming more and more significant and with advancements in mobile computing and associated peer to peer social applications, drones, connected cars and augmented reality etc driving the agenda on how the data gets generated, processes (locally) and disseminated with decentralized way yet building up the knowledge repository centrally to draw insights from algorithms and AI/ML (read artificial intelligence and Machine learning) artefacts.
It is important to keep in mind that IPS, sandboxing and all other protection the firewall provides is only effective against traffic that is traversing the firewall and where suitable enforcement and protection policies are being applied to the firewall rules governing that traffic. So, with that in mind, follow these best practices for preventing the spread of worm-like attacks on your network:
Two key technologies are creating waves in the digital world towards transformation of the business, first the Bitcoins and another Blockchain. Both are correlated but not the same, Bitcoins is a worldwide cryptocurrency and digital payment system that offers distributed ledger system leveraging the Blockchain technology running transactions from multiple locations ( read devices, applications or micro services ) by multiple users and still maintains integrity of the transaction and value remittance thereof. The system is peer-to-peer, and transactions are capable of running independently between users, without an intermediary.
Hadoop is gaining traction and on a higher adaption curve to liberate the data from the clutches of the applications and native formats. This article helps us look at the file formats supported by Hadoop ( read, HDFS) file system. A quick broad categorizations of file formats would be...
Almost every day we hear about cases of ‘Ransomware’ affecting running servers – an act we call digital terrorism. Let’s get a quick understanding of this risk and the preventive measures to mitigate it. Crypto-ransomware gains access to a target server and encrypts all the files on that server. It scrambles the contents of the file so that you can’t access them without a particular decryption key that can correctly unscramble it. This makes the users or the administrators of the server helpless, and there are no known tools that can detect the hashing algorithms and then decrypt them. A ransom is thus demanded in exchange for the decryption key.
Big data as defined in the Wikipedia, Big data is a term for large or complex data sets that are a constantly moving targets for the traditional strategies, tools for processing and managing them via traditional data processing applications which are inadequate to deal with them. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying, updating and information privacy.