Key Trends 2013 – Mobile
From Click Through Rate (CTR) to Place Visit Rate (PVR) With mobile Ads is now possible. A New York City-based start up Place IQ, in collaboration with Starcom Media Vest Group serving retail customers...
View ArticleBig Data: Mobility Report – Uniquely Identified 95%
Mobiles are efficient data sensors and data stored on cell phone could fuel socially useful applications: urban planning, epidemiology, operations research and emergency preparedness, to mention a few....
View ArticleMobile: Zuckerberg “Google can’t stop Facebook Home”, from 12th of April on HTC
From the 12th of April 2013 Facebook Home will be available on HTC First mobiles, exclusively through AT&T. What Home is, according to his Facebook’s page is “a family of apps (…) everything on...
View ArticleFacebook Home on HTC can be disabled – Like every App on your Mobile
Facebook Home Can be Disabled on the HTC First Like all Apps on your mobile. On March this year, the Federal Trade Commission has updated guidelines for Social Media or Mobile advertising. In his...
View ArticleHow to plan a Paid Search campaign in 8 Steps & 7 Keywords Tools you Can Use
A brief guide on paid search planning best practices, considering negative keywords to achieve budgetary savings, reach the most interesting customers and increase your Return On Marketing. Step number...
View ArticleCustomer Decision & Big Data: A possible Journey
Customer is king. Always. Whether in B2B or B2C settings. With much writing this week on the importance of a Customer Centric approach where B2B organizations need to develop a much deeper...
View ArticleSearch and Why Deep Learning Matters
In computer science more specifically in the field of artificial intelligence, a Genetic Algorithms is a search heuristic (= experience-based techniques for problem solving, learning, and discovery),...
View ArticleInnovation – Trends: Shaping Marketing Profiles & Accelerating Customers’...
In the Digital Economy where the pace of change is a constant, Innovation is the leading drive. Organizations are naturally evolving, creating, reinventing, reshaping professional profiles and...
View ArticleBig Data: Privacy & Incident Response
The World Economic Forum describes the personal information garnered by big data as “the new ‘oil’, a valuable resource of the 21st century.” Whilst Big Data provides a great opportunity for company...
View ArticleBig Data & Enterprise Security: A new Trend? …
Big data is playing a key role in setting and shaping Enterprises digital marketing plans. But how much can the Big Data trend do for Enterprise Security? The widely accepted 3 V’s of Big Data: volume,...
View ArticleCybersecurity and the “Sound of Malaware”
Last month took part to a presentation in ISC(2) in Dublin. Guest speaker Mr Michael Daniel, Special Assistant to the US President and Cybersecurity Coordinator of the Obama administration. Brought...
View ArticleKey Trends 2013 – Mobile
From Click Through Rate (CTR) to Place Visit Rate (PVR) With mobile Ads is now possible. A New York City-based start up Place IQ, in collaboration with Starcom Media Vest Group serving retail customers...
View ArticleDatabase: Security Concerns in Big Data Systems
From earlier post 3 V’s of Big Data: volume, velocity and variety according to some analyst should be integrated with a fourth V…veracity or trustworthiness of the data. Data to be worth of...
View ArticleApplications & Threat Analysis
Applications are a layer of data access and in nowadays fast paced, digital innovations driven landscape. Information security best practices in application development is key. Found greatly...
View ArticleAdvanced Persistent Threats – APT an Interesting Report
Advanced Persistent Threat (APT) is a network cyber attack where the perpetrators are typically a group, with both capability and intent to persistently target a specific entity. In February 2013,...
View Article2013 – Information Systems Security Summary
From presentations and events of this past year, four aspects seems worth to be considered as a summary for 2013 in the Information Systems Security realm. Starting with: DDoS – Targeted Companies An...
View ArticleSecurity and Flexibility in Mobile development – What about MBaaS?
A recent approach to mobile development Mobile Backend as a Service, is providing the flexibility of cloud based models without the headache of device platform integration. MBaaS is effectively an...
View ArticleComputer & Mobile Forensic: iOS Encryption
One of the differences in computer forensic activities is that whilst non volatile OS data stored on a pc can be recovered. In forensic on mobiles (for iOS based devices), we are faced with a...
View ArticleBig Data, Machine Learning, Security and GRC
With the increased variety, volume, velocity, of datas generated. Companies are growing concerns over, how to integrate “Big Datas” from sources which can be trusted and how to ensure compliance with...
View ArticleBarCamp Montecitorio – Track “Digital Divide”– Cosa aggiungere per completare...
Si e’ tenuto l’11 Aprile 2014, a Palazzo Montecitorio, il BarCamp della Camera dei Deputati, primo BarCamp in un Parlamento Europeo. E se ogni storia di successo ha un inizio, quando ad inaugurare...
View Article