Remove tag student-data
article thumbnail

The Future of the Web | ZDNet

Collaboration 2.0

Parallax, a novel browsing interface designed by David Huynh to manipulate Freebase , shows how contextual connections can be made with machine readable data to provide a much richer results set which in turn can spawn fascinating visual representations, and more. Freebase covers millions of topics in hundreds of categories.

Paper 45
article thumbnail

Autonomy CEO: Web 2.0 'under all the hype, there is something there.' | ZDNet

Collaboration 2.0

in the enterprise, making some very cogent points: …the issue of varying values of information that Andrew Keen brings up in his 2007 book The Cult of the Amateur may be worrying in a consumer context but potentially fatal in an enterprise that makes aircraft or medical equipment, for example. Mike explores the lure of Web 2.0

Paper 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

The ideal would be for cell phone carriers to be just carriers of data but they can’t filter it. Weve actually resorted to putting name tags on the inisde of our childrens shirts. Thanks for your time Steve if you’ve spared some more to read this! which actually work.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. Sooner or later, big repositories of data will be abused. India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2

Security 111
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Ransomware, for example, usually doesn’t self-replicate. University of Southern California graduate student Fred Cohen designed an unnamed piece of malware which could take over a computer’s system operations. Going Mobile and Going Global: 2001-2010. This isn’t necessarily true of other types of malware.