Metadata

Applying artificial intelligence to metadata opens new business insights

FEvery modern company collects data, and some collect quite a lot. However, that data is useless if no one can find it. Likewise, drawing out the …

Big Data

Explainer: how law enforcement decodes your photos

For as long as humans have been making images, we have also been manipulating them.<p>Complex darkroom techniques were once required to modify images …

Semantic Technology

Microsoft: The Future Of Video Is A Combo Of Cloud And AI

AdExchanger |Microsoft is looking to claim itself a spot beside the top dogs competing on the video and cloud front. It says data is the …

Amazon Web Services

This Web App Knows What You Did in Lightroom

The beauty of Lightroom is, among other things, its non-destructive image edits. The secret of those edits is the XMP file–essentially a written list …

Lightroom

Working With Clients Who Want a Redesign: A Rebranding Checklist

So, you’ve been approached by a client to help with rebranding their WordPress site. That can be a tricky request. When you’re the one initiating a …

Web Design

Announcing General Availability of Instance Metadata Service in Global Azure Regions

We are excited to announce General Availability of Instance Metadata Service in <b>all Global Azure</b> regions and <b>Public preview</b> in German/Government and …

Cloud Computing

Abusing the AWS metadata service using SSRF vulnerabilities – Christophe Tafani-Dereeper

The vulnerability<p>If you browse to a random question page of InterviewCake, you’ll find at the bottom of the page a small zone where you can type and …

Cloud Computing

Is Your Data Hot Or Not?

, CommunityVoice<p>If you work in the IT industry, there is no escape from statements about how much data we’re creating these days. According to IBM, we now create 2.5 quintillion bytes of data (10 million Blu-ray disks) daily. A few years ago, EMC estimated what we would create 44 zettabytes, which …

Big Data

A semi quick guide to Reliable Stream Processing with RxJS

This article is about an approach that I recently dealt with to handle a scenario where I had a stream of events (user drawing on the canvas) which I …

JavaScript

SharePoint Files - all fields not just a few

When working with the Flow SharePoint File connector (On File Create), I notice it is very limited as to the "fields" available.<p>In SharePoint, we …

Microsoft SharePoint

CSIS kept ‘all’ metadata on third parties for a decade, top secret memo says

OTTAWA—When CSIS intercepted the communications of innocent people between 2006 and 2016 “all” the metadata related to those communications was …

Surveillance

It’s not just your color printer that could betray you. Here are 5 other ways you’re being tracked.

Hours after The Intercept dropped a leaked report detailing Russian efforts to hack the 2016 election, federal government investigators announced the arrest of the suspected leaker, 25-year-old NSA employee Reality Leigh Winner. According to a Department of Justice affidavit, Winner left a trail of …

Privacy

Apple Assists UK Authorities in Investigation of Recent Terror Attacks

Apple CEO Tim Cook confirmed that the company has been assisting UK authorities in their anti-terrorism efforts and cooperating with law …

Privacy

Decentralizing Library IT

I’ve always gravitated toward library jobs in library systems and technology, but I recently took on a new position as head of a tech services …

Libraries

Apple hints it’s handed over metadata on UK terror suspects

Apple CEO Tim Cook has revealed the company has been co-operating with the UK government in handing over metadata in the wake of a series of terror attacks in the country — which he described as “horrendous”.<p>Cook was speaking in an interview with Bloomberg following the first day of Apple’s WWDC …

Privacy

Mobile Call Logs Can Reveal a Lot to the NSA

Of all the recent revelations about the National Security Agency’s sweeping surveillance activities, the collection of metadata from Verizon’s U.S. …

Surveillance

Brewing in Beats: Enrich events with Docker metadata

Welcome to <i>Brewing in Beats</i>! With this weekly series, we're keeping you up to date with what's new in Beats, including the latest commits and releases.<p>…

DevOps

How Document-Tracking Dots Helped The FBI Track Down Russian Hacking Doc Leaker

The surprising story that quickly followed the somewhat-less-surprising Intercept leak was the arrest of Reality Leigh Winner for the leak of the …

National Security Agency (NSA)

Apple Updates Its App Store Review Guidelines, Here's All the Changes

Apple has posted an updated version of its App Store Review Guidelines and there are quite a few changes.<br>We've gone through the document and …

Apps

Apple is assisting the UK in terror investigations

Apple chief executive Tim Cook has confirmed his company is working with UK authorities as part of their investigations into terrorist incidents. In an interview with <i>Bloomberg</i>, Cook said Apple was cooperating "not only in law enforcement kind of matters, but on some of the attacks." He stressed …

Privacy

How to Easily Create Professional-Looking Videos for 4 Popular Social Media Platforms

Semantic Technology

Microsoft Tech Community

You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

Microsoft

Introducing the Apex Metadata API

I am pleased to announce the debut of the Apex Metadata API for Force.com. Our developer community–and partners in particular–pushed hard for this …

Cloud Computing

Secure communications basics for journalists

A few key tools from our recent workshop.<p>Journalists need digital security to protect their information sources from prying eyes. Australian laws …

Linux

Governments stand ready to regulate a cyberscape they do not understand

As governments become more attuned to the threats posed in the IT space, the first reaction is to reflexively clamp down on them.<p>As the very likely …

Privacy

This Windows 7 Bug Will Let Any Website Crash Your PC

The recent ransomware attacks have brought old versions of Windows back under scrutiny in the hope that bugs and flaws can be patched before they become a problem. That means researchers are going back and finding all sorts of weird problems, including a particularly bizarre one discovered in …

Microsoft

The Value in Mining Vintage News

Years ago, then-correspondent Stephen Colbert of “The Daily Show” conducted a devastatingly funny interview where he roasted <i>New York Times</i> editors …

Advertising Industry

GoPro’s GPMF open sources video metadata

Every time you take a photo, on just about any camera, information called metadata is embedded within that image. This data usually contains your …

Videography

Instagram launches Story Search for hashtags and locations

Instagram Stories wants to be your window into what’s going on around a topic or place right now, so it’s adding a way to search Stories two months after Snapchat did the same. Instagram users can now search for a location or hashtag, and see a Story compiled from Story posts by other users that …

Instagram

The value of metadata – the most Instagrammed tourist attractions globally

Edward Snowden’s revelations about federal interception of private electronic transmissions started to build public awareness about the concept of …

Business Technology