Remove Applications Remove Intel Remove Nonprofit Remove Social
article thumbnail

CDH Users: If you have done impactful things with data please share how what and why

CTOvision

The goal of this program is to recognize organizations running CDH for the applications you’ve built using Hadoop, and for the impact your project is having on the organization, business, and/or society at large. SOCIAL IMPACT. GOVERNMENT, NONPROFIT, & NGO. Chief Information Officer, Intel. COMMUNITY CONTRIBUTIONS.

article thumbnail

Which Government, Non-Profit and NGO Have Big Data/CDH Lessons Learned To Share?

CTOvision

The goal of this program is to recognize organizations running CDH for the applications you’ve built using Hadoop, and for the impact your project is having on the organization, business, and/or society at large. SOCIAL IMPACT. GOVERNMENT, NONPROFIT, & NGO. Chief Information Officer, Intel. COMMUNITY CONTRIBUTIONS.

Big Data 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Your car is about to go open source

Galido

Having an open-source IVI operating system would create a reusable platform consisting of core services, middleware and open application layer interfaces that eliminate the redundant efforts to create separate proprietary systems. Tizen’s SDK allows developers to use HTML5 to write applications for an IVI.

article thumbnail

List of the world’s top female futurists (Update #5)

Trends in the Living Networks

She led a research project on the Future of Data and investigated topics such as 3D printing, social enterprise, and the evolving role of the state. Chung has been a Co-Curator of TEDxSingapore, and she continues to advise teams of undergraduate students about their management consulting projects for clients in the social sector.

Study 148
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

Anyway, what Chenxification does for example is frustrate computer malware's ability to locate and extract an application's decryption key. To this day, the US Department of Defense uses chenxification to protect mobile applications. VAMOSI: And after Forrester she went to Intel, which at the time had purchased McAfee.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Steve Grobman, CTO with Intel’s security group had this to say: CNBC: Yeah, so I think that nothing is ever impossible. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. In fact, at the time, the were mixed signals as a result of the report.