background preloader

Big Data : pourquoi nos métadonnées sont-elles plus personnelles que nos empreintes digitales

Big Data : pourquoi nos métadonnées sont-elles plus personnelles que nos empreintes digitales

Related:  `bloc-test 1001Chapitre 3 : Le SIMcatalix

Big Data Needs a Big Theory to Go with It As the world becomes increasingly complex and interconnected, some of our biggest challenges have begun to seem intractable. What should we do about uncertainty in the financial markets? How can we predict energy supply and demand? How will climate change play out? NSA files decoded: Edward Snowden's surveillance revelations explained Two factors opened the way for the rapid expansion of surveillance over the past decade: the fear of terrorism created by the 9/11 attacks and the digital revolution that led to an explosion in cell phone and internet use. But along with these technologies came an extension in the NSA’s reach few in the early 1990s could have imagined. Details that in the past might have remained private were suddenly there for the taking.

Paris Metro Tracks and Trackers: Why is the RATP App leaking my private data? (Continued…) » Privatics The PRIVATICS Inria team – July 2nd, 2013 – (this blog has been modified on July 5th, 2013 upon request of FaberNovel) The RATP Android App This post is follow-up of our previous post about private data leakage by the RATP’s iOS App. To make our study complete, we also analyzed the RATP Android App (version 2.8), once again developed by FaberNovel as mentioned in the screenshot below. We also see the same privacy policy as that of the iOS version: “The services provided by the RATP application, like displaying geo-targeted ads, do not involve any collection, processing or storage of personal data” (translated).

Best Supercomputers Still Not Best for Big Data This week, China reclaimed the distinction of running the world’s fastest supercomputer; it last held that first-place ranking for eight months starting in October 2010 with its Tianhe-1A machine. Its new Tianhe-2 (“Milky Way–2”) computer is putting its competition to shame, however, performing calculations about as fast as the most recent No. 2 and No. 3 machines combined, according to Jack Dongarra, one of the curators of the list of 500 most powerful supercomputers and professor of computer science at the University of Tennessee, Knoxville. Murphy chairs the executive committee of an alternative supercomputer benchmark called Graph 500. Named for the mathematical theory behind the study of networks and numbered like its long-established competitor, Top500, Graph 500 quantifies a supercomputer’s speed when running needle-in-a-haystack search problems.

Algorithms and Future Crimes: Welcome to the Racial Profiling of the Future Photo Credit: February 28, 2014 | Like this article? Join our email list: Google Glass: The opposition grows The opposition will congregate in dark corners. They will whisper with their mouths, while their eyes will scan the room for spies wearing strange spectacles. The spies will likely be men. How many women would really like to waft down the street wearing Google Glass ? It won't be easy.

Gamification By now you’ve likely heard about gamification in business, specifically how it’s meant to engage customers and boost employee productivity. Many places are treating gamification like a magic wand, able to cure all of a company’s ills while increasing revenues. This might be overstating its effect, but gamification can still have a positive impact on a business, which is why so many organizations are jumping on the bandwagon. The big question remains: is gamification the right move for your business? It’s certainly not the right fit for everyone, so there are some questions you should answer before implementing this latest trend.

How the NSA Plans to Infect 'Millions' of Computers with Malware One presentation outlines how the NSA performs “industrial-scale exploitation” of computer networks across the world. Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan.

Related:  Big Data