The rate of information increase nowadays is unprecedented, making big data look like a virtual triangle-shaped bundle, whose base is continually growing larger as we speak. The older information lies somewhere beneath this immediate bunch of huge data, and this structure determines the prevalence
Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our
Managing a personal Facebook account takes a few efforts in order to efficiently protect the individual privacy, since the default settings allow any stranger to find out quite a few details on the account owner: date of birth, location, interests, and friends are the most exposed by default
Any network, from small to complex, needs a comprehensive network monitoring foundation that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form. The continuous network
Cognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer
When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud . The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the cloud services, allowing aggregation,