Skip to main content

Home/ VITTAlearning/ Group items tagged data

Rss Feed Group items tagged

Roland Gesthuizen

Who Owns Your Data? - 0 views

  • But as we use the Internet for “free,” we have to remember that if we’re not paying for something, we’re not the customer. We are in fact the product being sold — or, more specifically, our data is. So here’s a tricky question: Who owns all that data?
  • The digital divide isn’t about who owns data — it’s about who can put that data to work.
  •  
    "But as we use the Internet for "free," we have to remember that if we're not paying for something, we're not the customer. We are in fact the product being sold - or, more specifically, our data is. So here's a tricky question: Who owns all that data?"
Roland Gesthuizen

Think twice before using Twitter as a data source » Nieman Journalism Lab - 0 views

  • All that’s not to say that Twitter’s not incredibly useful as a data source
  • Just be aware of its limits and be careful about assuming what it produces represents any larger reality
  • different versions of Twitter data can return different — sometimes even mutually contradictory — results
  •  
    "At Source, Jacob Harris notes that, as appealing as the Twitter API may be as a source of what-people-are-thinking data, it's hardly perfect. Twitter's demographics aren't representative of either Internet users as a whole or the broader population, and geocoding data is sparse and inconsistent. "
John Pearce

Linked Data Tools: The Semantic Web - 0 views

  •  
    Semantic Web technologies have immense potential to transform the Internet into a distributed reasoning machine that will not only execute extremely precise searches, but will also have the ability to analyze the data it finds to create new knowledge. This paper examines the state of Semantic Web (also known as Linked Data) tools and infrastructure to determine whether semantic technologies are sufficiently mature for non-expert use, and to identify some of the obstacles to global Linked Data implementation.
Roland Gesthuizen

Big Data | Debunking Five Big Data Myths | Technology, IT - 0 views

  •  
    "Kate Crawford of the MIT Centre for Civic Media goes behind the numbers to debunk five myths about big data."
Roland Gesthuizen

Digging for data the new mining boom - 0 views

  • Enterprises are using data analysis not just to improve their everyday business processes, but also to build predictive models of consumer behaviour.
  • Trained loyalty scientists build systems that trawl through a company's customer behaviour data to predict certain events, such as what might prompt them to leave
  • Companies approaching customers need to be ''utterly transparent'' about how they know what they know about a customer.
  •  
    "Big data is the new business black. It's a catch-all phrase for the billions of transactions and other bits of information about their customers, suppliers and operations logged by businesses and governments the world over every day. Yesterday's storage problem has become today's strategic asset. Turns out there's gold in them thar files."
Roland Gesthuizen

20 superb data visualisation tools for web designers | Design | Creative Bloq - 0 views

  •  
    "From simple charts to complex maps and infographics, Brian Suda's round-up of the best - and mostly free - tools has everything you need to bring your data to life."
Roland Gesthuizen

What is Traitorware? | Electronic Frontier Foundation - 1 views

  • Traitorware is sometimes included in products with less obviously malicious intent.
  • Don’t let these good intentions fool you—software that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest.
  • traitorware: devices that act behind your back to betray your privacy.
  •  
    "Traitorware is not some science-fiction vision of the future. It is the present. .. We believe that your software and devices should not be a tool for gathering your personal data without your explicit consent. "
  •  
    Interesting IT issue related to the gathering and use of personal data.
Roland Gesthuizen

Cacti: The Complete RRDTool-based Graphing Solution - 0 views

  •  
    "Cacti is a complete network graphing solution designed to harness the power of RRDTool's data storage and graphing functionality. Cacti provides a fast poller, advanced graph templating, multiple data acquisition methods, and user management features out of the box. All of this is wrapped in an intuitive, easy to use interface that makes sense for LAN-sized installations up to complex networks with hundreds of devices."
Roland Gesthuizen

Offshore cloud privacy may be "impossible," says commissioner | Delimiter - 1 views

  • cloud computing was being used “increasingly” by Victorian agencies, in order to reduce capital and operational costs.
  • Given that many cloud computing service providers are in jurisdictions which do not have similar privacy or data protection laws, if a security breach occurs, an individual in Victoria will be powerless to take action against the cloud service provider and will only be able to complain to the Victorian government organisation
  • large organisations need to look in a more granular fashion at what sort of data they are interested in storing in the cloud — arguing that some data could be harmlessly stored offshore — compared with sensitive data
  •  
    "Victoria's privacy commissioner has issued a stark warning to government agencies about the use of cloud computing, warning that it may be "impossible" to protect personal information held about Australians when it was located offshore - or even just outside Victoria."
Roland Gesthuizen

Video: Google Offers Rare Glimpse Into its Data Centers - 1 views

  • Google uses its own custom, stripped down version of Linux. It uses only a minimum set of packages.
  • The facilities are hypersecure - vehicles can't enter without authorization, and iris scanners are used at some locations.
  •  
    "Google is famously secretive about its data centers, so a new video on its enterprise blog that gives a glimpse into the inner workings of its facilities is a rare treat. The video emphasizes security and environmental best practices."
  •  
    Nice glimpse into a data centre.
Roland Gesthuizen

Welcome to Prineville, Oregon: Population, 800 Million | Wired Enterprise | Wired.com - 0 views

  •  
    Web giants like Google and Amazon are notoriously secretive about what goes on inside the worldwide network of data centers that serve up their sweeping collection of web services. They call it a security measure, but clearly, they also see these facilities as some sort of competitive advantage their online rivals mustn't lay eyes on.
Roland Gesthuizen

The REAL Death Of The Music Industry - 0 views

  •  
    Interesting graphing and representation of data issues.
QR Code Creator

Using QR Codes For Business - 0 views

  •  
    The Quick Response codes consists of a group of data which are saved in the form of the symbols. These can be seen in any of the products you purchase form the super market...
Roland Gesthuizen

Free ride: students crack ticket algorithm - 0 views

  • other university students started looking at a public transport's ticketing system because they were fans of public transport and interested in how the data was encrypted. They were also interested in what protections were in place against malicious users creating fake tickets
  • they were already aware of the potential flaws, but it was a large and expensive operation to change the tickets
  • cryptography should be impossible to crack, even if a potential attacker or reverse engineer knows every detail about how it is implemented. This system on the other hand is relying completely on users not knowing how it is implemented, which may have been fine when it was introduced in the early '90s because much fewer people had access to the technology required to read the tickets, or computers fast enough to analyse the data
  •  
    "A team of university students in Sydney have cracked the secret algorithm used on Sydney's public transport tickets for buses, trains and ferries, which they say could allow them to print their own tickets. "
Roland Gesthuizen

Email snooping IT admins like 'Dracula in charge of the blood bank' - 0 views

  • IT administrators "can't help themselves" as soon as they have control and authority over IT assets
  •  
    "About 40 per cent of IT administrators go snooping through emails of employees, particularly those of high-level executives .. A company's IT admins have access to virtually every document company-wide - including executive files, payroll information and medical data - and many "can't help themselves" in gaining access to email"
Roland Gesthuizen

What we learned from 5 million books | Video on TED.com - 0 views

  • Have you played with Google Labs' Ngram Viewer? It's an addicting tool that lets you search for words and ideas in a database of 5 million books from across centuries. Erez Lieberman Aiden and Jean-Baptiste Michel show us how it works, and a few of the surprising things we can learn from 500 billion words.
  •  
    "Jean-Baptiste Michel looks at how we can use large volumes of data to better understand our world."
Roland Gesthuizen

Big Data Begins: IT Hero Rising - CA Technologies Corporate Blog: Perspectives - CA Tec... - 0 views

  •  
    "Let's get the harsh facts out there first - IT's in trouble, deep trouble. It has become way too reactionary. By IT I mean 'traditional' IT, the time honored 'old school' way of doing things. The pace of tech adoption is accelerating. By rights this should be a terrific opportunity for technologists and IT teams. In reality, old school IT has been shocked and awed by the consumerization of IT. "
Roland Gesthuizen

Mobility's lesser-known fact: It's not just about BYOD | ZDNet - 0 views

  •  
    "Much like cloud computing and big data, bring your own device has become an irritating buzzword that is being tossed around with unrelenting vigour in the IT industry, but mobility isn't just about BYOD."
Roland Gesthuizen

Time Machine - Frequently Asked Questions 27. Can I have "dual" backups? Or back up my ... - 0 views

  •  
    "Clearly, there's a need for multiple backups.  The questions are, how? and how many? .. For most of us, it's all in one place, so we need a single strategy -- one, two, or more backups. But if you have original data on separate Macs and/or external drives, you may want more backups of one than others. How?  There are several ways to have multiple backups, detailed below:"
1 - 20 of 38 Next ›
Showing 20 items per page