Jump to content

Search the Community

Showing results for tags 'analytics'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 6 results

  1. Spotify’s artist dashboard already allows musicians and their managers a way to track the success of their tracks and album releases, as well as view other data about their fans. Now, the streaming music service is debuting its first analytics tool aimed at music publishers. The new tool is launching into beta this morning, and will allow publishers to track daily streaming stats, including playlist performance, and view data across all the songwriters on their roster. “We know that there are usually many more people involved in the creation of your favorite song than just the artist whose face appears on the billboard,” explains the company, in its announcement. “Spotify Publishing Analytics is the first analytics tool from a music streaming service built specifically for publishers, so they can better serve their songwriters.” The platform was built in collaboration with partners, including BMG and Reservoir, who offered statements of their own about its launch. It’s designed to offer value across publishers’ responsibilities, from A&R to administration, Spotify says. For the time being, the tool won’t change anything about how publishing royalties are accounted or paid, but instead will only be focused on providing data. It offers insights into streams by song, songwriter and recording; how songs are doing on playlists; a way to see all the different versions of a song; and a way to export metadata to internal systems for further archival and analysis. “One of our core missions at Spotify is to enable creators the opportunity to live off their art,” said Jules Parker, Head of Publishing Relations & Services, EMEA and APAC, Spotify. “The publishing community is integral in supporting the songwriters that create the music we love. With more information, publishers are empowered to make the most of the opportunities the global reach of Spotify provides, and the more information we can share with each other, the more opportunities we can help create for songwriters.” Parker added. Patrick Joest, EVP Global Content Partnerships & Synch, BMG, said that the new streaming data will help them gain insights into new opportunities for songwriters, and more efficiently collect royalties on their behalf. Spotify says the analytics service is the first aimed at publishers, but as Musically.com points out, others like Socan, Kobalt and Songtrust already exist. However, it is the first offered directly by a streaming service like Spotify. The launch of the new service comes on the heels of a significant change to U.S. copyright law, the Music Modernization Act, which impacts music copyrights – and, particularly streaming services. Designed to update music copyright law for the digital era, the act changes how royalties are paid so more music creators can reliably collect the money they’re due. Spotify wants to be seen as supportive of artists and the wider music creator community, and has been steadily rolling out tools for this side of the music business, instead of just those aimed at consumers listening to tunes. It has also recently launched things like a playlist submission tool, Co.Lab event series for teaching musicians about the industry, a way to upload music directly, and plans to offer tools for cross-platform distribution via DistroKid, which it invested in. It also now displays songwriter credits and celebrates songwriters and producers through its Secret Genius program. The new tool is in a limited beta. Interested publishers can visit publishers.spotify.com to ask to join. Source
  2. Batu69

    Windows XP: Not dead yet!

    Some businesses have legitimate reasons to keep using Microsoft's obsolete operating system. But for most, the reasons that companies hold on to Windows XP boil down to not wanting to spend the money to upgrade. That's not a good long-term plan. For better or worse, Microsoft’s Windows XP is still in use. Indeed, recently you may have been startled to read that the United Kingdom’s newest aircraft carrier, the Queen Elizabeth, runs Windows XP. That particular story wasn’t true, as it turns out, but some of the warship’s construction contractors did use the old operating system. You likely were willing to accept the QE story because so many businesses are still running Windows XP. Some hold on to the out-of-date OS from pure laziness and cheapness, but others have genuine reasons for sticking with it. It’s been three years since April 8, 2014, the end of mainstream Windows XP support. But that hasn’t stopped these companies from relying on the software. Windows XP lives We all know that the OS is still in use, if for no other reason than discovering a family tech-support emergency in which we are asked to fix a relative’s old computer. However, the exact number of systems that still run Windows XP is a bit hard to pin down; the percentages vary depending on the reports you read. As of June 2017, Windows XP still has an amazing 7 percent market share, according to U.S.-based analytics vendor Net Applications. This percentage is derived from “data from the browsers of site visitors to our exclusive on-demand network of HitsLink Analytics and SharePost clients,” Net Applications explains, based on its worldwide network of over 40,000 websites. Irish analytics company StatCounter doesn’t have Windows XP usage quite that high, but at 5 percent market share, Windows XP shows amazing life. Windows XP remains particularly strong in the People’s Republic of China, where it’s the second most popular desktop operating system (after Windows 7) with 20 percent using the OS. Of these, approximately 90 percent are pirated copies, according to StatCounter. StatCounter’s numbers come from its web analytics service; the company’s tracking code is installed on over 2.5 million sites globally, where it records billions of page views. In the United States, Windows XP’s use as a desktop OS has been declining. According to the Federal Digital Analytics Program's (DAP) analytics page, in the past three months Windows XP was used by only 0.6 percent of users. That’s far less than Net Applications and Statcounter’s global numbers. That may reflect the nature of the sites from which DAP collects web traffic: more than 300 executive branch government domains across 3,800 websites. Most, 81 percent, of site visitors are U.S. citizens. Even in the U.S., those numbers may disguise the presence of Windows XP systems in business. According to a study, 2017 OS Adoption Trends, conducted by Spiceworks, a Windows help desk company and network of IT professionals, 52 percent of businesses are running at least one Windows XP instance, and the OS is still installed on 14 percent of business computers. How many computers is that altogether? Some rough calculations put the number over 100 million Windows XP users. Not all of those computers have an Internet connection, but we know that quite a few do. If it ain’t broke, don’t fix it, and other reasons Why are there still so many users? One major reason that Windows XP lives on is that it was so popular. The OS had a supported life of almost 13 years—far longer than any other desktop operating system. “It was one of the first Microsoft operating systems people latched onto,” says Peter Tsai, a Spiceworks senior technology analyst. Even on the eve of its end-of-support death in March 2014, Tsai says, Windows XP still ran “on approximately 30 percent of the more than 1.6 billion PCs in the world.” Do the math: that’s 500 million computers. In addition, he says, “The five-year gap between Windows XP and its unpopular successor, Windows Vista, resulted in an uncommonly large installed base.” Another reason for Windows XP’s sturdy tenure is the lack of a direct migration path to Windows 10. Windows XP users who are motivated to upgrade must first move to Windows 7, then upgrade to Windows 10. For practical purposes, that means it makes more sense to trash the old hardware and buy PCs with pre-installed Windows 10. If your company has the money, that is. But that was years ago. Why are people still using it on desktops? Several IT people confided in me, usually privately. (Who wants to advertise his company’s vulnerabilities, after all? Many are simply embarrassed.) A system administrator from a midsize industrial company told me, “Management just doesn’t want to pay to replace our systems. It’s that simple.” He’s not alone. Another sysadmin, who works for a real estate company, says, “If it’s not broke, they don’t want to fix it.” According to the Spiceworks study, the reasons IT professionals stick with the current OS are no immediate need, lack of time, and budget constraints. Another reason businesses hold onto Windows XP is custom software. A sysadmin at a different real estate firm confides, “We have a property inventory program we use in-house, and no one has a clue what’s inside it. There’s just no money to hire someone to rewrite it.” A building engineer reports that his company relies on software that runs on Windows XP to keep the building’s HVAC systems running, as well as lighting management and other controls. His employer has no interest in updating the operating system; they don’t see any problem. The software may not be custom; it might be an old third-party application. A jeweler who uses a vertical design program explains, “The last good version only runs on Windows XP.” In some cases, it’s possible (or necessary) to run a Windows XP application in a virtual machine. For example, Microsoft no longer supports Windows XP with Windows Server Update Services. As one annoyed user expressed on a Spiceworks discussion thread, “I had to install an XP VM on my home network last year to run an XP-specific mapping program.” A related reason is computer-controlled hardware. Many industrial, medical, and scientific hardware used desktop Windows XP as a poor man’s embedded controller. Their users view the computer as a tool and give little attention to the underlying OS. Why spend money upgrading? This works fine For these companies, upgrading the entire system for a new operating system simply costs too much money. As a light-manufacturing company CIO told me, “This equipment cost us hundreds of thousands, and we use it every day. It just isn’t cost-effective to replace it, especially since these systems don’t connect with the Internet.” Even when the equipment doesn’t cost a mint, some hardware is just too old to be supported by newer operating systems. For example, a really old but special-purpose printer has drivers on Windows XP, but as one sysadmin reports, “Windows 7 and up are not supported for the spooler manager and job queue client.” And “Windows XP also runs our older-than-dirt handheld bar-code scanner terminal app.” You’re not asking management to replace a desktop computer; you’re asking them to buy a whole new piece of business equipment. That may be even more of an expense when vertical hardware and software intersect. One ophthalmology practice uses a small LAN of connected Windows XP clients, reports another admin. “We’re still on Windows XP due to the specialist apps that connect to the various eye scanning devices.” IT pros know this is asking for trouble. In the Spiceworks survey of more than 450 IT professionals, 68 percent were concerned about the end of security patches and bug fixes. But IT concerns don’t always translate into corporate priorities. Embedded XP: The hidden Windows That’s especially true when it comes to hardware that uses Windows XP Embedded. Numerous computer numerical control (CNC) controllers from companies such as Siemens, Mitsubishi, and ProtoTraks still run this specialized version of the operating system. The controllers generally are expensive ($50,000 to $150,000) and are installed on even more expensive hardware, which often starts at half a million dollars. No one wants to mess with machinery that costs so much and that works perfectly well. Besides, as a manufacturing professional, Garegin Khachiyan explains, “With just over 15 years of experience in the manufacturing field, neither I nor anyone I personally know ever experienced any security issue with CNC controllers that ran on Windows.” Windows XP Embedded also lives on in bank automated teller machines (ATMs). “A majority of ATMs still use that OS," says security expert Bruce Schneier. "And once Microsoft stops issuing security updates to Windows XP, those machines will become increasingly vulnerable. Although I have to ask the question: How many of those ATMs have been keeping up with their patches so far?” That’s a good question. “Newer ATMs can be patch-managed remotely," says security writer Kimberly Crawley in a recent Hackernoon blog. "But older ATMs, including a large percentage of the machines still in use in the U.S., can only be patched manually. That means a bank’s IT professionals have to visit the machines, branch by branch, one by one, to apply Microsoft’s Windows XP for Embedded Systems’ security patches. The IT professionals who have the specialized knowledge necessary to manually patch ATMs are expensive.” However, apparently they are not as expensive as replacing them. So Windows XP Embedded-powered ATMs will keep dispensing cash in banks around the country. Supporting and securing Windows XP Microsoft appears to still be renewing Windows XP “Custom Support” contracts, though the company doesn’t publicly describe the terms. In response to all questions about Windows XP Custom Support contracts, a Microsoft spokesperson said, the company was “unable to accommodate your request at this time.” He added, “As always, we recommend customers stay current with the latest updates to Windows. The best protection is to be on a modern, up-to-date system that incorporates the latest innovations including the latest security features and advancements.” A Custom Support contract is not intended to last forever. Generally speaking, these contracts require customers to submit a migration plan to a supported edition of a product, along with goals and dates, and Microsoft must approve the plan. Contract milestones are expressed as percentages of the covered systems. If a company doesn’t meet the migration milestones, Microsoft can refuse to renew the deal or cut off support. A Custom Support contract is not intended to last forever. That said, some contracts are still in place. The United States Navy purchased Windows XP support until 2017, which also included Office 2003 and Exchange 2003 support. According to the contracting announcement, “Across the United States Navy, approximately 100,000 workstations currently use these applications.” In 2016, the Australian government reported it had paid $3.4 million for 15 months’ worth of Windows XP support to cover agencies to July 2017. Other government agencies probably wish they had made the investment. In 2015, a hospital system in the United Kingdom’s National Health Service (NHS) revealed it was still running 1,260 Windows XP systems (with no extended support). In 2016, NHS hospitals were still running the OS. Then, in 2017, the hammer of WannaCry ransomware came down, which knocked out multiple NHS facilities. WannaCry used Windows XP’s insecure version of Windows’ Server Message Block (SMB) networking protocol to spread in local-area networks. It needed only a single vulnerable PC to attack multiple systems. Microsoft considered the problem serious enough that, for the first time ever, it released a security patch for an out of support program. Clearly, the number of Windows XP systems justified such a radical step. What does it take to migrate? The moral of the story? Yes, there may be financial reasons and inertia that keep businesses using Windows XP, but in the long run they’re not convincing. WannaCry was not a one-time event. There will be more attacks. The OS is both too popular and too easy to attack for hackers to ignore. If your business continues to use the OS, at the very least, ensure that your systems have no ties to the Internet. It’s like leaving the door to your home not only unlocked but wide open. Windows XP Embedded, which tends to be used in stand-alone systems, is practically speaking safer, but it’s still vulnerable. Whether the recent ransomware attacks are enough of a motivation for the “if it works don’t fix it” decision-makers to make a change is yet to be determined. I hope so. The time has come to kiss Windows XP good-bye and upgrade your systems. Article source
  3. Researchers spot privacy concerns in APIs that share battery levels with site owners. A battery status API, intended to allow site owners to serve low-power versions of sites and web apps, is being used to track user behavior. Introduced in HTML 5, the API allows site owners to see a device's battery percentage and the time it would take to charge said device to prevent the execution of intensive operations if a user's battery was low, security and privacy technology researcher Lukasz Olejnik said in an Aug. 1 blog post. Olejnik said the tracker could be used to collect behavior analytics, identify users in otherwise identical computer installations, record how often a user's device is under heavy use, and in some cases identify a user's battery capacity. The information potentially could be monetized as people may be prone to pay more for a service if their battery levels are low, the blog said. Article source
  4. Extends QRadar platform's advanced analytics to protect against compromised credentials and malicious insiders ARMONK, N.Y., July 27, 2016 /PRNewswire/ -- IBM Security (NYSE: IBM) today announced a new app for IBM QRadar which analyzes the usage patterns of insiders, including employees, contractors and partners, to determine if their credentials or systems have been compromised by cybercriminals. IBM QRadar User Behavior Analytics, available for free via the IBM Security App Exchange, extends IBM QRadar's security intelligence platform to provide early visibility into potential insider threats before they can do further damage to a business. Insider threats are currently responsible for 60 percent of attacks facing businesses, but roughly a quarter of these attacks are the result of users' credentials falling into the hands of hackers via employees, contractors or partners who are tricked by malware-laden phishing attacks or other techniques[1]. For example, the new user behavior analytics app would alert analysts to a user logging into a high value server for the first time, from a new location, while using a privileged account. This change in pattern would be identified because the IBM QRadar User Behavior Analytics solution created a baseline of normal user behavior for this employee and detected a significant deviation. "Organizations need a better way to protect themselves against insider threats – whether they be from inadvertent actors or malicious cybercriminals with access to an organization's inner workings and technology systems," said Jason Corbin, Vice President of Strategy and Offering Management, IBM Security. "This new app provides analysts with the ability to quickly pivot by using existing cybersecurity data to see the early warning signs that are often buried in suspicious user activities, ultimately helping them more consistently address breaches before they occur." IBM QRadar User Behavior Analytics leverages data from customers' existing QRadar investment giving them a single platform to analyze and manage security events and data. This integration saves security analysts from having to reload and curate data from multiple platforms to identify and investigate user behavior side-by-side with other indicators of compromise QRadar detects. The solution helps security professionals guard against malicious threats through: Risk Analysis Profiles – the app analyzes risky user actions and applies a score to anomalous behaviors helping to identify both potential rogue insiders and suspected cybercriminals using compromised credentials. Prioritized Behavioral Analysis Dashboard – analysts can gain better visibility and understanding of actions that lead a user to open up a malicious document or how they gained escalated privileges. A single mouse click, or an attachment or link in a phishing email, for example, can add suspicious user activity to a watch list or permit a text-based annotation to explain the analyst's observations. Enhancing Existing QRadar Security Data – with user information pulled from the entire IT environment, security teams will be able to tap into the existing broad set of data sources and threat intelligence in QRadar to detect threats across users and assets. With the recent acquisition of Resilient Systems, IBM has added the capability to easily respond to incidents elevated in the QRadar platform via the new User Behavior Analytics app. Available for free download on the IBM Security App Exchange, the QRadar User Behavior Analytics application is part of IBM's open approach to developing security tools that can be leveraged in the fight against cybercrime. Over the past two years, IBM has made significant moves to help security professionals worldwide collaborate to achieve an advantage over cybercriminals, including opening its 700 TB of threat data to the public with the launch of IBM X-Force Exchange. Built on X-Force Exchange intelligence, the IBM Security App Exchange has developed into an expansive online marketplace for partners and customers to share and download apps based on IBM Security technologies, such as IBM QRadar. The marketplace features dozens of 3rd party solutions to further clients' ability to customize their security environment using IBM's open platform approach. About IBM Security IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development and delivery organizations, monitors 20 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog. Article source
  5. Block Malware, Ransomware, and Phishing With 5 Layers There's no silver bullet to keeping intruders and hackers out, but you can minimize the risk by combining approaches They really are after you. I spent last week in London at the InfoSec conference, where it wasn't only the vendors talking up security scares, but the attendees I spoke with in the aisles and meeting rooms. Almost all of them had some personal experience with spear-phishing or a ransomware attack. At InfoSec plenty of solutions were proffered to blunt such attacks, from point products to suites. It became clear that there are five key layers needed to defend your company from such attacks. Email security gateway It’s obvious that the majority of breaches these days begin with an email. The email may contain a link to some kind of identity-theft site, instructions for a wire transfer, or a weaponized attachment. Spear phishing, whaling, ransomware, spam, and malware are all serious threats and nuisances that your organization faces. You should have some sort of email gateway, be it a software based on-premises or a cloud-based tool or, alternately, an appliance. It's best if you use a layered approach where you enhance what you already have, such as within Exchange or Exchange Online. DNS security The use of a DNS protection tool like OpenDNS is an oft-ignored option for fighting against attacks. Because every link a user clicks must reach out to a DNS server for resolution before the user can actually open the link, having a tool that can learn from all those clicks can provide a shield. Endpoint protection From a technical perspective, endpoint (client) protection is your last point of protection against attacks. Endpoint protection tools range from antimalware software to multifactor-authentications VPNs, and you'll need more than one. User behavior analytics User behavior analytics tools watch for trends in your user base so that you can see when red flags come up, like a user who typically downloads 10 documents a day starting to download 1,000. There is no denying that Big Brother watching your organization is a key approach going forward in a world where more and more of the people attacking you are already on the inside and trusted to a degree. Phishing testing and training Raising awareness and increasing the education level of the user (your weakest link in security) is essential. Not surprising, there are tools to help. With such a tool, you can test your users on a regular basis to see how they react to real-world attacks, then require they take additional training (repeatedly). It's the only way you can get them to be so paranoid about harmful links that they think twice before clicking. In the end, a targeted attack may still get through all these layers. But by implementing all five layers, you minimize the chances of being a victim of such an attack. Source
  6. amid mounting pressure by EU privacy authorities, Google has published a new data processing agreement for European users of Analytics. The recently published amendment to Google's Analytics terms of service — an optional agreement aimed at improving customers' compliance with European data protection laws — will be available to customers that use the service in the European Union, Iceland, Norway, and Switzerland. First reported by Dutch IT site Webwereld, the amended terms follow data protection concessions that Google made to Analytics in Germany in 2011. Facing pressure from Germany's data protection authority, Google agreed to offer German Analytics users a specific contract between that was meant to ensure responsibility for data protection fell on the website owner, rather than Google itself. At the same time, Google also offered German consumers a browser add-on that disabled Analytics data collection, allowing them to opt-out of having their information fed into the service. Europe's council of data protection authorities, known as the Article 29 Working Party, last October recommended Google extend both safeguards to the rest of Europe, and the amdended terms for Analytics may go some way to address that request. ZDNet has asked Google for comment, and will update the article if it is forthcoming. The company said in a statement to Webwereld that the new optional data processing agreement comes in response to demands by Analytics customers for an agreement that clarified how Analytics data was stored, used and secured. The new terms come as Google faces mounting pressure from European data protection authority over its recently consolidated privacy policy. France's privacy watchdog, the CNIL (Commission Nationale de l'Informatique et des Libertés), announced earlier this month it would begin the process of fining Google for failing to meet a deadline for bringing its updated privacy policy in line with French data protection laws. Google has faced similar challenges in Europe over its terms of service for Google Apps for Business. In general, Europe's data protection authorities want Google Apps customers to be responsible for data handling processes to ensure they comply with data protection laws. However, some regulators have ruled that Google's standard contract does not enable this. Last year Google published an amended agreement for European users of Google Apps for Enterprise in addition to "model contract clause" options that were designed to help customers comply with Europe's 1995 Data Protection Directive. The measures however have not satisfied some European data protection authorities, such as in Sweden, where a local council and school have been ordered to stop using Google Apps, despite having opted-in to the new agreements. Original Article: http://www.zdnet.com/google-coughs-up-analytics-changes-to-appease-europes-data-watchdogs-7000021682/
×
×
  • Create New...