Skip to main content

Home/ Brian links/ Group items tagged Data

Rss Feed Group items tagged

Kevin DiVico

Cassette tapes are the future of big data storage - tech - 19 October 2012 - New Scientist - 0 views

  •  
    "THE cassette tape is about to make a comeback, in a big way. From the updates posted by Facebook's 1 billion users to the medical images shared by healthcare organisations worldwide and the rise of high-definition video streaming, the need for something to store huge tranches of data is greater than ever. And while hard drives have traditionally been the workhorse of large storage operations, a new wave of ultra-dense tape drives that pack in information at much higher densities, while using less energy, is set to replace them."
Kevin DiVico

Eureqa | Cornell Creative Machines Lab - 0 views

  •  
    Eureqa (pronounced "eureka") is a software tool for detecting equations and hidden mathematical relationships in your data. Its goal is to identify the simplest mathematical formulas which could describe the underlying mechanisms that produced the data. Eureqa is free to download and use. Below you will find the program download, video tutorial, user forum, and other and reference materials.
Kevin DiVico

Start-Ups Aim to Help Users Put a Price on Their Personal Data - NYTimes.com - 0 views

  •  
    Facebook's pending initial public offering gives credence to the argument that personal data is the oil of the digital age. The company was built on a formula common to the technology industry: offer people a service, collect information about them as they use that service and use that information to sell advertising.
Kevin DiVico

Askemos - 0 views

  •  
    The aim of the Askemos project is to enable reliable and justiciable data processing, with the goal of producing "Software that can last 200 years." The first implementations of an Askemos peer can be obtained from ball.askemos.org. The Askemos web site itself is served from the Askemos/BALL development network. Follow here for more details. Note that Askemos concerns the abstract specification exclusively; including data formats, protocols, service interfaces etc. - not the actual implementations. Askemos combines incorruptible privilege delegation and non-repudiable replication of communicating processes into a trustworthy network. Physical machines under control of their operators execute applications processes under permanent multilateral audit. The network's honest majority of hosts provides users with exclusive control, and thus real ownership of processes. Askemos models a kind of "virtual constitutional state" where physical hosts bear witness to the interactions of virtual agents (akin to citizens). Self verifying identifiers can confirm that original documents have not beentampered with. The real potential for using Askemos is for identity and time stamp services, informationmanagement in public administration and libraries attaching metadata and archives, with the goal of establishing robust systems that can endure for centuries. German tax law, for instance, has storage requirements, which makes Askemos interesting even for private, individual use. Also Activist groups, non-profits and people who desire privacy and reliability in a chaotic and unpredictable world have much to gain from this software.
Kevin DiVico

Making Sense of Big Data to Fight Crime « A Smarter Planet Blog - 0 views

  •  
    There is no proverbial silver bullet to creating a safer city, but analytics technology is assisting law enforcement agencies all over the world to sort through information - part of the 2.5 quintillion bytes of data we create and consume every day - to get ahead of crime. Having access to all that information is an invaluable resource for law enforcement agencies, but it can also be pretty paralyzing. After all, only a fraction of the bits and bytes can actually be relevant, right? But how do you know and, more importantly, how do you find and act on it?
Kevin DiVico

WikiMedia Foundation Releases GeoData For Geotagging Wikipedia - 0 views

    • Kevin DiVico
       
      JOhn Sforza wanted you apprised of this -in case you wanted to incorporate it into FAIMS 
  •  
    The WikiMedia Foundation has added a new extension to MediaWiki, the foundation for Wikipedia, that adds geographic data for individual wiki articles. Aimed primarily at mobile users, GeoData will make finding information about your present location easy and fun. According to WikiMedia, GeoData aims to codify the common practice of adding geographic data to articles.
Kevin DiVico

New IBM DB2 Database Adds "Time Travel" for Projecting Past, Future Data - 0 views

  •  
    It's been the case for every SQL database in practical use since E. F. Codd first came up with the concept: Records either exist or they don't. When you run a SELECT statement, you're querying the current state of the data. A state is either true or false.
Kevin DiVico

Big Data's Impact in the World - NYTimes.com - 0 views

  •  
    GOOD with numbers? Fascinated by data? The sound you hear is opportunity knocking.
Kevin DiVico

UK Biobank to offer access to health data - FT.com - 0 views

  •  
    Medical researchers around the world will from Friday have access to information on half a million Britons, with the release of the globe's largest collection of human health data.
Kevin DiVico

Data Scientist: The Sexiest Job of the 21st Century - Harvard Business Review - 0 views

  •  
    When Jonathan Goldman arrived for work in June 2006 at LinkedIn, the business networking site, the place still felt like a start-up. The company had just under 8 million accounts, and the number was growing quickly as existing members invited their friends and colleagues to join. But users weren't seeking out connections with the people who were already on the site at the rate executives had expected. Something was apparently missing in the social experience. As one LinkedIn manager put it, "It was like arriving at a conference reception and realizing you don't know anyone. So you just stand in the corner sipping your drink-and you probably leave early."
Kevin DiVico

The Human Face of Big Data - 0 views

  •  
    ""Rick Smolan, creator of the epic "Day in the Life" photography books, is taking on a new challenge: big data.""
Kevin DiVico

Factual's Gil Elbaz Wants to Gather the Data Universe - NYTimes.com - 0 views

  •  
    AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots and machines that can answer any question."
Kevin DiVico

Factual's Gil Elbaz Wants to Gather the Data Universe - NYTimes.com - 0 views

  •  
    AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots and machines that can answer any question."
Kevin DiVico

Researchers at MIT Develop The Fastest Possible Data Transmission Method | BostInno - 0 views

  • a new type of encoding scheme that will guarantee the fastest possible delivery of data, no matter the amount of interference present on a network.
Kevin DiVico

Research ethics: 3 ways to blow the whistle : Nature News & Comment - 0 views

  •  
    "Are more people doing wrong or are more people speaking up? Retractions of scientific papers have increased about tenfold during the past decade, with many studies crumbling in cases of high-profile research misconduct that ranges from plagiarism to image manipulation to outright data fabrication. When worries about somebody's work reach a critical point, it falls to a peer, supervisor, junior partner or uninvolved bystander to decide whether to keep mum or step up and blow the whistle. Doing the latter comes at significant risk, and the path is rarely simple. Some make their case and move on; others never give up. And in what seems to be a growing trend, anonymous watchdogs are airing their concerns through e-mail and public forums. Here, Nature profiles three markedly different stories of individuals who acted on their suspicions. Successful or otherwise, each case offers lessons for would-be tipsters."
Kevin DiVico

Fraud, failure, and FUBAR in science - Boing Boing - 0 views

  •  
    "Here's an issue we don't talk about enough. Every year, peer-reviewed research journals publish hundreds of thousands of scientific papers. But every year, several hundred of those are retracted - essentially, unpublished. There's a number of reasons retraction happens. Sometimes, the researchers (or another group of scientists) will notice honest mistakes. Sometimes, other people will prove that the paper's results were totally wrong. And sometimes, scientists misbehave, plagiarizing their own work, plagiarizing others, or engaging in outright fraud. Officially, fraud only accounts for a small proportion of all retractions. But the number of annual retractions is growing, fast. And there's good reason to think that fraud plays a bigger role in science then we like to think. In fact, a study published a couple of weeks ago found that there was misconduct happening in 3/4ths of all retracted papers. Meanwhile, previous research has shown that, while only about .02% of all papers are retracted, 1-2% of scientists admit to having invented, fudged, or manipulated data at least once in their careers."
Kevin DiVico

This is the scariest chart you'll see this week - 0 views

  •  
    "These are the top 10 countries to request user data from tech companies in 2012. Guess who's leading the pack? In other national security news, The Atlantic reports "defenders of Edward Snowden's leaks got a bit trickier Wednesday afternoon, with revelations about his embarrassing past. Turns out, Snowden was once a teenager and, worse, that time period was encapsulated online.""
Kevin DiVico

Best of 2012: PlaceRaider: The Military Smartphone Malware Designed to Steal Your Life ... - 0 views

  •  
    "The power of modern smartphones is one of the technological wonders of our age. These devices carry a suite of sensors capable of monitoring the environment in detail, powerful data processors and the ability to transmit and receive information at high rates.  So it's no surprise that smartphones are increasingly targeted by malware designed to exploit this newfound power. Examples include software that listens for spoken credit card numbers or uses the on-board accelerometers to monitor credit card details entered as keystrokes.
Kevin DiVico

What Happened to Diaspora, the 'Facebook Killer'? It's Complicated | Motherboard - 0 views

  • In Utah, the NSA builds a $2 billion data center that will, according to Wired, the agency intends to siphon “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter.’”
  •  
    It's impossible to grasp the consequences or outcomes of new technology, especially when that technology is developed by a twenty-something hacker. That much was already clear in January 2010, when Mark Zuckerberg told TechCrunch founder Michael Arrington that Facebook isn't just a place to connect with your friends. It was a place to be more public than ever before. "People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time," he said. "But we viewed that as a really important thing, to always keep a beginner's mind and what would we do if we were starting the company now and we decided that these would be the social norms now and we just went for it."
Kevin DiVico

Android apps used by millions vulnerable to password, e-mail theft | Ars Technica - 0 views

  •  
    Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found. The researchers identified 41 applications in Google's Play Market that leaked sensitive data as it traveled between handsets running the Ice Cream Sandwich version of Android and webservers for banks and other online services. By connecting the devices to a local area network that used a variety of well-known exploits, some of them available online, the scientists were able to defeat the secure sockets layer and transport layer security protocols implemented by the apps. Their research paper didn't identify the programs, except to say they have been downloaded from 39.5 million and 185 million times, based on Google statistics.
‹ Previous 21 - 40 of 64 Next › Last »
Showing 20 items per page