research data management
3 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Annikki Roos from innovative libraries
Scoop.it!

Rethinking the library - Focus

Rethinking the library - Focus | research data management | Scoop.it
Skillful service design comes to life in Finnish libraries.

Via Trudy Raymakers
more...
Tammy Morley's curator insight, March 4, 2014 12:16 AM

Love Scandinavian design in general and this doesn't disappoint.

Scooped by Annikki Roos
Scoop.it!

Research Management for Dummies | Guest Blog, Scientific American Blog Network

Research Management for Dummies | Guest Blog, Scientific American Blog Network | research data management | Scoop.it
During my PhD I was never good at managing my research data. If you ask my former PI, I’m guessing she would actually tell you I ... (RT @KirkDBorne: Research Management for Dummies!
more...
No comment yet.
Rescooped by Annikki Roos from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Telephone metadata and what it can tell the authorities about you - The Guardian

Telephone metadata and what it can tell the authorities about you - The Guardian | research data management | Scoop.it
The Guardian Telephone metadata and what it can tell the authorities about you The Guardian Groups such as the Electronic Frontier Foundation say that by knowing who an individual speaks to, and when, and for how long, intelligence agencies can...

Via Daniel A. Libby, CFC
more...
Andrew Bycroft's comment, June 23, 2013 5:56 AM
I think there is a valuable lesson in this article about how the NSA uses metadata to gain intelligence about what may actually be spoken on a phone call without actually "eavesdropping" that translates to CIOs and CISOs and how they can also improve visibility of security within their organizations by using a similar approach for detection of Advanced Persistent Threats, botnet activity and data leakage. Whilst it would be good to know exactly what is being leaked, this is not always possible as attackers are using encryption when ex-filtrating data, but the metadata alone - such as the volume of traffic outbound and the source and destination is extremely valuable for the purposes of identifying that something is amiss which then warrants further investigation.