Skip to main content

Robert Sutor

Robert Sutor's Public Library

19 Apr 14

"Johnny Depp, who's built a brilliant career despite many of his lamentable film choices, may not be the first actor you think of to play a genius - much less humanity's destroyer or savior. But he's weirdly perfect in "Transcendence," an inelegant, no doubt implausible (maybe not) science-fiction film about a futurist whose consciousness is uploaded onto the Internet. "

19 Apr 14

"OpenSim — short for OpenSimulator — is free, open source software that allows anyone to create a virtual world and run in on their own computer. "

09 Apr 14

"A new security bug means that people all across the Web are vulnerable to having their passwords and other sensitive data stolen. Here's what consumers can do to protect themselves."

04 Apr 14

"For over eight years, ProgrammableWeb has served as the Web’s defacto journal of the API economy; offering news, advice, API directories, research data, and other information when it comes to the world of Internet-based APIs. Now, as a part of our continuing mission to serve as the world’s leading resource for developers, API providers and stakeholders, we’re announcing the the launch of ProgrammableWeb’s first-ever face-to-face conference; APIcon."

04 Apr 14

"Our API directory now includes 96 stocks APIs. The newest is the Eurex VALUES API. The most popular, in terms of directory page views, is the Bloomberg API. Below you’ll find some more stats from the directory, including the entire list of stocks APIs."

04 Apr 14

"Scarlett Johansson as an extraterrestrial femme fatale cruising the streets of Glasgow in Jonathan Glazer’s cerebral sci-fi horror fantasy “Under the Skin” is an indelible personification of predatory allure."

04 Apr 14

"Mozilla's new Chief Executive Officer Brendan Eich has resigned, after being dogged by calls for his ouster over his support for an anti-gay marriage bill in California."

01 Apr 14

"According to a study by Mobile Future and Infield Health, the wireless pill bottle, a device that digitally monitors the amount of pills in a bottle and can send Health Information Portability and Accountability Act (HIPAA) -compliant, text or phone reminders to patients to take their medicine, increases adherence to 95%."

31 Mar 14

"In the real world, we don’t have name tags floating over our heads. The metaverse shouldn’t be any different."

31 Mar 14

"GNU Octave is a high-level interpreted language, primarily intended for numerical computations. It provides capabilities for the numerical solution of linear and nonlinear problems, and for performing other numerical experiments. It also provides extensive graphics capabilities for data visualization and manipulation. Octave is normally used through its interactive command line interface, but it can also be used to write non-interactive programs. The Octave language is quite similar to Matlab so that most programs are easily portable."

31 Mar 14

"The NAG Library for Python gives users of the Python language access to over 1,700 mathematical and statistical routines in the NAG Library. It has been enhanced in-line with Python2.7 and Python3, as well as an improved pythonic interface and a new python egg installer."

28 Mar 14

"Intel and Cisco, as well as AT&T, General Electric, and IBM, are forming the Industrial Internet Consortium, a nonprofit dedicated to the Internet of Things — a term for a connected network of sensors and devices."

27 Mar 14

"Meet Haiku Deck, a completely new kind of presentation software. We make telling your story simple, beautiful, and fun."

26 Mar 14

"Oculus makes the Oculus Rift headset, which covers your eyes and immerses you in a virtual environment that responds to your head movements."

24 Mar 14

"A Lego robot just crushed the Rubik’s cube speed world record. David Gilday and Mike Dobson’s Cubestormer 3, posted a mark of 3.253 seconds at the UK’s Big Bang Fair—over two seconds faster than the previous mark of 5.27 seconds."

  • <div id="content_header" style="margin:0px 0px 30px;"></div><br/> <br/> <br/> <br/> <br/> <br/> <br/><br/> <br/> <br/> <br/> <br/> <div style="margin:0px 0px 0px"><br/> <br/> <br/> <br/> <div class="content_right"><br/> <br/> <div class="evnt-soc-icons"><br/> <div data-share="false" data-layout="box_count" data-href="" data-action="like" fb-iframe-plugin-query="action=like&amp;app_id=&amp;;layout=box_count&amp;locale=en_US&amp;sdk=joey&amp;share=false&amp;show_faces=false" data-show-faces="false" fb-xfbml-state="rendered" class="fb-like evnt-soc-icon fb_iframe_widget"><span style="vertical-align: bottom; width: 47px; height: 61px;"><iframe height="1000px" frameborder="0" scrolling="no" allowtransparency="true" src=";app_id=&amp;;;layout=box_count&amp;locale=en_US&amp;sdk=joey&amp;share=false&amp;show_faces=false" style="border: none; visibility: visible; width: 47px; height: 61px;" class="" title="fb:like Facebook Social Plugin" width="1000px" name="f27f40ee78"></iframe></span></div><br/> <div class="tw-share evnt-soc-icon"><iframe frameborder="0" allowtransparency="true" scrolling="no" id="twitter-widget-0" src=";count=vertical&amp;;dnt=true&amp;hashtags=iapp%2Cprivacy%20summit&amp;id=twitter-widget-0&amp;lang=en&amp;;size=m&amp;text=IAPP%20%3A%20Global%20Privacy%20Summit%202014&amp;" data-twttr-rendered="true" style="width: 56px; height: 62px;" title="Twitter Tweet Button" class="twitter-share-button twitter-tweet-button twitter-count-vertical"></iframe></div><br/> <div style="display: block;" class="li-share evnt-soc-icon"><iframe style="width: 30px; height: 19px; border: 0px;"></iframe></div><br/> </div><br/> <div style="width: 220px; margin: 25px 0;"><a rel="nofollow" href="/events_and_programs/keep_me_informed/global_privacy_summit_2014" class="mailing-summit-btn">Join the Mailing List!</a></div><br/> <br/><br/> <br/><br/> <br/><br/> <br/> <br/><br/> <ul class="tert_navigation event_details global_privacy_summit_2014"><br/> <li class="list_header">Event Details</li><br/> <li class="event_overview"><a rel="nofollow" href="" rel="">Overview</a></li><br/> <li class="related_entry"><a rel="nofollow" href="" rel="">At-A-Glance</a></li><br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Preconference Workshops</a></li><br/> <br/> <br/> <li class="related_entry selected"><a rel="nofollow" href="" rel="">Breakout Sessions</a></li><br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Keynote Speakers</a></li><br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Special Events and Networking</a></li><br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Program Chairs</a></li><br/> <br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Speakers</a></li><br/> <br/> <br/> <br/> <li class="related_entry"><a rel="nofollow" href="" rel="">Sponsors and Exhibitors</a></li><br/> </ul><br/> <br/> &lt;!--<br/> &lt;div style="width: 220px;">&lt;a href="/events_and_programs/justify_your_trip_to_summit_2014" class="jyt-summit-btn">Justify Your Trip&lt;/a>&lt;/div><br/> --><br/> <br/><br/> <br/><br/> <br/> <br/> <br/><br/> </div><br/> <br/> <br/> <br/> &lt;!-- &lt;li>No additional info&lt;/li> --><br/> <br/> <br/> <br/> <br/><br/> <div class="content_left events-content-left"><br/> <div id="main_content_block"><br/> <br/> <br/> <h1><br/> Breakout&nbsp;Sessions </h1><br/><br/> <p><a rel="nofollow" name="top"></a></p><br/><p>&nbsp;</p><br/><p>Use these links to jump to the topic you’re interested in:</p><br/><table><br/><tbody><br/><tr><br/><td width="255" valign="top"><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#bigdata" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Big Data/Cloud Computing</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#convos" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Conversations in Privacy</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#enforcement" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Enforcement and Litigation Risk</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#financial" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Financial Services</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#governance" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Governance/Risk Management</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#public" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Government/Public Sector</a></div><br/></td><br/><td valign="top"><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#health" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Healthcare</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#cybersec" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Information/Cybersecurity</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#marketing" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Marketing/Online</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#mobile" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Mobile Privacy</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#ops" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Operational Privacy</a></div><br/><div style="margin-bottom: 10px;"><a rel="nofollow" href="#additional" style="text-decoration: none;"><span class="icon-caret-down">&nbsp;</span> Additional Expertise</a></div><br/></td><br/></tr><br/></tbody><br/></table><br/><p><br><em>For session times and to view a complete conference schedule, visit the <a rel="nofollow" href="/events_and_programs/global_privacy_summit_2014/at_a_glance_s14">At-A-Glance</a></em>.</p><br/><div style="line-height: 50px;">&nbsp;</div><br/><p><a rel="nofollow" name="bigdata"></a></p><br/><h4><span class="icon-chevron-right">&nbsp;</span> BIG DATA/CLOUD COMPUTING</h4><br/><p><strong>&nbsp;</strong></p><br/><p><a rel="nofollow" name="helps"></a></p><br/><h5>How Using Big Data in Security Helps (and Hurts) Us</h5><br/><p><strong>Kerry Matre, CIPP/US</strong>, Solutions Marketing Manager, Hewlett Packard Enterprise Solutions<strong><br>Boris Segalis, CIPP/US</strong>, Partner, InfoLawGroup LLP</p><br/><p>Companies experience a continuous threat of data loss and theft from the inside (think Edward Snowden). Employees have access to systems within a business but often use their access in inappropriate ways. As a result, employers are employing big data to monitor their employees for malicious behavior and inappropriate access. This session will explore technologies implemented around big data for security and discuss the implications on personal privacy.</p><br/><p><strong>What you’ll take away:</strong></p><br/><ul><br/><li>Learn how big data is used inside companies to monitor for data loss and potential threats</li><br/><li>Understand how behavioral analytics is used to identify malicious insiders</li><br/><li>Recognize the potential for abuse of big data use for security purposes</li><br/></ul><br/><p><a rel="nofollow" href="/media/presentations/14Summit/S14_How_Using_Big_Data_PPT1.pdf" target="_blank">Presentation 1</a>, <a rel="nofollow" href="/media/presentations/14Summit/S14_How_Using_Big_Data_PPT2.pdf" target="_blank">Presentation 2</a></p><br/><ul><br/></ul><br/><p style="text-align: center;"><img height="5" src="/assets/images/misc/big_hr.jpg" width="431"></p><br/><p><a rel="nofollow" name="innovation"></a></p><br/><h5>Privacy and Inno</h5></div></div></div>
20 Mar 14

"This is the eighth and final instalment (for now) in a series of posts discussing how to set up and run a WordPress blog from a relatively experienced expert, which will feature many helpful and hopefully relevant tangents."

19 Mar 14

"The module “” provides developers a new library suite of mathematical statistics functions. Whether it comes to averages, medians, variances or standard deviations, Python 3.4 brings all these in the new algorithm module. Also interesting is the use of SIP hash as the default hash algorithm for strings and bytes. The current hash algorithm of CPython is not immune against DoS attacks. The new algorithm promises a secure random number generation for hashes."

19 Mar 14

"The two will collaborate on a computing prototype that could suggest treatment options for patients with glioblastoma, an aggressive brain cancer. Watson would analyze an individual patient's genome, and compare it to large volumes of data from other patients, as well as medical literature, to recommend experimental treatments."

19 Mar 14

"Mozilla and Unity today announced that Unity 5, to be released later this year, will include an early access preview of a version of the 3D engine that supports WebGL and asm.js, enabling plug-in-free access to the Web."

1 - 20 of 2518 Next › Last »
20 items/page

Highlighter, Sticky notes, Tagging, Groups and Network: integrated suite dramatically boosting research productivity. Learn more »

Join Diigo