Typically batch in nature, big data analytics allows an organization to organize and analyze vast amounts of structured and unstructured information to facilitate the detection of rogue employees, partners, or criminal or collusive rings of fraudulent or abusive activity, says Gartner analysts. A critical ingredient for success is the ability to quickly and easily integrate…

By Jason Silberman Almost fifty years ago, a long-forgotten promotional movie was bade, called 1999 A.D. This promotional movie featured the life of an upper middle class family in the far off year, and demonstrated forecast modern conveniences they would enjoy and which the people at the time did not. When this film was rediscovered,…

Last year, Ponemon Institute and Thales e-Security comprehensive study reported how organizations influence the spread of cloud computing security measures and how to manage the risks. This year, more than 4,000 organizations participated in the survey showed more organizations have already putting sensitive data in the cloud. But, the adoption of cloud based services is…

A group of experts appointed by European Commission will scrutinize how European cloud computing contracts are established. It will also try to develop a standard contract. The European Commission launched a call for applications to recruit people from the industry, academia and other profiles, to establish a group of experts whose mission is to create…

Windows Azure is the platform used by application developers to create cloud based applications. As it turns out, more than 50 percent of firms in the global Fortune 500 are already using the Windows Azure cloud services. Microsoft noted that the expansion of client coverage coincides with the growth of the market of cloud computing….

A recent report by UK publication The Guardian has revealed that the National Security Agency has a top secret program called PRISM, which gives them unbridled access to the systems of Facebook, Google, Apple, and other Internet giants from the US. The Guardian managed to verify the authenticity of the document, which consists of a…