- This week, we begin with an article on technology rationalization that helps businesses assess their data needs, prioritize them & finding the best-fit tools.
- Next, is a piece about the prevalent issue of water scarcity arising due to the need of keeping the data centers cool and what measures organizations are taking to curb the environmental issues.
- Then, we have an announcement from Samsung about their data breach that happened in late July resulting in a breach of U.S. customer personal data.
- Following that, we have an analysis on calculating the value of data as an asset with the discussion about the returns of data.
- Next, is an essay describing the three key things – Knowledge Transfer, Data Sharing, and a Shared Platform, for open source to boost cybersecurity defenses.
- Lastly, we have a write-up on the need for human intervention, in terms of monitoring, in the AI-generated process & data.
Reduce The Clutter: How To Rationalize Your Data Stack
Big Data keeps getting bigger. In 2021, the Big Data Landscape grew to 2,025 technological tools, all promising to help businesses solve their data needs. The “pared down” version still offers seven categories and 96 sub-categories, with tools ranging from the old guard to cutting edge. To navigate this landscape, businesses need a framework to ensure they understand their needs and leverage tools to help them get the most out of data.
Data Centers, Backbone Of The Digital Economy, Face Water Scarcity And Climate Risk
Data centers are springing up around the world to handle the torrent of information from the expanding web of devices ingrained in people’s lives and the economy. Managing that digital information gusher is big business. It also comes with hidden environmental costs. For years, companies that operate data centers have faced scrutiny for the huge amounts of electricity they use storing and moving digital information like emails and videos.
Samsung Customers: Your Data May Have Been Breached
Samsung users should be on alert about a July data breach of U.S. customer personal data, only just announced by the tech company. On Sept. 2, Samsung notified customers of a “cybersecurity” incident that happened in late July, discovered on Aug.4, resulting in a breach of personal information including “names, contact and demographic information, dates of birth, and product registration information.”
Data’s Struggle To Become An Asset
Cash, inventory, receivables, buildings, equipment are all assets that are listed on corporate balance sheets, as are more intangible assets such as licenses, patents, and software. But what about data? Data’s biggest problem is that it is intangible and malleable. How can you attach a value to something that is always changing, may disappear, and has no physical presence beyond the bytes it appropriates in a database?
Three Ways Open Platforms Can Boost Cybersecurity Defenses
Open source is eating the world, with one exception: cybersecurity. While there are many cybersecurity platforms aimed at securing open source applications, there has been a void where open cybersecurity platforms should be. Most modern applications are the result of free, open, collaborative efforts. It makes sense, then, that cybersecurity could also be rooted in the collective expertise of the community—and, with today’s non-stop barrage of new attacks, the community’s collective energy and wisdom.
Why People Are Still A Vital Necessity For Data And AI Success
Artificial intelligence (AI) seems to be infused into everything today – cloud services, computer chips, phones, cars, and much more. However, AI is far from perfect and far from sentient. As such, the data output of AI is not always accurate which means that people are still needed to govern, monitor, and make decisions based on imperfect AI systems. To understand what’s really going on, let’s cover the basics of AI first.