Thom Heemstra's blog

You are here: Home / Archives for Big Data

Internet Privacy Issues And Ways It Can Be Compromised

13th September 2019 by thom Leave a Comment

It has become nearly impossible for everyone to live an anonymous life on the internet. No one can imagine how much they are vulnerable and to what extent their personal information is available on the internet (Chaum, 2016). Everyone has to face privacy issues as the marketers keep on gathering information about individuals in order to run their business and cater to new customers. [Read more…]

Filed Under: Big Data, Privacy, Responding to news, Security

5 Interesting Developments In The Iot World

2nd August 2019 by thom Leave a Comment

The internet of things is a system of interrelated computing devices, people, objects, mechanical devices that provide two benefits. The first one is that it requires unique identifiers (UIDs) and the second one is that it helps to transfer the data over a network without any interference of anyone. The technology is emerging immensely that it has IoT to put forward its contributions as well by making amazing developments that are as follows (Fan & Chen, 2017): [Read more…]

Filed Under: Big Data, Internet of Things, Privacy, Responding to news, Security

Why Should A User Have An Adaptive Defense?

12th July 2019 by thom Leave a Comment

With the progressing field of information technology, network attacks are also something that has grabbed everybody’s attention. The network attacks have been increased due to which the developers have to introduce systems or methods which will help in detecting these attacks. Based on the principle of Adaptive Defense, Panda has developed a security suite and it is known as Panda Adaptive Defense. It operates on the basis of four principles. The first principle is prevention, detection and response. It is applicable for both the malware and malware-less attacks. The second principle is real-time and historical visibility. It not only detects the threats rather it also provides detailed information about all the actions that are taken in order to trace that threat (Panda Security SL (ES), 2015). The third principle is that it provides 100% classification of processes. They follow this principle by detecting threats using machine language and the malware experts as well. The last principle is threat hunting and forensic analysis. As it is an advanced cybersecurity system so it detects or hunts the future threats as well and after that, the analysis is performed by the expert analysts. [Read more…]

Filed Under: Artificial Intelligence, Big Data, Privacy, Security

Cloud computing & Cybersecurity: The changing trends

4th January 2019 by thom Leave a Comment

Cloud Computing and Cybersecurity is slowly becoming one with each other. Without the latter, the former isn’t feasible.

A simple way to describe Cloud computing is that it’s the delivery of on-demand computing services through the means of internet, basically using someone elses computing power. It is used to deliver the processing power needed to run applications, storage of files or processing requests. Generally, to a person that needs those services, but lack the required infrastructure. It was storage that Cloud computing was initially famous for. (Rossi, B. 2017)

Now, let us see some trends that are quickly changing in Cloud Computing and Cyber Security. [Read more…]

Filed Under: Big Data, New Media, Responding to news, Security Tagged With: Artificial Intelligence, cloud, cloud computing, security

Information Security: 6 things to keep in mind when writing data protection policies

2nd March 2018 by thom Leave a Comment

A comprehensive definition of Information Security is: ‘Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information’. (Rouse, 2016)

One needs to establish a set of business processes that ensures the safety of the information assets. It does not matter how information is being formatted, whether it is in transition phase or is stored at a single place. The responsibility includes every kind of information that is related to you or your company and its relations. Information Security or Infosec programs are based on CIA triad objectives: maintaining the confidentiality, integrity and availability of IT systems and business data. (Rouse, 2016) [Read more…]

Filed Under: Big Data, Security Tagged With: ibs, information management

Machine Learning & Artificial Perception: Antidotes to Online Threats

1st September 2017 by thom Leave a Comment

Technology has changed the way we perceive things and work. It has made things possible which were inconceivable a century ago. Tedious tasks that seemed tiresome and no one wanted to be the one doing it, are now piece of cake. Huge amount of data now can be processed, stored and analyzed through the use of latest innovations. But like any new invention and innovation, the facilities do come with their own sets of problems. (Dickson, 2016) [Read more…]

Filed Under: Artificial Intelligence, Big Data, Internet of Things Tagged With: AI, Artificial Intelligence, Big Data, Machine Learning

Internet of Things (IoT) and Big Data – What’d Be The Connection?

14th July 2017 by thom Leave a Comment

Talking about the technology, everything now seems a cliché. Same goes for Internet of Things and Big Data for some time now. The connection between IoT and Big Data become obvious when we see tons of data being transmitted through Internet of Things on daily basis. This data is being used to run analysis, to help develop a pattern and trends and bring positive changes in our lives. Let us start by first learning a little about Big Data and IoT. [Read more…]

Filed Under: Big Data, Internet of Things, New Media Tagged With: Big Data, iot

Error: To protect our users from spam and other malicious activity, this account is temporarily locked. Please log in to https://twitter.com to unlock your account.

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2023 · Agency Pro Theme on Genesis Framework · WordPress · Log in