Remove en articles it-governance
article thumbnail

Cryptography use cases: From secure communication to data security 

IBM Big Data Hub

From top-secret government intelligence to everyday personal messages, cryptography makes it possible to obscure our most sensitive information from unwanted onlookers. Asymmetric encryption Asymmetric en cryption , also known as public-key encryption, uses a pair of keys—a public key and a private key.

article thumbnail

Themes and Conferences per Pacoid, Episode 12

Domino Data Lab

Paco Nathan ‘s latest monthly article covers Sci Foo as well as why data science leaders should rethink hiring and training priorities for their data science teams. If you’ve never participated in a Foo event, check out this article by Scott Berkun. Introduction. In mid-July I got to attend Sci Foo , held at Google X.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Should Be Treating Your Data As An Asset

Anmut

While en route, to minimise fuel consumption, the driver of the truck should put the truck into first gear and keep a constant speed, avoiding acceleration or braking. According to a recent Financial Times article, 80% of the world’s corporate wealth now resides in just 10% of companies. Let’s start by thinking about data as an asset.

article thumbnail

Data Science at The New York Times

Domino Data Lab

They were a government-tolerated monopoly. Different companies mean different things by “data science” For example, Facebook a few years ago just relabeled all their “data analysts” to be “data scientists” When somebody says they “do data science” it could mean a lot of different things.