Posts

Magic Quadrant for Data Science and Machine-Learning Platforms

Image
Data science and machine-learning platforms enable organizations to take an end-to-end approach to building and deploying data science models. This Magic Quadrant evaluates 16 vendors to help you identify the right one for your organization's needs. This Magic Quadrant evaluates vendors of data science and machine-learning platforms. These are software products that data scientists use to help them develop and deploy their own data science and machine-learning solutions. More precisely, Gartner defines a data science and machine-learning platform as: A cohesive software application that offers a mixture of basic building blocks essential both for creating many kinds of data science solution and incorporating such solutions into business processes, surrounding infrastructure and products. Machine learning is a popular subset of data science that warrants specific attention when evaluating these platforms. Cohesiveness is an important attribute of a data science and machine-le...

"C" The Programming Language Of The Year

Image
According to the February issue of SD Times . The “C” programming language has made a comeback. In fact it has been declared the “programming language of the year” by the TIOBE Index. It was reported last month that the general-purpose programming language and Kotlin were the top competitors for TIOBE’s 2017 award. The TIOBE Index measures popularity of programming languages, and is updated once a month. While C has held one of the top positions on the TIOBE Programming Community Index over the last several years, it has come a long way. In 2016, the index revealed that interest in C was plummeting as it struggled to compete against the web and mobile development world. Despite all this, it is remarkable to see that C is getting more popular after a steep downward trend that started at the end of 2015. C had a rating of more than 17% at that time and lost more than 10% after that during the next 18 months. A possible reason for this revival is that C is very popular in the growing...

Becoming a Global IT Leader

Image
According to the latest issue of CIO magazine, as organizations expand to new locations around the world, a growing number of IT leaders are finding themselves collaborating with colleagues, staff and business partners in places with drastically different personal, work and ethics practices. The following is a review of the main points of this excellent article: "IT professionals must be prepared to drive innovation in today’s globally interconnected markets," says Sandra Smith, director of Brown University's IT Leadership Program. "To this end, they need transferable leadership skills effective across all markets, industry and cultures." A successful global IT leader can come from any background, notes Doug Bordonaro, chief data evangelist at analytics developer ThoughtSpot, where he works with numerous Global 500 companies. Ultimately the most successful business people have three core traits: respect for foreign cultures, a skill that is in demand, and ...

What is a VPN and Why is it a Good Idea?

Image
A virtual private network, or VPN, can help secure your web browsing and protect your anonymity online from anyone who wants to steal or monetize your data. A VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, so your data is secure from prying eyes. Best of all, your computer appears to have the IP address of the VPN server, masking your identity. To understand the value of a VPN, it helps to think of some specific scenarios in which a VPN might be used. Consider a public Wi-Fi network, perhaps at a coffee shop or airport. Like many of us, you might connect to it without a second thought. But do you know who might be watching the traffic on that network? Can you even be sure the Wi-Fi network itself is legitimate, or could it be controlled by a hacker who's after your personal data? Think about passwords, bank account data, credit card numbers, and private information th...

Transformational Trends in IT for 2018

Image
According to CIO magazine, the relentless pace of technological change is impacting consumer expectations at a faster rate than ever, making any prediction challenging. Data security and privacy will continue to take center stage: How personal data is used. The ramifications of data breaches. And the importance of data to companies. Other trends we are likely to see include: AI and IoT Converge IoT will become part of the fabric of an organization in 2018. The challenge for CIOs and our teams will be how to integrate device management into overall IT infrastructure in a way that doesn’t overwhelm the organization. Applications Managed in Real Time Companies are beginning to explore what they can really do with the security, agility and flexibility of virtualized network services. Cybersecurity, Fully Embedded Threat detection capabilities embedded into platforms. End-to-end managed security infrastructure for the network, the developer, and applications. Proactive, predicti...

First Amendment and Free Speech Online

Image
"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances." That's it. That's all the United States Constitution's First Amendment actually says. There's a lot in just those few sentences, and it's crucial to know when and how it applies to common situations. Especially given the widespread use of Social Media. For examples of First Amendment arguments presented by constitutional law expert, Lata Nott, executive director of the Newsium Institute's First Amendment Center, follow this link: http://www.cnn.com/2017/04/27/politics/first-amendment-explainer-trnd/index.html

Digital Identity Guidelines

Image
"Digital Identity" is the unique representation of a subject engaged in an online transaction. "Identity Proofing" establishes that a subject is actually who they claim to be.  "Digital Authentication" is the process of determining the validity of one or more authenticators used to claim a digital identity.  Authentication establishes that a subject attempting to access a digital service is in control of the technologies used to authenticate. For services in which return visits are applicable, successfully authenticating provides reasonable risk-based assurances that the subject accessing the service today is the same as the one who accessed the service previously. Digital identity presents a technical challenge because it often involves the proofing of individuals over an open network and always involves the authentication of individuals over an open network. This presents multiple opportunities for impersonation and other attacks which can...