Wednesday, November 25, 2015

New IBM tech lets apps authenticate you without personal data

Computerworld Data Management
November 25, 2015

New IBM tech lets apps authenticate you without personal data

Back in January, IBM announced Identity Mixer, a new technology for protecting users' personal data during authentication. Now it announced that the technology is available to developers on its Bluemix cloud platform. READ MORE

Twitter
 

Issue highlights

1. Startup Humanyze's 'people analytics' wants to transform your workplace

2. 5 things you need to know about legally transferring data out of Europe

3. Court tosses out Oracle's bid to disqualify Java expert

4. Organizations are sloppy about securing privileged accounts

5. Why do we visualize data?

6. In wake of Paris attacks, legislation aims to extend NSA program

7. A tale of two women: Same birthday, same Social Security number, same big-data mess

8. Healthcare security and HIPAA: Why compliance and security are still lacking

White Paper: IBM

Data Warehouse and Data Management Solutions for Analytics

Entering 2015, the data warehouse has expanded to address multiple data types, processing engines and repositories. We now see a much wider separation in the Leaders quadrant. Enterprise architects and data warehouse managers must work with their CIOs to address the new demands and solution options. Learn More

Startup Humanyze's 'people analytics' wants to transform your workplace

The company has developed a wearable device called the Sociometric Badge that can be used to track people's social activity at work -- where they go within the company, who they talk to, and how they interact. The goal is to help companies understand their employees better, with an eye toward optimizing communication, collaboration and innovation. READ MORE

5 things you need to know about legally transferring data out of Europe

The U.S.-EU Safe Harbor agreement on transatlantic data transfers is dead. What now? READ MORE

Court tosses out Oracle's bid to disqualify Java expert

A court in San Francisco has declined Oracle's bid to disqualify an expert in its copyright dispute with Google over the use of Java code in the Android mobile operating system. READ MORE

Organizations are sloppy about securing privileged accounts

While most companies have processes in place for managing administrative and other privileged accounts -- the sorts of credentials frequently used in high-profile data breaches for the past several years -- most do a poor job of enforcing those processes. READ MORE

Webcast: IBM

Architecture Anxiety: What Keeps IT Leaders Up at Night?

A new independent study conducted by IBM Power Systems reveals the most pressing items that are vexing IT leaders as they look ahead. Maintaining a competitive edge and delivering as much value from the information as possible remains a key focus, all while keeping costs to a minimum. Learn More

Why do we visualize data?

Do data visualizations aim to inform audiences effectively? Or do they simply aim to catch people's eye, providing the just gist of the data? This is a question which has been hotly debated by some of the leading authors in the field of data visualization recently. From the IDG Contributor Network. READ MORE

In wake of Paris attacks, legislation aims to extend NSA program

A U.S. senator plans to introduce legislation that would delay the end of the bulk collection of phone metadata by the National Security Agency to Jan. 31, 2017, in the wake of renewed security concerns after the terror attacks in Paris. READ MORE

A tale of two women: Same birthday, same Social Security number, same big-data mess

Two Florida women were born on the same day in the same state and given almost the same name. Though no one realized it at the time, it turns out they were also given the same Social Security number. READ MORE

Healthcare security and HIPAA: Why compliance and security are still lacking

A number of healthcare data breaches have made the news of late, particularly involving large insurance companies and data clearinghouses. Often overlooked in press reports are the smaller practices, which are seldom fully HIPAA compliant. This article will discuss the reason compliance is lacking, and outline how to get started. From the IDG Contributor Network. READ MORE

White Paper: LogRhythm

SIEM Critical Capabilities Report

"Critical capabilities" are attributes that differentiate products/services in a class in terms of their quality and performance. Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for acquisition decisions. Learn More

Is your IT department a great place to work?
Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 23rd annual Best Places to Work in IT list. We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities. Nominate a company now through Dec. 21, 2015.

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Read about the 6 traits of rising IT stars
Check out our October Digital Magazine, featuring a look at some of IT's rising stars. What qualities put IT pros on the fast track to the top? These five up-and-coming execs (and their bosses) offer advice on ways to hone your own leadership skills. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.

Follow Computerworld

You are currently subscribed to computerworld_data_management as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2015 Computerworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@computerworld.com. **

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:29 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive