Thalasar Ventures

Category : Big Data

A guide to data mining with Hadoop

A guide to data mining with Hadoop
Until recently, only a few large companies – such as IBM, Microsoft and SGI – provided architecture for data mining. Now, open source solutions have become increasingly viable and popular, among the most promising is the framework Apache Hadoop.
Read more on Information Age

Big-Data Project on 1918 Flu Reflects Key Role of Humanists
That kind of primary-source analysis, the historian's version of close reading, is a tried-and-true method of investigation. But large-scale digital databases, adroitly mined, can help historians pinpoint specific sources that are worth that kind of …
Read more on Chronicle of Higher Education (subscription)

Oil Import Dependence Not Aways Economic Disadvantage, Study Finds
Citing data from the US International Trade Administration, Saudi exports to the US in 2013 totaled about $ 51.8 billion while US exports to Saudi Arabia were valued again higher year-on-year at about $ 18.9 billion. …. supply security does not, in …
Read more on Energy Collective

Software Company Anahata Announces GlassFish v4 As Strategic Java EE Server

Perth, Western Australia (PRWEB) February 24, 2015

Anahata is a privately owned Australian software Development Company. It specializes in the scrutiny, development, implementation and maintenance of custom software Perth. The company delivers inexpensive, cost-efficient and durable applications that have minimal ongoing and upfront fees.

The company has been using GlassFish version 3.0 and is in the process of migrating various web applications to GlassFish version for that have been running on the Sun Java System Application Server (Java EE 6).

Anahata utilizes GlassFish for web application development and enterprise applications alongside a desktop interface like Java FX. Its customized desktop applications are deployed to GlassFish and activated through Java Web Start.

GlassFish employs the Apache Tomcat to provide Java Web components like JSP pages and Servlets as an open-sourced application server. Web applications running on Tomcat can be seamlessly integrated to GlassFish. The zero licensing costs have made it possible for various software companies to adopt GlassFish in a bid to try the latest features of Java EE.

Anahata targets quality through the use of agile processes and tools. It enables clients to be engaged in every stage of development by defining priorities and tasks.

The company employs a continuous integration system allowing clients to test the software regularly during the design and development stage. The clients’ staff are trained on-site to operate the system efficiently at the end of the project development.

Anahata utilizes cross-platform solutions to ensure stability, security and safety in order to ensure the long lifespan of the customized software application. The company also uses a customer-centric approach that involves business analyst and software developer input. The team engages in on-site assessment of the client’s operations to collect data that is used in the custom software development of the ICT solutions in order to enhance workflow.

The company provides a three month warranty to its clients and they get support via unlimited consultation through email and telephone. This enables clients to access the online task and issue management system. They are thus able to reports errors or defects and make requests for enhancements during the testing and development stage of the software.

Anahata has gained experience in embedded device development and delivers embedded applications running on low resources like AMD, ARM and Intel Atom. The devices are connectible to sensors using technologies such as Ethernet, CAN and USB. These devices are employed in the mining sector and installed on machinery equipment and vehicles for the purpose of tracking.

Manual code and web-based review processes alongside comprehensive and integration testing units to ensure that quality expectations of the client are met.

Anahata is a certified MYOB developer partner and supplies customized software that is seamlessly integrated with applications like MYOB AccountRight Desktop and MYOB AccountRight Live (cloud). The company is also a Certified Oracle Partner and uses the technology to deliver open source applications with open standards. These applications are based on technologies like Java Enterprise, AMD, MySQL and Java EE.

The company has partnered with local vendors in Perth to deliver integrated turnkey solutions. Among the technologies it supplies are barcode printing, RFID scanning, real time monitoring and tracking, infrastructure and mobility.

Anahata also delivers ICT solutions for Mac, Windows and Linus as a cross-platform vendor. The software company delivers solutions that are easily incorporated with Mac applications on the Mac platform. Anahata delivers patients records management systems that run on the Mac operating system and are merged with medical applications like Genie.

About Anahata Technologies Pty Ltd

Founded in Western Australia in 2010 by Pablo Rodriguez Pina, Anahata Technologies Pty Ltd is an Australian privately owned software development company with presence in Perth and Melbourne specializing in the analysis, design, implementation and support of cost-effective, custom built software applications.

Anahata’s preferred delivery approach is an iterative, agile, customer centric software development process where business analysts and developers work with the customers to gather requirements and an understanding of the current business processes, and to design and deliver a software solution that not only meets the business’s needs, but also is desgiend to improve business productivity.

Anahata’s preferred technological choice is to deliver cross-platform solutions based on open standards and open source technology that ensure stability, compatibility, and security over a long application lifespan. This enables a reduction in upfront and ongoing licensing fees.

Anahata is an Oracle Certified Partner and delivers custom software solutions based on Oracle Technology, such as Java, Java Enterprise Edition, MySQL or Oracle Database. The Australian software company is a certified MYOB developer partner providing Custom Software solutions that can integrate seamlessly with any MYOB software package such as MYOB AccountRight desktop or MYOB AccountRight Live (cloud).

For more information, visit

Find More Open Source Data Mining Press Releases

The Latin America Cloud Analytics Market is Expected to Reach $688.5 Million in 2019 – A Report by MicroMarket Monitor

(PRWEB) January 28, 2015

Latin America Cloud Analytics market report defines and segments the Cloud Analytics market in Latin America with analysis and forecast of revenue. This market is estimated to grow from $ 191.7 million in 2014 to $ 688.5 million in 2019, at a Compound Annual Growth Rate (CAGR) of 29.1% from 2014 to 2019.

Browse through the TOC of the Latin America Cloud Analytics market report to get an idea of the in-depth analysis provided. It also provides a glimpse of the segmentations in the market, and is supported by various tables and figures.

Cloud analytics is a cloud-enabled service model that allows an organization or individual to perform business analysis by providing the analytics elements though public, private and hybrid cloud. Data analytics and Cloud Computing are the factors that have led to the evolution of data analysis through cloud based analytics. They have enabled the use of cloud based business analytics in small, medium as well as large enterprises.

In Latin America various factors, such as, cost-effectiveness, easy installment and high growth in big data are driving the cloud analytics market in this region. The key players of this market include IBM, Oracle, SAP, SAS, Salesforce and others. Many of IBM’s popular business analytics applications are now available in cloud-based or software as a service (SaaS) editions. These solutions are not only initiating business analytics deployments up and running in minutes, but are also reducing the costs and risks of development and deployment.

Early buyers will receive 10% customization on this report.

Being a Latin America holds the substantial share of the overall cloud analytics market which is expected to grow exponentially by the end of 2019. The organizations operational in this region are considered to be the most techno savvy and innovative. The quest of having a competitive edge over other competitors leads these organizations to exploit the advanced technologies and get the best out of them. Moreover, rapid adoption of mobile technology and extensive use of social media is also contributing to the growth of cloud analytics market in Latin America.

Speak to Analyst @

Latin America Cloud Analytics market is segmented and forecast on the basis of solutions such as Cloud BI tools, Hosted Data Warehouse Solutions, Complex Event Processing Enterprise, Performance Management, Governance, Risk and Compliance, Analytics Solutions. Also it is segmented on the basis of industry verticals such as BFSI, Healthcare, Media & Entertainment, Telecommunication, Consumer Goods & Retail, Business & Consulting, Education & research, Manufacturing & Energy. The market is further segmented and forecasted on the basis of End-users such as Enterprises, Medium Business& Small Business (SMB). The Latin America Cloud Analytics market is also segmented on the basis of major countries in this region such as the Brazil, Mexico and Columbia.

The report also includes market share and value chain analyses, and market metrics such as drivers and restraints. In addition, it presents a competitive landscape and company profiles of the key players in this market.

Related Report:

Europe Cloud Analytics Market:

The European cloud analytics market is expected to grow from $ 1,482.0 million in 2014 to $ 4,052.9 million by 2019, at an estimated CAGR of 22.3%, during the forecast period. This market contributes to 22.54% of the global market in 2014. Market can be segmented by Geographies, Applications, Macro Indicators, Companies, Types and Technologies.

About MicroMarket Monitor :

MicroMarket Monitor identifies and attends to various unmet needs of different industrial verticals, which include value chain impact analysis. The company publishes about 12000 Market Research Reports on various Micro Markets across the world. The graphical nature and multidimensional analysis of these reports provide advanced Business Intelligence Tools to the clients in that particular target market.


Mr. Chandrasekhar K.

5601 Bridge Street

Suite 300

Fort Worth, TX 76112

Tel: +1-888-502-0539

Email: sales(at)micromarketmonitor(dot)com

Connect with us on LinkedIn at

CICA 2015 International Conference Focuses on Increasing The Strategic Advantages of Captives

(PRWEB) January 20, 2015

The Captive Insurance Companies Association (CICA) 2015 International Conference

March 8-10 at the Loews Royal Pacific, Orlando, Florida offers a full agenda designed to explore the strategic advantages of captives across a wide range of business needs.

“Attendees will see our theme Captives: The Strategic Advantage is clearly addressed throughout 23 educational sessions. Those sessions will identify innovative uses of captives to enhance and strengthen business performance,” says Dennis P. Harwick, CICA President.

Conference program highlights include:

“How to Understand and Get the Most Out of Your Actuarial Report” – Demystifies report terminology and helps you identify underutilized information and better understand how your organization can use the actuarial report information for strategic risk management.

“Using Captives to Corral Credit & Political Risk” –Case studies will illustrate how risks are identified and addressed, including how captive utilization can enhance long-term risk management goals.

“Healthcare Captives…Survival of the Fittest” – Focuses on how to build a better healthcare captive, how to assess which risks to add and understanding the regulatory impact of the Affordable Care Act.

Additional program sessions include:

“New Business Strategy: Designing and Implementing a Cyber Risk Insurance Program”
“CICA’s Best Practices and Strategies for Transfer Pricing”
“Developing the Operational Strategy of Managing Medical Stop Loss in Your Captive”
“Big Data and Captives: Using Data and Dashboards to your Strategic Advantage”
“Developing the Next Generation of Captive Professionals”

Special thanks to conference Gold Sponsors Johnson Lambert, Saslow, Lufkin & Buggy LLP, and Zurich for their support and helping to make the 2015 CICA International Conference possible.

For Information on the full program, travel information and registration fees for the CICA 2015 International conference visit the CICA website.

About the Captive Insurance Companies Association (CICA)

CICA is the only global domicile-neutral captive insurance association. CICA is committed to providing the best source of unbiased information, knowledge, and leadership for captive insurance decision makers. CICA is your advocate around the world, key to the captive industry and the resource for captive best practices.

AvePoint Provides Broader Business Protection through Data Loss Prevention with Launch of Compliance Guardian SP 3

Jersey City, NJ (PRWEB) January 13, 2015

AvePoint, the established leader in enterprise-class big data management, governance, and compliance software solutions for next-generation social collaboration platforms, today announced the general availability of AvePoint Compliance Guardian Service Pack (SP) 3. Compliance Guardian mitigates privacy, information security, and compliance risks across your information gateways with a comprehensive risk management process allowing organizations to document their policies, implement and measure them, and demonstrate conformance.

Compliance Guardian enables organizations to understand their current environment through data discovery and then allows organizations to build a culture of compliance in which the business can say what they do to protect sensitive data, do what they say, and prove that they have appropriate controls in place for its sensitive data. Capabilities include:

Data Leakage Detection – Compliance staff are able to centrally monitor the status associated with any incident, as well as its associated risk levels to ensure critical violations are prioritized according to business need. Combined with action trend reports and detailed historical analysis, organizations will be able to track and manage incidents more efficiently to drive a successful risk management lifecycle.

Data at Rest – AvePoint Compliance Guardian helps you discover dark data wherever it lives in your current IT environment through its extensible APIs. Compliance Guardian data repository scans are currently available out-of-the-box for file shares; databases; Web sites, applications, and Web-based systems; SharePoint; Cloud; and social platforms – including Microsoft Lync and Yammer.

Data Identification – Protect regulated and sensitive data from harmful leak or misuse with scheduled and real-time context-aware reporting and classification. This includes Fingerprinting, Compliance Guardian’s latest check type which allows administrators to use file patterns as test criteria in order to identify files that are identical or similar.

Compliance Guardian is designed to ensure that information is available and accessible to the people who should have it and protected from the people who should not by taking a comprehensive lifecycle approach.

    Discover data across multiple information gateways in your enterprise to shed light on dark data and other potential sources of risk
    Scan content in motion or at rest against out-of-the-box or customized checks for a wide range of privacy, information assurance, operational security, sensitive security information, and accessibility requirements
    Drive enterprise classification and taxonomy with user-assisted and automated classification
    Take corrective action automatically to secure, delete, move, quarantine, encrypt, or redact risk defined content
    Enhance incident tracking and management with an integrated incident management system in addition to trend reports and historical analysis to measure your organization’s compliance improvements over time
    Monitor data and systems on an ongoing basis to demonstrate and report on conformance across your enterprise wide information gateways and systems with one system that works where you work

“Trust is something that businesses must work to establish with their customers every day. Once lost, it is very difficult to regain. Trust requires accountability and transparency,” said Dana Simberkoff, Chief Compliance and Risk Officer, AvePoint. “Compliance Guardian enables organizations to understand their current environment through data discovery and then allows organizations to build a culture of compliance in which the business can say what they do to protect sensitive data, do what they say, and prove that they have appropriate controls in place for its sensitive data.”

AvePoint Compliance Guardian is generally available today, January 13, 2015. For more information on how Compliance Guardian can prevent sensitive data leakage, please visit our website, read our white paper, or visit the AvePoint Community.

About AvePoint

AvePoint is the established leader in enterprise-class big data management, governance, and compliance software solutions for next-generation social collaboration platforms. Focusing on helping enterprises in their digitization journey to enable their information workers to collaborate with confidence, AvePoint is first to market with a unique solution that centralizes access and control of information assets residing in disparate collaboration and document management systems on-premises and in the cloud. AvePoint solutions and services aim to bring together business, IT, as well as compliance and risk officers to serve key business objectives such as big data, cloud integration, compliance, enterprise content management, and mobile data access monitoring.

Founded in 2001 and based out of Jersey City, NJ, AvePoint serves more than 13,000 organizations in five continents across all industry sectors, with focused practices in the energy and utilities; financial services; healthcare and pharmaceuticals; and public sector industries. AvePoint is a Microsoft Global ISV Partner, Gold Certified Collaboration and Content Partner and winner of 2014 Microsoft Partner of the Year Award in Public Safety and National Security, as well as a US Government GSA provider via strategic partnerships. AvePoint is privately held and backed by Goldman Sachs and Summit Partners.

All product and company names herein may be trademarks of their registered owners.

Identity Theft Resource Center Breach Report Hits Record High in 2014

SAN DIEGO, Calif. (PRWEB) January 12, 2015

The number of U.S. data breaches tracked in 2014 hit a record high of 783 in 2014, according to a recent report released by the Identity Theft Resource Center (ITRC) and sponsored by IDT911™. This represents a substantial hike of 27.5 percent over the number of breaches reported in 2013 and a significant increase of 18.3 percent over the previous high of 662 breaches tracked in 2010. The number of U.S. data breach incidents tracked since 2005 also hit a milestone of 5,029 reported data breach incidents, involving more than 675 million estimated records.

Continuing a three-year trend, breaches in the Medical/Healthcare industry topped the ITRC 2014 Breach List with 42.5 percent of the breaches identified in 2014. The Business sector continued in its second place ranking with 33.0 percent of the data breach incidents, followed by the Government/Military sector at 11.7 percent. These categories were followed by the Education sector at 7.3 percent and Banking/Credit/Financial at 5.5 percent.

“With support from IDT911, the ITRC has been able to continue its efforts in tracking and understanding the complex issues surrounding the growing number of data breaches,” said Eva Velasquez, President and CEO, ITRC. “With an average of 15 breaches a week in 2014, consumers need to be made aware of the risk of exposure to personal identifying information in order to understand the threat posed by this growing list of data breach incidents.”

“The ubiquitous nature of data breaches has left some consumers and businesses in a state of fatigue and denial about the serious nature of this issue. While not all breaches will result in identity theft or other crimes, the fact that information is consistently being compromised increases the odds that individuals will have to deal with the fall out. The ITRC data breach reports are a necessary educational tool for businesses, government and advocates alike in our communication efforts,” Velasquez added.

In 2014, Hacking incidents represented the leading cause of data breach incidents, accounting for 29.0 percent of the breaches tracked by the ITRC. This was followed for the second year in a row by breaches involving Subcontractor/Third Party at 15.1 percent. Accidental Exposure of information in 2014 jumped to 11.5 percent, up from 7.5 percent recorded in 2013. Data on the Move dropped to 7.9 percent from the 12.9 percent identified in 2013.

The ITRC began tracking data breaches in 2005 and since that time has been maintaining an extensive database capturing and categorizing U.S. data breaches into five industry sectors with a number of other attributes such as how information was compromised and type of data.

“It is important to note that the 5,000 breach milestone only encompasses those reported – many breaches fly under the radar each day because there are many institutions that prefer to avoid the financial dislocation, liability and loss of goodwill that comes with disclosure and notification,” said Adam Levin, founder and chairman of IDT911. “Additionally, not all businesses are required to report they’ve had a breach for a variety of reasons, which means the number of breaches and records affected is realistically much higher.”

From 2007 to 2011, the Business sector, with a 10-year average of 34.3 percent, represented the largest percentage of breaches, often far surpassing the next highest category. The Medical/Healthcare sector, with a 10-year average of 26.4 percent, took over the top spot in 2012, attributed primarily to the mandatory reporting requirement for healthcare breaches being reported to the Department of Health and Human Services (HHS). In 2005, this category reported the least number of breaches.

In 2005 and 2006, Education and Government/Military held the spots for most breaches, at 47.8 percent and 30.8 percent respectively. As indicated in the above chart, these two categories now represent a 10-year average of 15.3 percent and 15.8 percent. The Banking/Credit/Financial industry, with a 10-year average of 8.1 percent, has reported the least number of breaches for nine of the past 10 years.

Over the years, hacking has been a primary cause of data breach incidents, leading to an 8-year average of 21.7 percent. Data on the Move, a leading cause of breaches in 2007 and 2008, ranks second with an average of 15.9 percent. (This category includes storage devices or laptops lost in transit.) Insider theft and Accidental Exposure follow at just over 12 percent, and Subcontractor/Third Party follows at 11.2 percent.

“Without a doubt, 2015 will see more massive takedowns, hacks, and exposure of sensitive personal information like we have witnessed in years past,” said Levin. “Medical data and business information like intellectual property will be prime targets, with cyber thieves looking for opportunistic financial gain based on black market value, corporate extortion and cyber terrorism.”

As indicated in the chart above, other categories have been added to the ITRC database over the years. Employee Negligence was added in 2012 (3-year average = 9.5 percent) and Physical Theft was added in 2014 (12.5 percent of 2014 breaches). An eight-year average of 29.6 percent of all breaches, reported on and tracked by the ITRC, did not have sufficient information to identify the cause.

The ITRC continues to track paper breaches even though these types of breaches seldom trigger state breach notification laws. This type of occurrence has dropped considerably since the high of 26 percent recorded in 2009, with an 8-year average of 17.1 percent.

It is also noteworthy that the reporting of “Unknown”, for the total number of records exposed on the ITRC Breach List, has shown a decline since the high of 50.3 percent in 2012. This again may be due to the high percentage of medical/healthcare entities which are required to report the number of records. The eight-year average of “unknown” is 41.5 percent.

Tracking of breaches involving Social Security numbers and Credit Card/Debit Card information began in 2010. The exposure of SSN’s has shown a definite decline over the past five years since the high in 2010 of 62.1 percent. The same cannot be said for credit/debit cards, which reflected a rise in both 2013 and 2014. The five-year averages for these two categories are 51.3 percent and 19.8 percent respectively.

“I would love to report that the decline in breaches exposing SSNs is a testament to increased security efforts by institutions to protect the golden ticket to a consumer’s identity,” continued Levin. “Unfortunately, those compromises have been dwarfed by the alarming and exponential rise in successful attacks on point-of-sale systems at big box retailers. The FBI estimates that more than 1,000 retailers are under assault with the same (or tweaked versions) of the malware that compromised Target and Home Depot.”

He concludes, “therefore, it is incumbent on consumers to be their own best guardian by controlling what personal information they make available in order to minimize their risk of exposure, monitoring their accounts daily so they know as quickly as possible they have an issue, and having a damage control program to help them get through identity related problems quickly, efficiently and thoroughly.”

For 10 years, the ITRC has been committed to dedicating resources to providing the most accurate review and analysis of U.S. data breach incidents. This has long involved adding new categories and updating methodologies to best capture patterns and any new trends.

“Maintaining a quality multi-year data breach incident database necessitates constant attention to what is happening in the world of data breaches, legislative efforts on breach notification and industry reactions to incident response preparedness,” said Karen Barney, ITRC data breach analyst. “As a credible and thorough resource, the ITRC is able to provide unique insight and information to consumers and businesses alike.”

About the ITRC Breach List

The ITRC Breach List is a compilation of data breaches confirmed by various media sources and/or notification lists from state governmental agencies. Breaches on this list typically have exposed information that could potentially lead to identity theft, including Social Security numbers, financial account information, driver’s license numbers and medical information. This data breach information, and available statistics, have become a valuable resource for media, businesses and consumers looking to become more informed on the need for best practices, privacy and security measures in all areas – both personal and professional.

About the ITRC

Founded in 1999, the Identity Theft Resource Center® (ITRC) is a nationally recognized non-profit organization which provides victim assistance and consumer education through its toll-free call center, website and highly visible social media efforts. It is the mission of the ITRC to: provide best-in-class victim assistance at no charge to consumers throughout the United States; educate consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation; and, serve as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams, and other issues. Visit Victims may contact the ITRC at 888-400-5530.

About IDT911™ (IDentity Theft 911®)

Founded in 2003, IDT911™ is the nation’s premier consultative provider of identity and data risk management, resolution and education services. The company serves 17.5 million households across the country and provides fraud solutions for a range of organizations, including Fortune 500 companies, the country’s largest insurance companies, employee benefit providers, banks and credit unions and membership organizations. A subsidiary of IDT911, IDT911 Consulting™ provides information security and data privacy services to help businesses avert or respond to a data loss incident. Together, the companies provide preventative and breach response services to more than 770,000 businesses in the United States, Canada and the United Kingdom. IDT911 is the recipient of several awards, including the Stevie Award for Sales and Customer Service and the Phoenix Business Journal Tech Titan award for innovation in breach and fraud-fighting services. The company is the organizer of the Privacy XChange Forum, an annual conference that brings together high profile privacy thought leaders. For more information, please visit,, and

Knowledgent Implements First-of-Its-Kind Healthcare Enterprise Data Lake

Warren, NJ (PRWEB) January 08, 2015

Knowledgent, the data and analytics firm, today announced a first-of-its-kind data lake for a major healthcare enterprise. This data and analytics solution enables both business analysts and data scientists to access a wide variety of structured and unstructured datasets in a consolidated data management environment for agile, advanced analytics.

Knowledgent was engaged by this healthcare enterprise to develop and implement a data and analytics strategy that addressed the enterprise’s challenge around decentralized data management, which had led to a lack of governance and control, causing extensive resource misalignment. Knowledgent partnered with Hortonworks®, the contributor to and provider of enterprise Apache™ Hadoop®, for the implementation of a next-generation data warehouse and analytics environment, leveraging a Hadoop-based data lake. This engagement empowered business users and data scientists to rapidly access and analyze structured, semi-structured, and unstructured data for advanced analytics. A case study about this engagement can be found on the Knowledgent blog.

“Our partnership with Hortonworks was a critical enabler of the Hadoop-based data lake,” said Matthew Arellano, Healthcare Portfolio Partner at Knowledgent. “As a result, business analysts and data scientists within the enterprise can focus their talents on producing better and faster models for such analytics as member retention, utilization management, Medicare STARS, and risk adjustment.”

“The development of industry-specific applications is a natural next step in the evolution of the Hadoop market and we look forward to working with Knowledgent to provide data-driven applications for their customers,” said John Kreisa, Vice President of Strategic Marketing at Hortonworks. “Our industry-leading Hadoop distribution integrated seamlessly with the data lake solution that, powered by Knowledgent’s expertise in data and analytics, will help users maximize the value from their data.”

About Knowledgent

Knowledgent is a data and analytics firm that helps organizations transform their information into business results through data and analytics innovation. Our expertise seamlessly integrates industry experience, data analytics and science capabilities, and data architecture and engineering skills to uncover actionable insights.

Knowledgent operates in the emerging world of big data as well as in the established disciplines of enterprise data warehousing, master data management, and business analysis. We have not only the technical knowledge to deliver game-changing solutions at all phases of development, but also the business acumen to evolve data initiatives from ideation to operationalization, ensuring that organizations realize the full value of their information.

For more information about Knowledgent, visit

Tech Pioneers Predict the Future of Lifestyle Technology in 2015

New York, NY (PRWEB) January 03, 2015

Living in Digital Times, a series of conferences and exhibits at the 2015 International CES®, brings together the newest innovations and leading lifestyle technology experts with over 200 exhibitors and over 300 conference speakers this year. From kids that code, to high tech education, to family entertainment and tools, fitness and health and the growing senior dependency on technology, it’s clear that this year’s most innovative products at CES target consumers wanting a more digital lifestyle.

LIDT asked some top conference speakers to weigh in on the future of technology posing this question: What is the greatest impact technology will have on your field in 2015?

Advances in Technology

“Everyone in America will either have their own start up or they’ll be replaced by robots and just spend 2015 on the beach. Seriously, we can expect more collaborative maker environments and more startups doing great things. I also expect an upswing in brick and mortar stores because people are hungry for physical experiences, not just clicking. The electronic wallet and alternative forms or payment will begin to go mainstream and 2015 will be remembered as the year of the wearable.” – Robin Raskin, founder and president of Living in Digital Times

“The International CES will continue to be the place where companies big and small and from all facets of technology come together to share a common bond, a belief in innovation to help make the world a better place. In 2015, we’ll see gadgets coalesce into ecosystems to ensure even greater connectivity. Whether it’s your car, your home, or your mobile life, all of the various technologies you own will talk to each other to make our lives seamless, integrated and safer. We’ll see a new generation of products that just work.” – Gary Shapiro, president and CEO, Consumer Electronics Association (CEA) ®

Advances in Kids Tech

“2015 will be ‘more more more’ especially more apps made by small, smart, extremely motivated publishers. They’ll help Apple further dominate the multi-touch space, further crowding out video game and toy options. The great screen debate will mature in 2015, shifting from ‘no screens’ to ‘which apps’ and the effort to help children become coders and makers will be made easier thanks to more DIY robots and various types of kits. The hype surrounding 3D printing will shift to something worth getting excited about in 2015 — 3D Goggles.” – Warren Buckleitner, editor, Children’s Technology Review; Moderator, FamilyTech

“The toy Industry looks to technology predominantly for trends. These trends typically filter down to children over time. The toy industry also looks to technology to execute new and old features in less expensive and more exciting ways. However, I believe that the greatest impact technology has on our industry is the competition that comes from it, which ultimately takes away from the sales of traditional toys. That’s why it’s important for the toy industry to remember that, as much as technology changes, advances and continues to blow our minds, we need to not lose sight of the fact that a child still needs to feel that there’s a beating heart. I believe that the toy Industry understands this in profound ways that are unique to children.” – Ben Vardi, executive vice president, SpinMaster; Panelist, FamilyTech

Advances in Education

“In a word: results. When we apply the science of learning with personalized technology that engages students and meets their needs, we can better prepare them for success in college and subsequently in the workforce. And by developing technology that supports the digital ecosystems that our schools and universities are cultivating, we can make life easier and efficient for educators, as well.” – David Levin, president and CEO, McGraw-Hill Education; Speaker, TransformingEDU

“Now that higher education has fully recovered from the Spice Girls-esque phenomenon of Massive Open Online Courses (MOOCs), colleges and universities are focusing on using technology to improve the affordability and efficacy of their programs that students and employers actually care about: degrees. Accredited universities are utilizing online delivery to enable competency-based learning, a much more cost effective way to deliver higher education, allowing students to earn degrees for as little as $ 5,000. Other universities are employing adaptive learning and gamification, which promise to significantly improve student outcomes.” – Ryan Craig, managing director, University Ventures; Panelist, TransformingEDU

“In 2015 we will see tremendous strides made in personalized learning. The birth of the ‘adaptive MOOC’ and more ‘Open MOOCs’ will kick start the Webification of education. The Web is the most robust publisher of learning content in the world. The problem is getting that information into a learning environment that’s malleable and supportive of content of all kinds. We’re not there yet, but when it happens it might be the most transformative moment in education in the last 100 years. Publishers will thrive when this happens, too. They will be able to move beyond teaching institutional knowledge and double down on specialty content that only publishers can create, thus building a bigger moat around their business model. In addition, we will see a focus on the personalized learning experience more than the underlying technology. Many have built personalized learning solutions, but where they have failed is making them modular, adaptable, enjoyable experiences. That’s gonna chance and for the better in the coming 12 months.” – Andrew Smith Lewis, founder and executive chairman, Cerego; Panelist, TransformingEDU

Advances in Fitness and Health

“When it comes to social fitness there are three types of consumers. Those who share everything with everyone, those who share directly within their fitness community and those who track fitness data solely for personal development. To truly develop an ecosystem that provides useful information for all three of these audiences will be the challenge in 2015. Keeping existing athletes motivated and encouraging them to expand their social networks to those just starting their fitness journey is the real opportunity for growth.” – Robin Thurston, SVP Digital, Under Armour; Presenter, FitnessTech Summit

“The connected health revolution is transforming our habits by putting us at the front and center of our own health management. In order for technology to truly serve its purpose beyond early adopters, it must be invisible. Wearable needs to become truly wearable with genuine fusion between fashion and technology. Stationary sensors need to be embodied into beautiful hardware that does not come in the way of our daily routine. Upon achieving these principles, connected health devices and the technology inside of them can become true lifelong companions for better health and wellness.” – Cedric Hutchings, CEO, Withings; Speaker, Digital Health Summit

“Within the headphone category and sports headphones in particular you will see a lot more convergence with other wearable technologies. This will not only simplify the daily routine of bringing these health and fitness devices into one’s life but also make for a better value proposition encouraging more to do so.” – Bruce Borenstein, president & CEO, AfterShokz; Panelist, FitnessTech Summit

“2015 will be the year in fitness tech where the conversation moves beyond the latest whiz bang device and evolves beyond the simple reverence for more data. We will and we must start talking in terms of information and advice and acknowledge the role that coaches and trainers, be it virtual or in person, play in the larger equation.” – Michael Yang, managing director, Comcast Ventures; Moderator and Panelist, FitnessTech Summit

“The transformative changes happening across the healthcare landscape, which are being fueled by new players, products, business models, and record amounts of venture capital, have elevated the dialogue about being and staying healthy. Our job in 2015 will be to leverage technology to make health information more understandable and actionable, to improve access and the quality of care, and to help people be better healthcare consumers so they can live healthier lives.” – David Schlanger, chief executive officer, WebMD; Special Guest, Digital Health Summit

Advances in Wearables

“There will be a greater pull for highly functioning – yet aesthetically beautiful – wearables that enable a deeper connection to ourselves, our environment, and each other. Well-designed brain sensors will markedly disrupt the field of wearable technology by democratizing access to inner workings of the brain and behavior, allowing people to do more with their mind than they ever thought possible.” – Ariel Garten, CEO and co-founder of InteraXon; Panelist, FamilyTech

Advances for Seniors and Baby Boomers

“Technology can bring independence and connectedness, which can result in happier lives and offer real possibilities for people as they age. AARP recognizes that Americans 50+ are ready, willing and able to take advantage of emerging technology in 2015. These new technology products will utilize sensors that are more sensitive and less intrusive. Wearables, such as designer-quality connected watches, will surface that easily respond to voice command and address multiple needs around health and fitness, medication management, and emergency response – and also tell time. Products with greater interoperability for the connected home will be among new options. We will also see a growing number of technologies for older adults that link in their caregivers, as well as a growing number of products designed for younger age groups being bought and used by older age groups where ease of use, and plug-and-play, are the standard.” – Jody Holtzman, senior vice president, Thought Leadership, AARP; Speaker, Lifelong Tech Summit

“2015 will see two key transitions. First, the adoption of consumer technologies will play an increasingly important role in connected healthcare due to the efficiency gains through using consumer devices and bring-your-own-device models. Secondly, cost and quality accountability will continue to be a focus for healthcare institutions. These two trends together will drive a transition for connected healthcare as institutions transition from ‘pilotitis’ to ‘standard of care’ for the on-going management of those with chronic conditions and post-acute transitions. This combination, coupled with proven financial sustainability of these models, will help grow these care models in scale.” – Marcus Grindstaff, vice president, US Sales and Global Market Development, Intel-GE Care Innovations™; Speaker, Lifelong Tech Summit

For a complete list of speakers and conference agendas, go to

Owned and produced by the Consumer Electronics Association (CEA)®, the 2015 International CES will occur January 6-9, 2015 in Las Vegas, Nevada.

About Living in Digital Times:

Founded by veteran technology journalist Robin Raskin, Living in Digital Times brings together the most knowledgeable leaders and the latest innovations impacting both technology and lifestyle. It helps companies identify and act on emerging trends, create compelling company narratives, and do better business through strong network connections. Living in Digital Times produces technology conferences, exhibits and events at the International CES and other locations throughout the year by lifestyle verticals. Core brands include Digital Health Summit, FitnessTech Summit, Lifelong Tech, Kids@Play Summit, Family Tech Summit, TransformingEDU, MommyTech TV, Wearables and FashionWare runway show, Mobile Apps Showdown, Last Gadget Standing, Battle of the Bands, and the KAPi Awards. The company also works with various foundations and manages the Appreneur Scholar awards program for budding mobile entrepreneurs. For more information, visit and keep up with our latest news on Twitter, LinkedIn and Facebook.

About CES:

The International CES is the world’s gathering place for all who thrive on the business of consumer technologies. It has served as the proving ground for innovators and breakthrough technologies for more than 40 years—the global stage where next-generation innovations are introduced to the marketplace. As the largest hands-on event of its kind, CES features all aspects of the industry. And because it is owned and produced by the Consumer Electronics Association (CEA), the technology trade association representing the $ 211 billion U.S. consumer electronics industry, it attracts the world’s business leaders and pioneering thinkers to a forum where the industry’s most relevant issues are addressed. Follow CES online at and through social media:

Media Contacts:

Linda Krebs/Sarah Gartner

LKPR, Inc. for Living in Digital Times


Datalogic Brings Revolutionary Retail to NRF 2015

Eugene (PRWEB) December 23, 2014

Datalogic, the global leader in the development of automatic data capture (ADC) solutions for the retail industry, will be exhibiting at the upcoming National Retail Federation (NRF) Big Show in New York City, January 11 – 13, 2015 at the Javits Center in booth 3616.

Datalogic will display solutions that improve the shopping experience, increase efficiency, strengthen customer loyalty, and keep retailers ahead of their competition. Examples of the revolutionary technology that Datalogic will demonstrate will include advanced high performance checkout solutions, automated scanning, queue busting software applications, advanced imaging readers, personal shopping, and item recognition solutions.

Bill Parnell, CEO and President of Datalogic ADC says, “We listen to the voice of retailers and our channel partners, to help us create, adapt and bring to market revolutionary technologies that continually improve the shopping experience for consumers and take retailers to the next level.”

We are excited to have the opportunity to show solutions that address the key trends and future requirements of the retail industry. The NRF 2015 show in New York will offer customers an exciting platform for Datalogic to demonstrate our Revolutionary Retail concepts.

Be sure to stop by the Datalogic booth 3616 to see these and many other innovative solutions.

Datalogic Group is a global leader in Automatic Data Capture and Industrial Automation markets. As a world-class producer of bar code readers, mobile computers, sensors, vision systems and laser marking systems, Datalogic offers innovative solutions for a full range of applications in the retail, transportation & logistics, manufacturing and healthcare industries. With products used in over a third of world’s supermarkets and points of sale, airports, shipping and postal services, Datalogic is in a unique position to deliver solutions that can make life easier and more efficient for people. Datalogic S.p.A., listed on the STAR segment of the Italian Stock Exchange since 2001 as DAL.MI, is headquartered in Lippo di Calderara di Reno (Bologna). Datalogic Group as of today employs about 2,400 members of staff worldwide distributed in 30 countries. In 2013 Datalogic Group achieved revenues for 450,7 million Euro and invested over 35 million Euro in Research and Development with a portfolio of over 1,000 patents across the world. For more news and information on Datalogic, please visit

Datalogic and the Datalogic logo are registered trademarks of Datalogic S.p.A. in many countries, including the U.S.A. and the E.U.

Find More Big Data Healthcare Press Releases

ThreatMetrix Predicts Mobile Will Represent More Than Half of Transactions in 2015 and Cybercrime Threats Will Continue to Evolve

San Jose, CA (PRWEB) December 18, 2014

ThreatMetrix®, the fastest-growing provider of context-based security and advanced fraud prevention solutions, today announced its cybercrime predictions for the New Year. From the good, such as increased information sharing, to the bad including the difficulties protecting the Internet of Things (IoT), and the ugly – data breaches in 2015 will be larger and more sophisticated than ever before – ThreatMetrix predicts the coming year will see cybercrime evolving in new ways.

The breadth and depth of the data breaches seen by the world in 2014 was shocking – spanning major banks, e-commerce giants, healthcare giants, casinos and others, exposing hundreds of millions of usernames, passwords and credit card details. The coming year will be no different, and businesses and consumers need to be prepared for continued changes in the cybercrime landscape.

To help businesses avoid falling victim to 2015 data breaches and other attacks and to educate consumers about growing cybercrime threats, ThreatMetrix has outlined several predictions for the New Year:

    Mobile Will Represent More Than Half of Transactions During the 2015 Holiday Season
During this year’s Cyber Week, from Thanksgiving Day through Cyber Monday, mobile accounted for 39 percent of all transactions across the ThreatMetrix Global Trust Intelligence Network (The Network). By next year, ThreatMetrix predicts this number will surpass 50 percent. Additionally, as retailers make the looming switch to Europay-Mastercard-Visa (EMV) payments systems by the October 2015 deadline, those systems also accept mobile capabilities such as Apple Pay, which will also contribute to increased mobile payments.

“Consumers are far more comfortable shopping on mobile devices than they were even a year ago, and that trust is going to continue to grow,” said Alisdair Faulkner, chief products officer at ThreatMetrix. “Unfortunately, many businesses face difficulties determining the authenticity of mobile transactions through hidden cookies and geo-location data. Leveraging a global network of trust intelligence enables businesses to differentiate between previously authenticated users and potential fraudsters and will be the best way to protect sensitive information and customers against cybercrime in 2015.”

    Information Sharing Will Continue to Rise
While cybercrime threats will grow in sophistication during the coming year, information sharing about those threats within and across industries will also grow to combat those cybercriminals. For example, the financial services industry is already paving the way for growth of information sharing with the Financial Services Information Sharing and Analysis Center (FS-ISAC), and retailers are beginning to see the benefits of information sharing, establishing their own group this past year. The Network, which analyzes more than 850 million monthly transactions across 3,000 customers, also provides a shared view of cybercriminals’ activity, enabling companies within The Network to protect their business by accurately identifying fraudsters, as well as good customers.

“Businesses in many industries are seeing the benefit of information sharing, and that will continue to increase in the coming year,” said Andreas Baumhof, chief technology officer at ThreatMetrix. “Unfortunately, while information sharing is common practice in some industries, businesses in other industries, such as retail, are often wary of sharing too much information with competitors. However, with today’s highly organized cybercriminals, it takes a network to fight a network. The balance is between businesses sharing good data, not just big data, and maintaining a certain level of trust to stay competitive with one another.”

    Cybercriminals Will Identify New Opportunities to Compromise Personal Information
In 2014, there were many high profile data breaches that were deemed “unprecedented.” Hundreds of millions of user accounts have been compromised, including the Home Depot breach and the Russian cybercrime ring exposing 1.2 billion passwords. Most recently, the Sony breach has been a sign of cybercriminals shifting their focus to cyber sabotage. In 2015, there will be more unprecedented attacks as cybercriminals continue to become more sophisticated.

“There is no end in sight,” said Reed Taussig, president and CEO at ThreatMetrix. “Last year, ThreatMetrix predicted the password apocalypse for 2014 – and the number of major data breaches over the past year targeting user login information shows that prediction was true. There are endless opportunities for hackers to steal personal information, and that’s not going to stop in the coming year – it’s going to get worse. I would venture to guess that in 2015, one of the world’s major stock exchanges may very well be compromised, which has the potential to result in severe economic damage on a global basis.”

    The Internet of Things Will Continue to Be a Security Nightmare
One of the first major hacks to the Internet of Things came in early 2014. It can be near impossible to know when one of the many connected devices used day-to-day is compromised – from smart phones to washing machines and refrigerators – and as more devices are added to the Internet of Things in the next year, protecting these devices will become even more difficult.

“We can’t even protect our most critical assets, so how can we be expected to protect a smart fridge?,” said Baumhof. “One of the biggest problems is that many of these tools have a long lifespan and current security systems rely heavily on the ability to patch systems on a regular basis. For most of the devices within the Internet of Things, that practice is not implemented, nor feasible.”

    Health Systems Will Become a Major Target for Cybercriminals
This year, U.S. healthcare spending hit $ 3.8 trillion. Unfortunately, almost one-third of that is wasted to fraud. As more money is dedicated to the healthcare market, cybercriminals will follow the trail to cash in on the market.

“In major data breaches, cybercriminals target credit cards and login credentials, but there are other sources where money is flowing, and it’s only a matter of time before cybercriminals ramp up their attention toward those industries,” said Faulkner. “In the New Year, insurance, healthcare and pharmacies will be new focuses for fraudsters. As healthcare information makes the shift electronically via the Health Insurance Portability and Accountability Act (HIPAA), fraudsters will find ways through its security holes to commit healthcare fraud and steal personal information.”

ThreatMetrix enables businesses across a wide range of industries – including e-commerce, enterprise and financial services – to securely share information about devices and personas connecting to their sites without sharing any personally identifiable information about customers or visitors. The approach ThreatMetrix takes through anonymizing and encrypting information in The Network offers a model for cybersecurity collaboration that will be essential for companies to protect their businesses in 2015 and beyond.

ThreatMetrix Resources

    Share this news on Twitter: Will #mobile account for 50% of transactions in 2015? @ThreatMetrix thinks it might, among other predictions:
    Press Release: 2013: The Year of the Password Apocalypse
    eBook: ThreatMetrix Cybercrime Report: Q4 2014
    Whitepaper: Combatting Cybercrime – A Collective Global Approach
    Press Release: ThreatMetrix Announces its ThreatMetrix Global Trust Intelligence Network Has Reached 850 Million Monthly Transactions

About ThreatMetrix

ThreatMetrix builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 850 million monthly transactions and protects more than 210 million active user accounts across 3,000 customers and 15,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blog, Facebook, LinkedIn and Twitter pages.

© 2014 ThreatMetrix. All rights reserved. ThreatMetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender Mobile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, ThreatMetrix Labs, and the ThreatMetrix logo are trademarks or registered trademarks of ThreatMetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.

Related Big Data Healthcare Press Releases