The previous post talked about the FIWARE project in general. This post will describe how to setup a virtual machine using Docker.
The FIWARE technical ecosystems (consisting eg. of the FIWARE Lab and Cloud) has little to offer on backend storage facilities. Thankfully, as being based on OpenStack, a developer should be fairly free to to set up anything up to the hearts content, as long as it fits into a virtual machine. Given that FIWARE supports Docker, I choose to go that route.
Continue reading “Docker on FIWARE”
I am currently involved in a project to assess and improve the quality of (meta-)data on open data portals. My fine colleagues at Vienna University of Economy showcased their current state of affairs on PortalWatch and presented some yet to disclose statistics on data quality of checked portals. That day I learned that Socrata powered open data portals store all their data in a proprietory data vault as opposed to CKAN, where internal storage is optional. Storing data within one system has it’s advantages like uniform access for analysis. But in the long run it is not such a great idea.
Continue reading “(Open) Data sharing for free”
FIWARE is a roughly 400 Million EURO EU-funded project to kick off an European cloud infrastructure and ecosystem. Wait, 400 Million Euros? That raised legit questions in me how my tax money is used, what is available and what not, what works and what is more shiny rather than useful.
I have a firm interest in Open Data and given my technical background, from time to time, I seek technical challenges. As Austria released their address data (including ZIP codes) as public sector information this kicked-off my challenge to import these data sets into a public cloud, to inspect them, and think about use cases. Continue reading “Getting go with FIWARE”
For some time, an email signature like
Please consider the environment before printing this email.
Join the campaign at http://thinkBeforePrinting.org
was not uncommon, sites even providing guidance and further information. I, personally, always hated stuff like that, only surpassed by legal cruft seen in emails governed by law jerks, some of them definitely funny.
Clearly, the printing emails instead of reading them online has an expiry date as people read their mails on smart devices, even executives. But, the time is ripe for a new disclaimer, this time not only affecting the mail itself but mostly it’s attachment:
Please consider the privacy before sharing this email and it's attachments
with your seemingly free document sharing system of choice.
Remain self-determined, respect the privacy of your co-workers and
join the campaign at https://sdeem.org
No, that domain doesn’t exist. If it would exist, you would be able to read about the ever increasing amount of information what get’s shared with us, our increasing inability to cope with that bulk load of data and the almost-crime you commit when trying to remain in digital anonymity.
TL;DR: Big Data Analytics while retaining privacy is solved using distributed and encrypted processing on the Enigma network. The article describes fundamental principles of the involved cryptography, Enigmas architecture and use-cases in public administration.
Authors: Johann Höchtl (@myprivate42) & Bettina Rinnerbauer (@BRinnerbauer) Continue reading “Solving a hard problem – retaining privacy in Big Data Analytics”
Just for the record, before the OP might decide to delete it: Seen on reddit: […] 3 years ago I tried to clean a laptop belonging to a Boeing engineer whose daughter had gotten it infected with something while browsing the internet. I was unable…
Just for the record, before the OP might decide to delete it: Seen on reddit:
3 years ago I tried to clean a laptop belonging to a Boeing engineer whose daughter had gotten it infected with something while browsing the internet. I was unable to clean it due to the Boeing-mandated security settings, which prevented any and all attempts at removal of the virus (although the virus installed itself just fine thanks to a Java hole).
Every single one of those boeing laptops was running a woefully outdated version of Java because it was needed to run one of their 3D-model viewing programs. So thanks to that one requirement, every one of those laptops was a ticking time bomb, waiting for the right moment to send all that proprietary data to the Chinese.