Pages

Big data can catch hackers

HP security chief: How big data can catch hackers red-handed | ZDNet: " . . . The breach process can be broken down into five distinct phases in a chain originally devised by Lockheed Martin, according to Gilliland. The first stage is research, when the would-be intruders study systems and staff, a process made far easier by employees' fondness for Facebook. Stage two is infiltration — when the criminals break in — followed by the third phase, known as discovery, which involves mapping the internal environment to survey systems and identify the location of the most sensitive data. The fourth step is capture. "High 90 percent of the time it's intellectual property or customer data or some sort of information. . . . Finally comes exfiltration. "That's the fancy military term for 'Get the data out of there'. . . ." (read more at link above)




Blue Coat to acquire big data security firm Solera

Blue Coat to acquire Solera; big data security | ZDNet: "Blue Coat Systems, the U.S. enterprise security company, announced this morning that it will acquire Utah-based Solera Networks, which specializes in big data security intelligence and analytics." (read more at link above)




Google conversational search

Google's conversational search arrives with new Chrome | Internet & Media - CNET News: " . . .To start a "conversation," people can click on the microphone icon in the search box, then speak a question, which Google shows and then answers. Subsequent queries can be made using the "OK, Google" initiation that the company uses for making Glass receptive to voice commands.Google tries to be clever enough to understand that "here" means "the questioner's present location" and that a pronoun could refer to the subject of a previous query. . . ."




How McLaren is working with big data

McLaren CIO: How we're working with big data | ZDNet: ""Big data is the core area we're working with," Birrel said. Each racecar is fitted with 160 sensors that generate one gigabyte of raw data during a race. That data is then streamed live into the garage, for use during the race, as well as back to a McLaren technology center for analysis, strategy and diagnostics. The company's been using SAP's HANA to cross-reference real-time telemetry data with historical data—because with the same 19 tracks each racing season, there's a lot of data to be compared. "One of the challenges is that sheer volume of data, and getting that to our engineers," Birrell said."





Protecting your privacy on Google

"If you don't have a Google account, or don't usually sign in to it, Google still tracks your history. To accomplish this, it uses a cookie stored in your browser. You can wipe out the information by deleting the cookie, but Google will just start recording new information. Instead, you can opt out of interest-based ads altogether by going to google.com/settings/ads"

"To see what forgotten secrets lurk in your Google history, go to google.com/history and sign in with your Google account information. You'll see a list of everything you've ever searched for on Google."

"Still concerned about stored information, your best bet might be to avoid using Google Search as much as possible. Alternative search sites DuckDuckGo and IxQuick parallel Google Search in features and performance, but don't collect any private information about you."

"If you want to surf the Web without leaving a trace, all modern browsers have private, or incognito, browsing. While in this mode, your browser will ignore cookies and won't record visited sites to your browser's history."



Bloomberg data snooping - Just "looking" can break the law

CFAA--a minefield when it comes to data--

Bloomberg snooping: Just looking at data can break the law - CSMonitor.com: " . . . . Such activity could be criminal under the Computer Fraud and Abuse Act (CFAA), even if reporters did nothing with the information, says Nick Akerman, a partner at New York law firm Dorsey & Whitneyand an expert on the protection of competitively sensitive information and computer data. The key question is: “Did they access that [data] without authorization?” . . . In 2010, for instance, Sandra Teague of Iowa was convicted to two years probation under the CFAA for viewing President Obama's student loan records. There was no evidence that she used the data. Employed by a contractor for the US Department of Education at the time, she was found to have exceeded her authorized computer access – a verdict upheld by a federal appeals court in 2011. The Federal Reserve and the Treasury Department are reportedly investigating the Bloomberg breach. . . . Additional embarrassing revelations, however, could force brokers and government officials to find an information provider they know won't spy on them." (read more at link above)





Talking to Machines

Charting technology’s new directions: A conversation with MIT’s Erik Brynjolfsson | McKinsey & Company: "I think we’re finally getting at that seminal moment in human history when we can talk to our machines and our machines will understand us in regular, natural language. It’s a little clunky if you use Siri or some of the automated voice-response systems. At first, you’re kind of amazed by a few things you can do, but you quickly run into the boundaries and it can be a little frustrating. But it’s advancing very, very rapidly. . . the big breakthrough has been linking it to big data. You now have hundreds of millions of people using that, talking to it and correcting it. It creates a closed-loop learning system where these voice systems (not just Siri but Google and the others) are learning much more rapidly than they could in the past. And just by crunching large amounts of data, they’re able to improve language understanding in a way that we couldn’t when we were sort of trying to hand code the semantics and syntax of language in the first era of language recognition." (read more at link above)





Secret NSA Google Search Tips?

Use These Secret NSA Google Search Tips to Become Your Own Spy Agency | Threat Level | Wired.com:
". . . .the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.
The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others. The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”. . . ." read more at link above




Why Facebook Wants To Spend $1 Billion On Waze

Maps, Local Search, Local Social--

Here's Why Facebook Wants To Spend $1 Billion On Waze, According To Industry Sources Who Are Smarter Than Us - Business Insider: "If Facebook is committed to local search (pretty clearly they are), it would be helpful to have a maps UI in addition to a search UI, particularly one with road data that they can use their platform to make significantly more accurate and valuable. Another example of all the big tech companies grabbing their own maps: last week, Alibaba took a huge stake in AutoNav, a German maps company with strong foothold in China."





Stephen Wolfram says not enough data on the web to power Wolfram Alpha (video)



Stephen Wolfram says there isn't enough data on the Web to power Wolfram Alpha - YouTube:
On stage at TNW Conference in Amsterdam, Wolfram Alpha CEO Stephen Wolfram went into detail on how his service actually computes answers on the fly.