Skip to main content

Home/ IB ITGS/ Group items tagged data

Rss Feed Group items tagged

ajay tambay

Meet Bustadrive, a home-made hard disk destroyer | PC Pro blog - 0 views

  • If your job involves having to destroy hard disks and make sure that their data is impossible to recover, you’ll know that it can be an expensive business: properly disposing of each hard disk can cost between £5 and £10 and, when you’re managing the IT affairs of potentially large businesses, these costs can mount up.
    • ajay tambay
       
      IT Systems - basics Impact - business
  • simply chopping the platter in half wouldn’t remove the data” and confirmed that it could be recovered – but the costs of retrieving any remaining information “would be prohibitive”. That’s because you’d need “something along the lines of an electron scanning microscope” to read the data from the remains of the platter – and those currently sell second-hand for at least £40,000. Tanfield-Johnson also confirmed that, once you’d cracked open a hard disk to extract the platters within, recovering any data would become even more difficult, because you’d need “the same model and make of [circuit] board” to access each track of data on the disk. So, unless you’re willing to spend tens of thousands of pounds, it looks like your data is safe.
    • ajay tambay
       
      Social - privacy
anonymous

Facebook 30,000 Servers (Data Center Knowledge) - 0 views

  •  
    Update on number of servers the company has to run the massively popular social website, Facebook. It has been updated from the orginal 10,000 to an existing 30,000 servers. Facebook is also responsible of logging 300 million users data. Facebook gets about 25 terabytes of log data everyday. 
Johan Autio

Chart and image gallery: 30 free tools for data visualization and analysis - Computerworld - 0 views

  •  
    30 free tools for data visualization and analysis
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
ajay tambay

70% of UK Organisations Hit by One or More Data Breach Incidents within Last Twelve Months - 2 views

  •  
    The public sector experienced the highest number of data loss incidents in the last year; reporting an average of 4.48 breaches per organisation.
Rafae Wathra

BBC NEWS | UK | T-Mobile staff sold personal data - 1 views

  • Staff at mobile phone company T-Mobile passed on millions of records from thousands of customers to third party brokers, the firm has confirmed.
    • Rafae Wathra
       
      Rafae
  • The Data Protection Act bans the selling on of data without prior permission from the customer and a fine of £5,000 can be imposed following a successful prosecution.
anonymous

BBC NEWS | Technology | Government opens data to public - 7 views

  • Government opens data to public
    • anonymous
       
      Claimed by Iman and Dol.
  •  
    Iman's and Dol's Article
  •  
    Iman's and Dol's Article
ajay tambay

BBC - dot.life: Teenage hackers: Making a better world - 0 views

  • Around 70 teenagers had gathered for this weekend event which is the brainchild of Rewired State - an organisation thinking of clever ways to free up public data.
    • ajay tambay
       
      Social - Equality , Globalization
  • different groups as they spread themselves across the third floor of the Googleplex, taking advantage of the free wi-fi - and food - laid on by the search company.
  • different groups as they spread themselves across the third floor of the Googleplex, taking advantage of the free wi-fi - and food - laid on by the search company.
  • ...3 more annotations...
  • One group was seeking a way to scrape bus timetable information from the Transport For London website
    • ajay tambay
       
      IT Systems - comm sys (internet)
  • they mingled, discussed software, the rights and wrongs of file-sharing, how to get free access to Spotify's premium music streaming service - and how they'd found out about the event through a friend or some enthusiastic teacher
    • ajay tambay
       
      Impact - education
  • Sunday afternoon, they presented their ideas to a panel of government officials and web luminaries. Among the winners was that group trying to free up London bus data - TFHell won the "Most Likely to be Bought By Google" award. One of the judges, Ben Hammersley of Wired UK, said he "found the standard of the work produced by 15-18-year-olds in many cases infinitely superior to that produced by government professionals."
    • ajay tambay
       
      Impact - Business
Rafae Wathra

BBC NEWS | Technology | Mobile data show friend networks - 0 views

  • "It's invisible to the user but logs everything: communication, users' locations, people's proximity by doing continuous Bluetooth scans."
    • Rafae Wathra
       
      This is a privacy issue (social) because these users don't know that so much information about them is being logged
    • Rafae Wathra
       
      This is also an integrity issue because the companies supplying these products don't tell the users that there is a chip in their phones.
  • Friendships can be inferred with 95% accuracy from call records and the proximity of users, says a new report.
    • Rafae Wathra
       
      This relates to communication systems because the phone companies are using communication systems in order to track the social activity of their users
  • but to carry on this "reality mining" in contexts ranging from the modelling of the spread of disease t
    • Rafae Wathra
       
      If gathering mobile data can help track the spread of disease, then its implications in improving the health of the target area (area of impact) have a lot of potential
ajay tambay

Proofpoint-Outbound-Email-and-Data-Loss-Prevention-2009.pdf - 0 views

  •  
    proofpoint 6th annual report upon dataloss occuring from IM, e-mail, employees, etc in companies
Eunice Vincent

The Fundamentals of GPS - Articles - 0 views

  •  
    GIS News, Articles, Maps, Data, Tools
anonymous

2009 Identity Theft Statistics - 0 views

  •  
    The process of using someone else's personal infomation for other users own personal gain. There has been study going on by the Javelin Strategy & Research Center since 2004. 2008 statitics revel that almost 10 million victims (22% increase from 2007). 71% of the fraud that happens, happens in the first weak of stealing the victims personal data.
anonymous

Identity Theft and Fraud - 0 views

  •  
    Description of Identity theft, and that it is indeed a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In the US and Canada many poeple have reported that unauthorized persons have taken frauds out of their bank or finacial accounts, or the worst care, taken over their identity all together (another person who is using someone else's name/credit card).
1 - 20 of 51 Next › Last »
Showing 20 items per page