Related Content
How NSA Cracks Encrypted Data New facts continue to come out about the National Security Agency’s information-gathering programs. Each day's news seems to outdo previous scoops about its spying capabilities. This week is no different, with new reports detailing NSA's efforts to crack encrypted data. |
||
Don’t Be Afraid of Big Data It's starting to look like big data isn't as scary as organizations might have once thought—especially when heavyweights like IBM are rewarding those who are willing to spread "data literacy" to anyone who will listen. Learn how you could be your company's hero by standing up to big data. |
||
New Software Helps Scientists Identify Animal Sounds Thanks to software, scientists now have the ability to record massive amounts of audio samples from ecologically diverse areas and use technology to help in the species-identification process—a labor-intensive task, given the difficulty in deciphering the sounds in many hours of recordings. |
||
The Software behind the PRISM Intelligence-Gathering Program News of the National Security Agency’s PRISM intelligence-gathering program has reverberated throughout the media. This sophisticated computer system has the capability to sift through enormous amounts of data and extrapolate meaning, giving the NSA a way to track people and their behaviors. |
||
What the Government's New Open Data Policy Means for Developers On May 9, 2013, President Obama signed the Open Data Executive Order, which mandates that open government data is now the standard—not the exception. The public will be able to access government datasets rendered in open, machine-readable formats and, when appropriate, expose data via APIs. |
||
A Roundup of Configuration Management Database Tools If you’re a follower of the Information Technology Infrastructure Library (ITIL), the configuration management database (CMDB) is a central point of your efforts. Joe Townsend gives us a handy roundup of the tools on the market that are available to help you control your IT environment. |
||
Object Storage: File System Database Mash-Up Cloud storage consumer subscriptions are targeted to exceed 625 million this year. A new generation of cutting edge data storage, modeled on the distributed database rather than the traditional hierarchical file system paradigm, is revolutionizing how storage is built and delivered in the cloud. |
||
Evernote's Security Breach Leads to Leaked Passwords Another day, another security breach. Following in the footsteps of popular hacked services Dropbox and LinkedIn, software and service vendor Evernote announced this March that it had suffered a data breach and suspected that usernames, email addresses, and encrypted passwords had been stolen. |