Blog Image

How Hedge Funds Are Profiting From Your Data

4851
The Full Extent of How Your Personal Data is Being (Mis)used You are going to the supermarket for groceries; on your shopping list, you have fruits, chocolate, and paper towels. While this is a simple...
Blog Image

The Ethics Of Using AI In Healthcare

3216
Artificial Intelligence (AI) is being applied to any industry that manages a large amount of data, and in an increasingly interconnected digital society that includes pretty much everyone. Healthcare is certainly one, and there have...
Blog Image

Patient Data & Privacy: An Update

1887
Medical entities are tasked with handling a patient’s diagnosis and subsequent treatment with the utmost sensitivity and confidentiality. Complying with current healthcare regulations is crucial to maintain a patient’s trust and protect the healthcare...
The IoT is «an interconnected environment in which all kinds of objects have a digital presence and the ability to communicate with other objects and people»

Questions and strategic objectives of the IoT

1457
The phenomenon of the Internet of Things is in full expansion, both for the multiplication of digital devices on the market and for their objective functionality and usefulness at the service of innovative and...
Blog Image

On Artificial Intelligence and Surveillance Capitalism

9012
Intro: From Super-Elixer to Dangerous Dark Art Big Tech, which is always now: AI-fueled Big Tech, has made shopping, searching, connecting to friends on your preferred platforms astonishingly easy. Which is why the masses, including...
Blog Image

Sparks Interview – Dimension: Data Belongs to the People

5346
X-Order is an investment and research organization dedicated to the study of value capture in open finance. We strive to be a bridge between new finance and interdisciplinary fields with relation to science and...
Blog Image

One Metro NY: A Privacy Disaster, or Convenience Win?

1303
It seems like every morning brings new headlines that herald the end of our digital privacy as we know it. These stories spark outcry, worry, and -- counterintuitively -- no small amount of apathy.  The...
scooter parked on footpath

Hipster Data

4407
From an unprofitable company to data mogul If you live in a big city, you might have noticed the arrival of weird new vehicles: electric scooters. If you’re over 40, you might have been annoyed by all...
customer experience

What’s More Valuable: User Experience or Our Data?

4565
Monetization of customer experience will progress at an increasing pace. Commercialization of this trend began around 2000 when the so-called internet bubble happened. Coincidence? A vital criterion for assessing data management efficiency in enterprises...
Investigators

How Private Investigators Use Technology to Track You

1417
Private investigators have gotten a hell of a lot better at merely snapping pictures of you at the mall. In modern times, they rely on the help of the data fusion business. Private investigators...
Security systems

How to Prevent Insider Data Breaches at your Business

1310
Security systems are installed within the premise of a workplace to avoid any external threats to the business. People often neglect that with keeping the external security intact, internal security is also a major...
Browse Anonymously

5 Simple Ways to Browse the Web Anonymously: 2019 Edition

1787
Browsing privately ensures that no one spies on what you do online. Thanks to the tech growth that the world has experienced over the years, you now choose to either browse the entire web...
Blog Image

Using Data Governance to Drive Self-Service Analytics

3692
The explosive growth of data shows no signs of stopping. In fact, the accumulated volume of data will reach 163 zettabytes by 2025. Recognizing the importance of data as valuable assets, companies are increasingly...
Blog Image

Four Grim Dreams of Great Technology

1593
The world has come to a point where life without the pervasive presence of technological gadgets is very hard to imagine. And yet, this technology-filled world is not immune to crises. Which of them...
Blog Image

The Quantum Internet: A Nightmare from a Spy Dream

2029
Ensuring that information sent over the internet does not fall into the wrong hands is one of the greatest technological challenges of our age. Therefore, network administrators and cryptologists closely follow reports on the...
Blog Image

What People Don’t Get about Privacy?

3969
You know the feeling. Whether it is for access to an app, a subscription, or your favorite pair of sneakers. You press “add to cart”, finalize your online purchase, and fill out your payment details...