As developers, we know that SSL is quintessential when writing software that communicates securely over networks. Whether it be publishing or consuming REST services or performing enterprise PKI communication in large organizations, knowledge of this topic is important. When I reached the point in my career that I needed to understand SSL, I found it challenging, to put it mildly, to find any sort of consolidated compendium on the subject. More recently developers within Onyx have been coming to me for help on just this topic; hence, this post.
As Antonio García Martínez writes for Wired, user data is often referred to as the “new oil” due to its immense value in the digital world. Understanding how data becomes valuable is key for our operations at Onyx, and for parsing this metaphor. Read more from this interesting article to see why this characterization is not as apt as it may seem and gain a more nuanced understanding of how your information makes money for tech giants.
As data analytics abilities become more refined, parties in the public and private sectors alike have much to gain from using such tools. Recent research carried out by Harvard Kennedy School’s Ash Center for Democratic Governance and Innovation explores the benefits of data analytics implementation and reasons for which the field is swiftly becoming a key area of interest and investment for government leaders. Find out more about recent research into the benefits of data analytics.
Companies, governmental bureaus, agencies, and organizations rely upon stream computing to process and analyze big data.
Problems with data integrity aren't new. In fact, most sources credit an IBM programmer and instructor from the 1960s with the famous acronym GIGO -- or garbage in, garbage out. Errors or even intentional manipulation of data have always plagued information systems. Even though modern systems may have better features for reducing errors, the very speed data gets generated today multiplies issues. Learn how a relatively new technology, blockchain, can help limit various threats to data integrity in this age of rapid data generation.