Dark data? Not if Teradata and Nuix can help it

Big data may promise a world of new insight, but if it can't be analyzed, you can kiss that potential goodbye. Enter Teradata and Nuix, which on Tuesday teamed up to bring so-called "dark data" to light.Dark data is generally considered any data that gets overlooked and underused, often because employees don't know it's there or don't know how to access it. It's widely thought that dark data accounts for a majority of most companies' information assets.Through their partnership, the companies will integrate Nuix's namesake data processing and indexing engine with Teradata's Aster Analytics software, giving organizations a new way to uncover their dark data and analyze it on the spot.To read this article in full or to leave a comment, please click here

Limited time offer: Pre-Order The Complete iOS 10 Developer Course – Deal Alert

What better way to prepare for iOS 10’s arrival than with nearly 200 hours of premium training? Pre-order the Complete iOS 10 Developer Course for $29, and you’ll be more than set to craft stunning apps certain to top the iTunes Store leaderboard.Whether you’re mastering the fundamentals of programming, or digging into iOS 10-specific features (improved AI and Siri function, anyone?)--this course will have you covered. And afterwards, dive into the bonus ‘The Complete iOS 9 Hacker Training’ course really brush up on your skills. You’ll make dozens of apps with Swift 2 and Xcode 7, giving you a hefty portfolio of apps that’ll more than prep you for the iOS 10 revolution.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Lost underground? IoT beacons help subway riders find their way

Navigating through a subway is like a scavenger hunt: You have to look for clues on where to go next.And GPS, though it works well above ground where satellites provide coordinates to find your bearings, can't help. Underground you can't get accurate coordinates to determine your location and choose a path. Multiple underground floors, thick walls and dozens of stairways mean a different solution is needed—one that: Has virtual guideposts that allow a person to get their bearings deep underground Is affordable so that hundreds of beacons can be installed for better accuracy Is a self-powered system that doesn’t require batteries Underground in Tokyo: Navigating the Shibuya Station Tokyo is attempting to solve the navigation problem in its Shibuya Station. The station, a maze with eight train lines, has more than a million people traveling its confusing pathways and platforms every day. To help those commuters, the city is implementing an ambitious project that uses augmented reality (AR), Bluetooth beacons and a mobile app to direct passengers to their destination. To read this article in full or to leave a comment, please click here

15% off Google OnHub AC1900 Wireless Wi-Fi Router – Deal Alert

The OnHub AC1900 wireless router from Google and TP-LINK is designed to make even the more complicated home networks run fast and efficiently. It supports over 100 devices at one time, providing speeds of up to 1900mbps. It's unique circular design with 13 antennas provides up to 2,500 square feet of reliable coverage. Streaming a movie or downloading large files? OnHub lets you manage speeds to specific devices or give a boost where/when needed. The On App lets you manage, prioritize and troubleshoot right from your device, at home or away. OnHub currently averages 4.5 out of 5 stars on Amazon from over 500 people (read reviews). It's typical list price of $199.99 has been reduced 15% to $169.99. See the discounted Google OnHub AC1900 wireless router now on Amazon.To read this article in full or to leave a comment, please click here

15% off Google OnHub AC1900 Wireless Wi-Fi Router – Deal Alert

The OnHub AC1900 wireless router from Google and TP-LINK is designed to make even the more complicated home networks run fast and efficiently. It supports over 100 devices at one time, providing speeds of up to 1900mbps. It's unique circular design with 13 antennas provides up to 2,500 square feet of reliable coverage. Streaming a movie or downloading large files? OnHub lets you manage speeds to specific devices or give a boost where/when needed. The On App lets you manage, prioritize and troubleshoot right from your device, at home or away. OnHub currently averages 4.5 out of 5 stars on Amazon from over 500 people (read reviews). It's typical list price of $199.99 has been reduced 15% to $169.99. See the discounted Google OnHub AC1900 wireless router now on Amazon.To read this article in full or to leave a comment, please click here

What A Turkish Coup Taught Me About The Media & The Power Of Internet Performance

As a former journalist, I find my role as Director of Corporate Comms at Dyn fascinating. Based on the fact that Dyn has a unique perspective of the internet and employs world-class data scientists, we frequently find ourselves at the center of news cycles – though it would be more accurate to call them storms because of the flurry of activity that happens in a short period of time.

There was no greater example of this than in December of 2014 when our own Doug Madory was the first person to discover that North Korea was offline. This was at the time of North Korea’s alleged hack of Sony, which was major international news. When Doug sent out his first tweet the media floodgates opened. I remember fielding calls from Japanese television stations.

This happened on a smaller scale when Iraq shut down the internet and when a Facebook clone went online in North Korea. However, the most recent event came just last week when the Turkish military staged an unsuccessful coup in Istanbul.

esrk / Shutterstock.com

esrk / Shutterstock.com

While it is exciting to play a role in these breaking news situations and the exposure for Dyn is always good, the Continue reading

Carbon Black buys Confer for next-gen anti-virus

Carbon Black has bought Confer to boost its protection for network endpoints using a behavioral form of antivirus combined with cloud analysis of threats rather than traditional signature-based software.Called Cb Defense, the renamed Confer product uses behavior-based techniques to prevent attacks from getting started and blends in attack-detection and response as a way to halt ongoing attacks.These are supported by analytics based in the cloud that help detect malwareless attacks that employ legitimate tools that are built into operating systems as a way to stay below the radar of defenses that use hashes and signatures to detect.To read this article in full or to leave a comment, please click here

Carbon Black buys Confer for next-gen anti-virus

Carbon Black has bought Confer to boost its protection for network endpoints using a behavioral form of antivirus combined with cloud analysis of threats rather than traditional signature-based software.Called Cb Defense, the renamed Confer product uses behavior-based techniques to prevent attacks from getting started and blends in attack-detection and response as a way to halt ongoing attacks.These are supported by analytics based in the cloud that help detect malwareless attacks that employ legitimate tools that are built into operating systems as a way to stay below the radar of defenses that use hashes and signatures to detect.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber attacks are on the rise

It's one thing to have security vendors email me suggesting that cyber attacks are getting worse. It's another thing altogether when a vendor comes to me with hard metrics. Such is the case with Arbor Networks, the security division of NETSCOUT.Given Arbor is all about helping to protect enterprise and service provider networks from distributed denial-of-service (DDoS) attacks, it is fair to suggest that any mention of increasing attack numbers is a little self-serving. But ulterior motives notwithstanding, it's worth hearing what they found.+ Also on Network World: DDoS attacks are more than disruptions to service +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyber attacks are on the rise

It's one thing to have security vendors email me suggesting that cyber attacks are getting worse. It's another thing altogether when a vendor comes to me with hard metrics. Such is the case with Arbor Networks, the security division of NETSCOUT.Given Arbor is all about helping to protect enterprise and service provider networks from distributed denial-of-service (DDoS) attacks, it is fair to suggest that any mention of increasing attack numbers is a little self-serving. But ulterior motives notwithstanding, it's worth hearing what they found.+ Also on Network World: DDoS attacks are more than disruptions to service +To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

DARPA tackling reusable, modular chipset technology

Is it possible to develop chip technology that combines the high-performance characteristics of ASICS with the speedy, low-cost features of printed circuit boards?Scientists at the Defense Advanced Research Projects Agency this week said they were looking for information on how to build interface standards that would enable modular design and practical circuit blocks that could be reused to greatly shorten electronics development time and cost.+More on Network World: ‎DARPA: Researchers develop chip part that could double wireless frequency capacity+To read this article in full or to leave a comment, please click here

Sponsored Post: Cassandra Summit, Scalyr, Gusto, LaunchDarkly, Awake Networks, Aerospike, VividCortex, MemSQL, AiScaler, InMemory.Net

Who's Hiring?

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

  • Awake Networks is an early stage network security and analytics startup that processes, analyzes, and stores billions of events at network speed. We help security teams respond to intrusions with super-human  efficiency and provide macroscopic and microscopic insight into the networks they defend. We're looking for folks that are excited about building systems that handle scale in a constrained environment. We have many open-ended problems to solve around stream-processing, distributed systems, machine learning, query processing, data modeling, and much more! Please check out our jobs page to learn more.

Fun and Informative Events

  • Join database experts from companies like Apple, ING, Instagram, Netflix, and many more to hear Continue reading

Crypto: Nominated to the Cybersecurity Canon

If you are a cybersecurity professional or interested in cybersecurity at all, you should be familiar with the Cybersecurity Canon. What is a canon? There are lots of definitions, but the one that applies here is “a sanctioned or accepted group or body of related works.” With this definition in mind, the stated goal of the Cybersecurity Canon is: “To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.”To read this article in full or to leave a comment, please click here