Big data is now a familiar term in most of the business world, and companies large and small are scrambling to take advantage of it. Data exhaust, on the other hand, is less widely known, and in some ways it's an evil twin brother. Here are five things you should understand about data exhaust's pros and cons.1. It's essentially all the big data that isn't core to your business. The "data exhaust" term has actually been around for more than a decade, and it arose with the new streams of data coming from smartphones, said Tye Rattenbury, director of data science and solutions engineering at Trifacta, which makes software for data preparation. Today, more accessible data tools are bringing exhaust to the fore.To read this article in full or to leave a comment, please click here
Roughly half of all Web traffic comes from bots and crawlers, and that's costing companies a boatload of money.That's one finding from a report released Thursday by DeviceAtlas, which makes software to help companies detect the devices being used by visitors to their websites.Non-human sources accounted for 48 percent of traffic to the sites analyzed for DeviceAtlas's Q1 Mobile Web Intelligence Report, including legitimate search-engine crawlers as well as automated scrapers and bots generated by hackers, click fraudsters and spammers, the company said.To read this article in full or to leave a comment, please click here
Finding insights in an ocean of data has become one of today's most pressing business challenges, and software vendors are rushing to help. The latest is Adobe, which has added a host of algorithms in its cloud services to help brands uncover patterns and put them to work.Adobe's Creative, Document and Marketing Cloud services already use data science to help brands hone their message to customers, and the algorithms announced Wednesday add more capabilities.To read this article in full or to leave a comment, please click here
The database landscape is much more diverse than it once was, thanks in large part to big data, and on Tuesday, one of today's newer contenders unveiled an upcoming release featuring a major boost in security.Version 9 of MarkLogic's namesake NoSQL database will be available at the end of this year, and one of its key new features is the inclusion of Cryptsoft’s KMIP (Key Management Interoperability Protocol) technology.MarkLogic has placed its bets on companies' need to integrate data from dispersed enterprise silos -- a task that has often required the use of so-called ETL tools to extract, transform and load data into a traditional relational database. Aiming to offer an alternative approach, MarkLogic's technology combines the flexibility, scalability, and agility of NoSQL with enterprise-hardened features like government-grade security and high availability, it says.To read this article in full or to leave a comment, please click here
The database landscape is much more diverse than it once was, thanks in large part to big data, and on Tuesday, one of today's newer contenders unveiled an upcoming release featuring a major boost in security.Version 9 of MarkLogic's namesake NoSQL database will be available at the end of this year, and one of its key new features is the inclusion of Cryptsoft’s KMIP (Key Management Interoperability Protocol) technology.MarkLogic has placed its bets on companies' need to integrate data from dispersed enterprise silos -- a task that has often required the use of so-called ETL tools to extract, transform and load data into a traditional relational database. Aiming to offer an alternative approach, MarkLogic's technology combines the flexibility, scalability, and agility of NoSQL with enterprise-hardened features like government-grade security and high availability, it says.To read this article in full or to leave a comment, please click here
It's no secret that much of the wisdom of the world lies in unstructured data, or the kind that's not necessarily quantifiable and tidy. So it is in cybersecurity, and now IBM is putting Watson to work to make that knowledge more accessible.Towards that end, IBM Security on Tuesday announced a new year-long research project through which it will collaborate with eight universities to help train its Watson artificial-intelligence system to tackle cybercrime.To read this article in full or to leave a comment, please click here
It's no secret that much of the wisdom of the world lies in unstructured data, or the kind that's not necessarily quantifiable and tidy. So it is in cybersecurity, and now IBM is putting Watson to work to make that knowledge more accessible.Towards that end, IBM Security on Tuesday announced a new year-long research project through which it will collaborate with eight universities to help train its Watson artificial-intelligence system to tackle cybercrime.To read this article in full or to leave a comment, please click here
In the early days of computing, developers were often jacks of all trades, handling virtually any task needed for software to get made. As the field matured, jobs grew more specialized. Now we're seeing a similar pattern in a brand-new domain: big data.That's according to P.K. Agarwal, regional dean and CEO of Northeastern University's recently formed Silicon Valley campus, who says big-data professionals so far have commonly handled everything from data cleaning to analytics, and from Hadoop to Apache Spark.To read this article in full or to leave a comment, please click here
Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here
Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here
Apple has stepped up its efforts to target enterprise customers through a new partnership with SAP.The companies will deliver native apps for the iPhone and iPad that tap SAP's Hana in-memory computing platform, as well as a new iOS software development kit (SDK)."SAP is the ideal partner to help us truly transform how businesses around the world are run on iPhone and iPad," said Apple CEO Tim Cook.As part of the deal, SAP will develop native iOS apps using Apple's Swift programming language. An app might enable a field maintenance worker to order parts or schedule service, for example; another might allow a doctor to share the latest patient data with other healthcare workers.To read this article in full or to leave a comment, please click here
Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here
Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here
Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here
Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.That's according to Hold Security, which says it has looked at more than 272 million unique credentials so far, including 42.5 million it had never seen before. A majority of the accounts reportedly were stolen from users of Mail.ru, Russia's most popular email service, but credentials for other services apparently were also included.Hold discovered the breach when its researchers came across the hacker bragging in an online forum. Though the hacker initially asked Hold for 50 rubles for the initial 10GB stash -- that's equivalent to about 75 cents -- he eventually turned it over to them in exchange for likes and votes for him on social media.To read this article in full or to leave a comment, please click here
It's no secret that quantum computers could render many of today's encryption methods useless, and now the U.S. National Institute of Standards and Technology wants the public to help it head off that threat.The federal agency recently published a report focusing on cryptography in a quantum world that outlines a long-term approach for avoiding the problem before it happens."There has been a lot of research into quantum computers in recent years, and everyone from major computer companies to the government want their cryptographic algorithms to be what we call 'quantum resistant,'" said NIST mathematician Dustin Moody. "So if and when someone does build a large-scale quantum computer, we want to have algorithms in place that it can't crack."To read this article in full or to leave a comment, please click here
It's no secret that quantum computers could render many of today's encryption methods useless, and now the U.S. National Institute of Standards and Technology wants the public to help it head off that threat.The federal agency recently published a report focusing on cryptography in a quantum world that outlines a long-term approach for avoiding the problem before it happens."There has been a lot of research into quantum computers in recent years, and everyone from major computer companies to the government want their cryptographic algorithms to be what we call 'quantum resistant,'" said NIST mathematician Dustin Moody. "So if and when someone does build a large-scale quantum computer, we want to have algorithms in place that it can't crack."To read this article in full or to leave a comment, please click here
It wasn't so long ago that Oracle dismissed cloud computing as "gibberish." Today, it's singing a different tune.Through a string of acquisitions, the database giant has been buying a presence in the cloud in much the same way it built up its on-premises portfolio decades ago. What remains to be seen is whether that strategy can work as well in this new setting.Acquisitions of companies such as PeopleSoft and Siebel played a key role in fleshing out Oracle's traditional applications portfolio back in the mid-2000s, helping the company become a major player in enterprise software.To read this article in full or to leave a comment, please click here
Hard on the heels of a similar purchase last week, Oracle has announced it will pay $532 million to buy Opower, a provider of cloud services to the utilities industry.Once a die-hard cloud holdout, Oracle has been making up for lost time by buying a foothold in specific industries through acquisitions such as this one. Last week's Textura buy gave it a leg up in engineering and construction."It’s a good move on Oracle’s part, and it definitely strengthens Oracle’s cloud story," said Frank Scavo, president of Computer Economics.To read this article in full or to leave a comment, please click here
"Data scientist" has already been declared this year's hottest job, and now a new report offers several more reasons to consider it as a career.For the past three years executive recruiter Burtch Works has been surveying data-science professionals about salaries and other related topics. Burtch Works defines data scientists as professionals who can work with enormous sets of unstructured data and use analytics to get meaning out of them. Published on Thursday, this year's report is based on interviews with 374 working data scientists, and it paints a pretty compelling picture. Here are five particularly attractive highlights.To read this article in full or to leave a comment, please click here