Sat.Aug 12, 2017 - Fri.Aug 18, 2017

article thumbnail

Security Keys

Imperial Violet

Security Keys are (generally) USB-connected hardware fobs that are capable of key generation and oracle signing. Websites can “enroll” a security key by asking it to generate a public key bound to an “appId” (which is limited by the browser based on the site's origin). Later, when a user wants to log in, the website can send a challenge to the security key, which signs it to prove possession of the corresponding private key.

Security 117
article thumbnail

Big Data at NASA

IBM Big Data Hub

Data already is the new currency and is at the heart of everything digital. I like to repeat the adage, “Data becomes Information, becomes Knowledge, becomes Wisdom”. And “It’s all about the data”. So why do we send up probes, sensors or satellites — for the data?

Big data 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding the Mirai Botnet

Elie

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims.

IoT 86
article thumbnail

Google Begins Campaign Warning Forms Not Using HTTPS Protocol

PerezBox

August 2014, Google released an article sharing their thoughts on how they planned to focus on their “HTTPS everywhere” campaign (originally initiated at their Google I/O event). The premise of. Read More. The post Google Begins Campaign Warning Forms Not Using HTTPS Protocol appeared first on PerezBox.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Colombia Designates U.S. as “Adequate” Data Transfer Nation

Hunton Privacy

On August 14, 2017, the Colombian Superintendence of Industry and Commerce (“SIC”) announced that it was adding the United States to its list of nations that provide an adequate level of protection for the transfer of personal information, according to a report from Bloomberg BNA. The SIC, along with the Superintendence of Finance, is Colombia’s data protection authority, and is responsible for enforcing Colombia’s data protection law.

IT 64

More Trending

article thumbnail

UK data protection after Brexit – UK government Statement of Intent contains few surprises

Data Protection Report

On the 7 th August 2017, the UK’s Government Department for Digital, Culture, Media and Sport issued a Statement of Intent (the Statement ) outlining its planned reforms of the UK’s data protection laws which are to be implemented by the Data Protection Bill (the Bill ). The Statement anticipates the UK’s departure from the EU and makes it clear that following this, the Bill will transpose the General Data Protection Regulation (the GDPR ) into domestic law, stressing the importance of continued

article thumbnail

Vancouver’s unbuilt leisure palace

Archives Blogs

While working on rehousing some of our map collection, I recently came across drawings from one of the more interesting unrealised development projects in the city’s past: a winter swimming pool and leisure complex proposed for English Bay in 1920. Public natatorium and concert hall, English Bay (Sharp and Thompson, in conjunction with A.S. Wootton, 1920).

IT 37
article thumbnail

Hunton Privacy Team Publishes Several Chapters in International Comparative Legal Guide to Data Protection

Hunton Privacy

Recently, the fourth edition of the book, The International Comparative Legal Guide to: Data Protection 2017, was published by the Global Legal Group. Hunton & Williams’ Global Privacy and Cybersecurity lawyers prepared several chapters in the guide, including the opening chapter on “All Change for Data Protection: The European Data Protection Regulation,” co-authored by London partner Bridget Treacy and associate Anita Bapat.

Privacy 45
article thumbnail

Db2 12 for z/OS SQL Enhancements: a Better MERGE

Robert's Db2

Greetings, and welcome to the third in a series of entries covering my favorite Db2 12 for z/OS SQL enhancements. The first two posts in the series described piece-wise DELETE and result set pagination. This entry focuses on the new and very much improved MERGE functionality delivered via Db2 12 (usable at function level V12R1M500 and above). The MERGE statement, introduced with Db2 9 for z/OS, is sometimes referred to as the "upsert" statement, because it enabled, via a combination of update an

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analyze clickstream data with IBM EventStore for customer insights

IBM Big Data Hub

Typically, ingesting streaming event data, persisting with low latency and analyzing it along with historical event data requires integrating multiple analytic systems. IBM EventStore is purpose built to simplify the complexity of harnessing event data with a single system. Its unique architecture enables analytics on both — the just arrived event data and historical event data.

article thumbnail

Moss Hart, Act One

Archives Blogs

Moss Hart charms in this 1959 meeting of the Book and Author Luncheon. Hart is here to plug his new memoir, Act One. With his wife, the actress Kitty Carlisle, as well as the publisher Bennett Cerf and his wife Phyllis on the dais, he describes how a playwright and director came to write prose. His play The Climate of Eden had flopped. Licking his wounds, unable to write, he complained to fellow dramatist S.N.

article thumbnail

FTC Posts Fifth Blog in Its “Stick with Security” Series

Hunton Privacy

On August 18, 2017, the FTC published the fifth blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Store sensitive personal information securely and protect it during transmission , outlines steps businesses can take to secure sensitive data, including when it is i

IT 40
article thumbnail

Supervision Trumps Speculation: Court Denies Motion to Compel Additional Search

eDiscovery Law

Mirmina v. Genpact LLC, No. 3:16CV00614, 2017 WL 3189027 (D. Conn. July 27, 2017). In this case, Plaintiff sought to compel Defendant to conduct an additional search for ESI. Plaintiff asserted that he was “concerned” that responsive communications were withheld from production and argued “in essence, that defendant’s search for ESI was insufficient because counsel relied upon an employee directly involved in the underlying claims of the suit to search her own emails for responsive documents.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SEC Warns Initial Coin Offerings May Be Subject to U.S. Federal Securities Laws

Hunton Privacy

In 2017, over $1.3 billion has been raised by start-ups through Initial Coin Offerings (“ICOs”), a relatively new form of financing technique in which a company (typically one operating in the digital currency space) seeking to raise seed money makes a “token” available for sale, and the token gives the purchaser some future right in the business or other benefit.

Sales 40
article thumbnail

Applestead

Archives Blogs

Three apples from “Apples of New York,” by Spencer Ambrose Beach. The Northeast Organic Farming Association summer conference takes place this weekend at Hampshire College. One of the first seminars was “The Full Skinny on Healthy Orcharding” with Michael Phillips from Lost Nation Farm in New Hampshire. Yours truly was there, learning about fungal duff management and other good things.

Paper 22
article thumbnail

V-J Day at WNYC: A Behind the Scenes Look

Archives Blogs

WNYC Program Director Nathan M. Rudich in the 1940s courtesy of Glynn Rudich. Seventy-two years ago today WNYC program director Nathan M. Rudich arrived at the studio at 6:15 a.m. just before the AM station signed on. News and Special Events Director Lily Supove had been at her desk since 4:30 a.m. It would be another in a series of nerve-wracking days anticipating confirmation that the war was really over.

article thumbnail

Russian Privacy Regulator Adds Countries to List of Nations with Sufficient Privacy Protections

Hunton Privacy

As reported in BNA Privacy & Security Law Report , on August 9, 2017, the Russian privacy regulator, Roskomnadzor, expanded its list of nations that provide sufficient privacy protections to allow transfers of personal data from Russia. Russian law allows data transfers to countries that are signatories to the Council of Europe’s Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (the “Convention”), and to certain other non-signatory countries d

Privacy 70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Paul Robeson Hosts WQXR Program

Archives Blogs

There are recordings of Paul Robeson singing, acting, narrating, testifying before Congress, and making speeches at rallies and protests. But doing a record show? Well, we wish we had a recording the of program he did on WQXR when the above photo was taken. But alas, it has yet to surface. Still, the occasion is worth noting. Keynote Record’s Eric Bernay[1] had just released an album of three discs recorded two years earlier in Spain during that country’s tragic civil war.