Technology

How To Protect Your Data

How To Protect Yourself Database FirewallUser rights management monitors data access and activities of privileged users to identify excessive, inappropriate, and unused privileges. Data Masking and EncryptionData loss prevention inspects data in motion, at rest on servers, in cloud storage, or on endpoint devices. User Behavior AnalyticsEstablishes baselines of data access behavior, uses machine learning …

How To Protect Your Data Read More »

Social Media Echo Chambers: The Bubbles We Create – Part 2

The New Business Model Contrary to what you may believe Facebooks #1 priority is not to educate or inform its users but to keep users on the site. They do so by manipulating our psychology. According to Brent Barnhart in a Sproutsocial, there’s the belief that social media algorithms exist to push brands to pay …

Social Media Echo Chambers: The Bubbles We Create – Part 2 Read More »

Using AI to face the coming pandemic challenges (Part 2)

Why should we focus in Data and AI? Positive developments in the applications of artificial intelligence process that benefit sins citizens will ease the government a lot of burdens and waste of money. For example, the ING Bank provides a lot of facilities to its clients on their site, The customer became able to manage …

Using AI to face the coming pandemic challenges (Part 2) Read More »

Social Media Echo Chambers: The Bubbles We Create – Part 1

The Realisation It all started with one of our many discussions at the office. I must explain that our data lab promotes informal discussions about tech and our social responsibility as data professionals. Because of this I have found myself, pausing and thinking about the many things we still need to address and improve. On …

Social Media Echo Chambers: The Bubbles We Create – Part 1 Read More »

Skip to content