FBI vs Apple: Policy Analysis


Editor’s note: This is the second in a five-part series on this topic. This examination by Arnold Abraham provides insights and nuanced lessons from history, the law and the tech world that can inform all of us interested in both privacy and security.-bg bg Despite foreboding tales of doom associated with the potential outcome on each […]. CTO Cyber Security News

Another Great Example Of Pattern Analysis Over Hacker Activity


Recorded Future has just posted another nice piece of analysis on the cyber threat. Summary of the analysis: Forums can be analyzed at traffic level, without an analyst knowing foreign languages or tracking individual posts. The conclusions of this analysis underscore that in some cases alerts can be set up to provide advanced warning of certain kinds of activity. . For more see: Hacker Forum Traffic Analysis: ‘Patch Tuesday … Exploit Wednesday’ and Other Patterns.

Trending Sources

Cyber risk analysis

IT Toolbox

Risk analysis is simply the process of determining the severity of a risk

James Madison University Seeks Professor – Intelligence Analysis Program


Please look it over and share it with others that may have an interest: Assistant / Associate Professor - Intelligence Analysis Program. General Info: James Madison University (JMU) seeks applicants for a faculty position focused on cyber intelligence and cyber analysis that will help prepare students as analysts in both private and public sectors, as well as government agencies, through its Bachelor's Degree Program in Intelligence Analysis (IA). Bob Gourley.

Conducting a Multi-Currency Gap Analysis: Assembling the Team

IT Toolbox

The JD Edwards functional lead is generally responsible for the JD Edwards implementation at your company and contributes to the business analysis and use case development. The lead should know about the steps involved in the JD Edwards business processes to be automated and integrated

Businesses that overlook ROI analysis are missing cost savings

Computer Weekly

Organisations have more chance of meeting their cost saving expectations following cloud migrations if they carry out ROI analysis before

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Cloud Musings

Since CSC was not included in Cloud Spectator''s performance analysis they are also not included in the chart provided above.). Industry''s transition from custom made, one-of-a-kind IT infrastructures to the standardize, commodity based cloud paradigm is well on it''s way.

Dutch mastering the art of big data analysis

Computer Weekly

Gathering and analysing huge amounts of data offers the promise of business efficiency and new opportunities. We look at what this all means for the once-cautious Dutch

Pay rises tipped for IT security and data analysis roles in 2017

Computer Weekly

Increase in high-profile data breaches and the need for data insight are seen as contributory factors in salary rises for IT security and data analytics staff

MSI Analysis Reporting Tool

Mick's IT Blog

Here is a tool I have written that generates a report on all of the variables used for each entry during an MSI installation. I wrote this script to make customizing the installation of MSI files much easier and quicker.

Docker Encourages Container Log Analysis for Insights

Data Center Knowledge

ETP program ensures log management solutions integrate with Docker, extend application portability across platform Read More. Shared

2015 Federal IT Spending Update: An analysis of the budget for CTOvision Pro Subscribers


Analysis Big Data CTO Cyber Security Department of State DHS DOD DoD and IC DOJ DOT ED FAA Government HHS Intelligence Community NASA VA United States federal budget By Bob Gourley. The total federal budget is about $3.9 Trillion.

Performance Analysis: Bare-Metal and Virtual Clouds

Data Center Knowledge

More organizations are off-loading their applications and workloads into the cloud environment every day. Find out if a bare-metal or virtual cloud environment is right for you. Read More. White Papers Internap

Security analysis of popular IoT devices

Network World

Have you wondered if your internet-connected devices are infected with Mirai malware and were part of the DDoS attacks? In response to the recent IoT DDoS attacks, researchers at Zscaler analyzed IoT traffic patterns not only on the days of the DDoS attacks on Dyn and Krebs on Security, but going back to July.

Oscium Brings 5 GHz to Its WiPry Spectrum Analysis

IT Toolbox

In late 2015, I took a look at Oscium’s WiPry Pro spectrum analyzer. Among the various spec-an tools on the market for Wi-Fi professionals, that version of WiPry was unique in its construction as a “dongle” that connects to Apple iDevices. As I mentioned in

Savvius Insight 2.0 Packs a Slew of Network Analysis and Reporting Into a Very Small Package

IT Toolbox

It’s easy to skirt right past the branch paradigm when it comes to analysis ifIf you’re in enterprise networking, you know that everything tends to get bigger. We currently talk in terms of 10 and 40 Gbps pipes, and ponder how to properly analyze our enormous client device and application bases for performance, security, and a host of other parameters.

Machine intelligence pushes ERP data analysis even higher

IT Toolbox

Traditionally, companies have deployed comprehensive ERP systems to streamline and modernize business processes. Now, however, a Silicon Valley company is using machine intelligence to help managers glean even more value from the big data that ERP generates. Aera, which recently received $50 million in venture capital funding, helps companies move from automating their transaction

The Problem With Storage Swiss' Analysis -- On VSAN

Chuck's Blog - EMC

One aspect of our industry that I find especially annoying is the "pay-to-say" analyst model.    The usual scenario is that one vendor wants to discredit one or more other vendors to make themselves look better. 

IDG Contributor Network: Network analysis can find malware before it strikes

Network World

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain in an article on the school’s website.

Study 30

Analysis: Amazon’s Unlimited Storage No Threat to Cloud Storage Rivals

Data Center Knowledge

New plans another sign pricing in the consumer cloud storage space does not matter much Read More. Amazon Cloud Computing Storage

One Week Free Trial of CTOvision Pro: A Subscription Based Research and Analysis Service


If you find our open technology context and analysis of use please consider evaluating our subscription-only research and analysis service CTOvision Pro. CTOvision Pro provides access to more in-depth analysis and reporting. By Bob Gourley.

IDC’s Analysis of Worldwide DCIM Vendors

Data Center Knowledge

Now, find out IDC''s analysis of some major, worldwide DCIM vendors. Data center visibility and control is critical. Read More. White Papers Emerson

Social Media Monitoring and Analysis

CIO Dashboard

The market for the monitoring and analysis of social media conversations is beginning to hit its stride, so CIOs should expect a growing demand from your marketing colleagues for assistance selecting, installing, and maintaining a social media intelligence tool set. Guest post by Jeff Auker.

Media 24

Webinar 29 June 2016: Beyond BI: Agile Visualization, Reporting, and Predictive Analysis on Any Data in the Enterprise


Join us on 9 June 2016 at 1:00 PM ET to learn how automated tools for intuitive, user-friendly visualization, and powerful predictive analysis can uncover new value in your information and empower your agency with new mission capabilities. By the conclusion of this webcast, you will understand: The democratization of predictive analytics : how subject matter experts, not just data scientists, are using automated predictive analysis. Charles Hall.

IBM pitches analysis software for select industry verticals

Computerworld Vertical IT

Extending the reach of its analysis software and services, IBM plans to release 20 analytics packages customized to the needs of specific industries. Available by the end of June, the packages will target businesses in retail, banking, telecommunications, insurance and other fields. Additional packages will be released in the future. The packages augment off-the-shelf analytics software, from IBM or other parties, that organizations may already be running.

Predict Sales Activities Using Regression Analysis of CRM Data

IT Toolbox

Customer relationship management (CRM) systems hold the key to understanding prospects and customers. Sometimes, companies fail to put enough information into the CRM database, but most companies have more data in the database than they know what to do with even, if it is not every piece of information they could be capturing. Dreaming of Data. Many sales

Data 16

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Big Data

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public

Cyber risk response analysis

IT Toolbox

The problem with deciding what to do to improve your network security is that there may be many options, so you can never be sure that you have identified every possible one, and in addition it may be difficult to determine whether you have selected the best one

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Network World

The 3rd edition of this book will have you confidently using Wireshark to solve the kind of problems you're likely to run into. You'll be capturing and analyzing packets, understanding network protocols, and gaining important insights into what's happening on your network

International Conference for High Performance Computing, Networking, Storage and Analysis (SC14) Recap #HPCMatters


16-21 Nov 2014 the International Conference for High Performance Computing, Networking, Storage and Analysis (SC14) was hosted in New Orleans and once again it did not disappoint! Each year SC14 brings together a large number of folks from the High Performance Computing (HPC) community, basically thousands of scientists and engineers that are doing really awesome things in the HPC and computational analytics space. With that in mind I thought I would tak. To read more please log in. Login.

Data 28

Root Cause Analysis: An Alternative to Blamestorming

Data Center Knowledge

After an extraordinarily rocky start, the federal healthcare exchange, the online marketplace consumers use to purchase health insurance under the Affordable Healthcare Act, seems to be working more smoothly. But, now problems are cropping up with the state healthcare exchanges, writes David. Industry Perspectives

The key functions to consider when building or buying a log analysis platform

Network World

There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn. This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Life is really simple, but we insist on making it complicated.”

CTOvision Pro: A Subscription Based Research and Analysis Service


If you find our open technology context and analysis of use please consider evaluating our subscription-only research and analysis service CTOvision Pro. CTOvision Pro provides access to more in-depth analysis and reporting. Analysis Big Data CTO Cyber Security DoD and IC Mobil

Data 11