Mindblown: a blog about philosophy.

  • Top 10 cloud security training resources

    Top 10 cloud security training resources

    Cloud computing skills are in high demand right now. However, on the down-side, statistics have shown that there is a shortage of cybersecurity professionals. Today, 40 percent of businesses are looking for ways to find employees who are qualified in this kind of computing.  By 2019, there will be 1.5 million job openings and the…

  • Fingerprint sensors are not the guarantee to privacy

    Fingerprint sensors are not the guarantee to privacy

      Biometric authentication is the latest, shiniest toy for large tech companies, especially among manufacturers of smartphones. Technology like fingerprint sensors, iris scans, facial image recognition and voice recognition used to be the stuff of sci-fi movies. But now, thanks to companies like Apple, biometric recognition systems (especially finger scanning), are directing modern smartphones into…

  • What Is The Role of Big Data In The Future of VoIP?

    What Is The Role of Big Data In The Future of VoIP?

      The first real VOIP service, VocalTec, reached the market back in 1995. The market has changed remarkably since then. There are many VOIP changes that can be traced to advances in big data. VOIP providers use big data directly in their own platforms, while also relying on third-party tools like Movavi to improve functionality…

  • Is UX Important To Business Intelligence Analytics?

    Is UX Important To Business Intelligence Analytics?

      “Data is what you need to do analytics. Information is what you need to do business.”– John Owen A simple and effective user experience unfolded with clear and crisp user interface goes a long way in making the user happy and satisfied. Especially, when it comes to the world of business intelligence dashboards, a…

  • Why enterprises should be investing in Cybersecurity

    Why enterprises should be investing in Cybersecurity

    Cybercrime is a significant threat to businesses of all sizes. And not just larger corporations. It especially affects businesses that depend on computerized technology to conduct their daily business. So, investing in cybersecurity to protect your business and data from malicious cyber-criminals and hackers isn’t just desirable. It’s absolutely essential to maximize resistance against threats.…

  • Why Information Security Need to be Empowered to Manage Data Breaches

    Why Information Security Need to be Empowered to Manage Data Breaches

    Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has…

  • 10 big data case studies with big results in 2018

    10 big data case studies with big results in 2018

    Who hasn’t heard of big data? This term has created the ultimate buzz in the industry over the last decade. The concept of big data has become a multi-billion-dollar industry within a very short span of time. With the large-scale collection of data from various places like social network communications, web-browsing data trails etc., big…

  • Data Mining Issues that Still Persist in 2018

    Data Mining Issues that Still Persist in 2018

      Data mining has become more important than ever. Brands and consumers use a wide range of platforms to exchange data. There are a lot of applications for these platforms as well. Many people use digital platforms to look for products and services. Unfortunately, organizations that use data mining to streamline their customer service strategies…

  • 8 breakthrough events in the history of cybersecurity [Infographic]

    A cyber attack is a strike against a computer system, network, or internet-enabled application or device. These attacks happen daily and are constantly evolving. In the past 50 years, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising presidential elections. While threats continue to develop, it’s important to remember…

  • Research papers that changed the world of Big Data

    Research papers that changed the world of Big Data

    If you are looking for some of the most influential research papers that revolutionised the way how we gather, aggregate, analyze and store increasing volumes of data in a short span of 10 years, you are in the right place! These papers were shortlisted, based on recommendations by big data enthusiasts and experts around the…

Got any book recommendations?