background preloader

Data

Facebook Twitter

DataCenter Partner University 2015. ▲ Back to Top Willkommen Sehr geehrter Partner, hiermit laden wir Sie herzlich zu unserer Data Center & Cloud Partner University im November nach Stuttgart ein. Wir möchten Sie über die neuesten Entwicklungen in folgenden Bereichen informieren: Stateless Infrastructure (ACI, Nexus, UCS) Cisco Cloud Lösungen (Bimodal-IT, Cisco Intercloud, Cisco ONE Enterprise Cloud Suite) Opensource im Enterprise Umfeld (Openstack, Linux Container, Data/Analytics) Zusätzlich bieten wir Ihnen die Möglichkeit, am ersten Tag an ausgewählten Whisper Sessions und Labs teilzunehmen. Bei der Registrierung haben Sie die Auswahl sich für den ersten und/oder zweiten Tag entsprechend anzumelden. Wir freuen uns auf Ihre Teilnahme an der Data Center & Cloud Partner University und wünschen Ihnen eine gute Anreise. Mit freundlichen Grüßen Ihr Deutsches Partner Enablement Team germany-partner-enablement@cisco.com Agenda 09. 10. Track 1 – Stateless Infrastructure Technische Updates zu ACI, Nexus und UCS Track 2 – Cloud Lösungen.

Data retention: we need this Opposition to oppose. Opinion Posted Instead of stepping up as a party of opposition, Labor has thrown Tony Abbott a mass surveillance lifeline and indicated it will support his attack on our freedoms, writes Scott Ludlam. This earnest and reasonably accurate tweet from Labor Party headquarters caught my eye this morning, and momentarily seemed to capture everything that is broken about Australian politics: The worst Prime Minister in Australian history, mortally damaged from a series of self-inflicted political disasters, gropes towards the only thing he thinks can save him: fear. To terrify the Australian people into putting up with him until the 2016 election. To this end, he is clutching at laws to force Australian telecommunications providers to entrench passive electronic surveillance across everyone in the country: a two-year mandatory data retention regime.

You saw this coming, didn't you: Labor proposes to cave in. Mass-surveillance tools are weapons, developed to fight wars. #StopDataRetention. GitHut - Programming Languages and GitHub. The EU data protection regulation after 3 years of negotiation | Inside Privacy. By Jean de Ruyt and Sebastian Vos On January 25, 2012, the European Commission presented a proposal for a “Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data”, the “Data Protection Regulation” (DPR). The Commissioner in charge of justice at the time, Viviane Reding, aware of the complexity of the matter, stated jokingly that she hoped a decision on this proposal would at least be reached by the end of her term, i.e. in October 2014. Reding is now gone, a new EU Commission is in place, but the Council of Ministers has only agreed very recently on a few chapters of the ninety page proposal; “Trilogue” negotiations between the European Parliament, the Council, and the Commission have not even started.

Why is this exercise so difficult when the main objective – better protecting peoples’ data – should be a consensus priority on the EU agenda? The answer to this question is two-fold: Where do we go from here? Sid_analysts_can_now_unminimize_uk_phone_data. World's Biggest Data Breaches & Hacks. Skip to content New! Learn to do data-viz with our online seminars. Book now! World’s Biggest Data Breaches & Hacks Loading Share this: Facebook 7,592 Twitter 11,308 Reddit 243 LinkedIn Pinterest Sign up for more! World’s Biggest data breaches and hacks.

Let us know if we missed any big data breaches. Created with data-visualisation software VizSweet. » See the data: bit.ly/bigdatabreaches » Safely check if your details have been compromised in any recent data breaches: Learn to Create Impactful Infographics » Sign up to be notified when we release new graphics» Check out our beautiful books» Learn to create visualizations like this: Workshops are Beautiful Sources: IdTheftCentre, DataBreaches.net, news reports Credits: Design & concept: David McCandless Code: Tom Evans Tech: VizSweet Balloon Race Research: Miriam Quick, Ella Hollowood, Christian Miles, Dan Hampson, Duncan Geere Data: View the data Topics: Tech & Digital More Snake Oil Cannabis? Is yours here? Witter / ? 30 amazing data viz galleries everyone should follow. Not so long ago, we brought to you a set of Pinterest users to follow, as an example of the kind of curating efforts many people are making in social network websites such as that one.

But is that the only option, to quickly look out for thew best examples of infographics? Of course not. There are plenty of websites to bookmark, if what you’re looking is visual inspiration Before we go any further, a couple of notes: we’re not listing graphics desk or publishers portfolios/online galleries, or featuring any individual or collective portfolio, as it would make this post immense – much more than what already is.

For the same reason, we’re leaving out those social networks such as Pinterest, Facebook, Twitter, NewsPageDesigner, LinkedIn, Flickr, and all the others where, either through personal or institutional profiles, or through public and private groups, infographics and data visualizations are collected/shared. Visual Complexity (image: Visual Complexity) Visualizing.org Newsvis.org. Do you need to quickly become a data scientist? Great guide for self starters #datascience #bigdata. US data breach notification laws by state. Verizon Data Breach Investigations Report. Business increasingly hit by unknown malware, data shows.

A strike by a piece of new and unknown malware took place every 27 minutes in 2013, analysis of security events around the world has revealed. A third of the 10,000+ organisations surveyed downloaded at least one infected file with unknown malware between June and December 2013, according to the latest annual threat report by security firm Check Point. Getty Images/Hemera Of these infected file types, 35% were PDFs, said the report, which is based on data on hundreds of millions of security events gathered from the firm’s global network of threat sensors. The data reveals that new tools called ‘crypters’ are enabling malware writers to bypass detection by anti-malware software. According to the report, malicious software was downloaded every ten minutes in 84% of the organisations under analysis. For 58% of the organisations, users downloaded malware every two hours or less in 2013, compared with just 14% the year before.

Email Alerts. Open source diagramming framework for Java | Datagr4m. Ein Doku-Spiel im Herzen der Erdölindustrie: Fort McMoney – Die Stadt mit zwei Gesichtern - Data Nachrichten. Practical-tools-hadley-wickham.pdf. NSA Surveillance: First Prism, Now Muscled Out Of Cloud. Companies can no longer discount the risk of losing control of confidential corporate data in the cloud. Government data mining is here to stay, in one invasive form or another. The latest round of stunning revelations of National Security Agency (NSA) surveillance and data mining of cloud-based services and Internet communications has added a new term to our lexicon of government spying.

In addition to Prism, we now have Muscular looming over cloud adoption. The Muscular revelations are eye opening because, according to The Washington Post, they point to a far wider scope and far more indiscriminate data capture than even the Prism revelations suggest. This collection is done by intercepting private links that connect Google and Yahoo datacenters around the world -- and decrypting the traffic that should be protected in transit. Inevitably, we find ourselves asking the same set of questions we did when reports of Prism emerged. More Insights. T. Hunk: Raw data to analytics in < 60 minutes. Update: now with UI setup instructions Finally, I got a bit of down time to sit down and get to the third part of the “Hunk: Splunk Analytics for Hadoop Intro” series of blogs, a follow up to part 1 and part 2 Summary of what we’ll do 1. Set up the environment 2. Configure Hunk 3. So let’s get started .. Minutes 0 – 20: Set up the environment In order to get up an running with Hunk you’ll need the following software packages available/installed in the server running Hunk: 1.

Installing the Hunk bits is pretty straightforward: #1. untar the package > tar -xvf splunk-6.0-<BUILD#>-Linux-x86_64.tgz #2. start Splunk > . Download and follow the instructions for installing/updating Java and the Hadoop client libraries and make sure you keep note of JAVA_HOME and HADOOP_HOME as we’ll need it in the next section.

Minutes 20 – 40: Configure Hunk using the UI 1. 2. 3. 4. 5. 6. 7. You can skip the next section if you’re not interested in learning how to configure Hunk using the conf files. Glad you asked. Council of the European Union Discusses Progress on the Proposed EU Data Protection Regulation. On June 6, 2013, the European Union’s Justice and Home Affairs Council held legislative deliberations regarding key issues concerning the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). The discussions were based on the Irish Presidency’s draft compromise text on Chapters I to IV of the Proposed Regulation, containing the fundamentals of the proposal and reflecting the Presidency’s view of the state of play of negotiations.

At the Council meeting, the Presidency was seeking general support for the conclusions drawn in their draft compromise text on the key issues in Chapters I to IV. Alan Shatter, Minister for Justice, Equality and Defense of Ireland, who chaired the meeting, noted the extensive work completed and progress made since the previous Council meeting on March 7-8, 2013. Some of the main issues discussed during the deliberations included: Legal Form Consent Risk-based Approach EU Institutions, Agencies, Bodies and Offices. NSA spying scandal fallout: Expect big impact in Europe and elsewhere (Updated)

UPDATE: I’ll admit I am shocked to have received this response from the European Commission to my request for comment, with particular regard to the impact on EU citizens’ privacy: “We do not have any comments. This is an internal U.S. matter.” For the reason behind my surprise, read on… This is a great day to be a conspiracy theorist. Vindication! The National Security Agency – part of the U.S. military – reportedly has a direct line into the systems of some of the world’s biggest web and tech companies, all of which are of course sited in the U.S. The companies themselves – Google, Facebook, Apple, Yahoo and so on – have denied the existence of these backdoors , but the U.S. authorities have not.

That last part appears to be nonsense, hence the uproar within the U.S., but let’s for a moment take the Obama administration at its word and pretend it’s not spying on its own citizens. Great timing Guess which side of this battle just got a boost? Unsafe Harbor? Cloud impact. Data, Data, Data: Thousands of Public Data Sources. We love data, big and small and we are always on the lookout for interesting datasets. Over the last two years, the BigML team has compiled a long list of sources of data that anyone can use. It’s a great list for browsing, importing into our platform, creating new models and just exploring what can be done with different sets of data. In this post, we are sharing this list with you. Why? Well, searching for great datasets can be a time consuming task.

Categories of data sources We grouped the links into some categories that bit.ly calls ‘Bundles’ to help you find what you are looking for and bundled the Bundles into a single Data Sources Bundle. Machine Learning Datasets Although many datasets can be used for machine learning tasks, the sources in this Bundle are specifically pre-processed for machine learning. Machine Learning Challenges Our next bundle of links contains links to Machine Learning Challenges. Marketplaces and data hubs Open companies Data search engines Data Journals. A Map of Muslim Protests Around the World - Global. The Best Data Visualization Projects of 2011. I almost didn't make a best-of list this year, but as I clicked through the year's post, it was hard not to.

If last year (and maybe the year before) was the year of the gigantic graphic, this was the year of big data. Or maybe we've gotten better at filtering to the good stuff. (Fancy that.) In any case, data graphics continue to thrive and designers are putting more thought into what the data are about, and that's a very good thing. So here are my favorites from 2011, ordered by preference. 1. While creator Mike Bostock made the initial commit to GitHub in late 2010, D3 hit its stride in 2011. 2. Who knew carrying around a stick that detects WiFi vertically could be so informative?

3. Media artist Roger Luke DuBois used online dating data to show the uniqueness of cities in America. 4. From Bloom, Planetary is an iPad app that visualizes your iTunes music as a solar system, bringing your data into a more playful and exploratory context. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Five Big Database Breaches of 2011's Second Half. FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication. By Phil Dunkelberger President & CEO, Nok Nok Labs, 3/26/2014 1 Comment | Read | Post a Comment News Hackers interrupt and deface sites of black-market forums selling credit card data stolen from Target and other retailers.By Mathew J.

Schwartz , 3/18/2014 4 comments | Read | Post a Comment Breaches create outliers. 1 Comment | Read | Post a Comment Commentary Is "browser-ized" security a better defense against hackers than traditional methods? 2 comments | Read | Post a Comment Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.By Tim Wilson Editor in Chief, Dark Reading, 2/18/2014 0 comments | Read | Post a Comment Report suggests malware-laced email attack on Target's HVAC subcontractor leaked access credentials for retailer's network.By Mathew J. 12 comments | Read | Post a Comment More Stories. Too-much-information-social-networking-sites-help-hackers-break-corporate-networks.htm;jsessionid=HYRZMNlMghLgZZIwubYrpQ**

Twitter