Profile

Cover photo
Pam Baker
Works at Freelance Journalist
Lives in Columbus, Georgia
4,822 followers|167,126 views
AboutPostsPhotosVideos

Stream

Pam Baker

Shared publicly  - 
 
Marketers seizing all your data -- even from "secure" state issued IDs -- is putting all companies, individuals and the country at risk. Here's how in the last installment of my 3 part series on cyberwar and cyber threats.
Marketers are after every scrap of customer data they can get, in hopes of increasing their company's sales. Do you know they may be putting you at risk in the process? In the last of our three-part series on cyberwar, learn what IT needs to know about potential security threats rising from companies' marketing habits.
3
2
James Alan Miller's profile photoCarol Pinchefsky's profile photo
Add a comment...

Pam Baker

Shared publicly  - 
 
Nation-states have been named as the aggressors behind both government agency and corporate data breaches. But are they really the culprits? Or is it criminals or terrorists? And what does this mean to the safety of Americans and corporations? These are the questions I seek to answer in my 3 part series. Here's part 1.
Are we at risk of being victims or casualties in a government cyberwar? In the first of this three-part series, we explore what the experts say about the current state of cyberwar -- and what it means to IT departments everywhere.
2
Add a comment...

Pam Baker

Shared publicly  - 
 
Great piece on mHealth and Apple ResearchKit in clinical research by +Jacqueline Emigh I appreciate being included in this story as a source, too. 
The mHealth market is set to soar, reaching $26.6 billion in 2017. With these ResearchKit apps, Apple and its partners are gathering valuable information about how patients interact with mobile health apps, what makes an app ‘sticky,’ and what makes an app successful (or not).
1
Add a comment...

Pam Baker

Shared publicly  - 
 
If you use -- or are thinking of using -- direct-to-consumer genetic testing services such as 23andMe or Ancestry.com's Ancestry DNA, or, if you are interested in genetic user authenticators,  you'll be interested in the security issues in this post. 
1
Add a comment...

Pam Baker

Shared publicly  - 
 
How many times have you wished you could "pause" workload, services or containers in the system on a moment's notice in order to run a higher priority application with no loss of previous work? Now you can! 
All too often, a high priority workload sat parked in the queue while a lower priority churned its way through the available resources. However, the new version of Univa Grid Engine delivers that much-wished for pause button.
1
Add a comment...

Pam Baker

Shared publicly  - 
 
Hung out with Microsoft yesterday to preview their enhanced Power BI product that they announced this morning. I liked what I saw. I think most BI analysts will too. And, oh yeah, Microsoft is going open source -- again.
This morning, Microsoft announced a slew of new features and capabilities for Power BI as well as its general availability on July 24. The software giant also announced that it is taking its enterprise grade visualization framework and visuals open source. Here's my review.
3
3
Berraou Hassan's profile photoAhmed Mubbashir Khan's profile photo
Add a comment...
Have her in circles
4,822 people
Jerry Hinkle's profile photo
Philip Cortes's profile photo
florin nicolescu's profile photo
Malainaadaan Jaani's profile photo
Chris Johnson's profile photo
Raydel Alfonso Acosta Fandiño's profile photo
palhocakarol ivanize's profile photo
Mohamed Abdirahman's profile photo
Brett MacPherson's profile photo

Pam Baker

Shared publicly  - 
 
Data stolen from government agencies' hacks can be used against the private sector too. I'll tell you how and what to watch for in this article, the second in a three-part series on cyberwar. 
When you hear the term cyberwar, you think about threats to government, but private sector companies are also at risk. In the second of our three-part series on cyberwarfare, we identify three vulnerabilities and offer IT leaders suggestions on what to do about them.
1
1
Carol Pinchefsky's profile photo
Add a comment...

Pam Baker

Shared publicly  - 
 
My post is on the possibility of using real-time data from wearables (on both dead and living victims) to shorten the time to #IoT data availability for authorities to speed help to the scene, help apprehend terrorists, and provide data to help in prosecutions too. 
The free world is mourning the tremendous loss of human life to terrorist attacks in Paris this past weekend. As of this writing, details of the attacks were still being sorted out, but ISIS took credit for the carnage.
4
2
Esther Schindler's profile photoCarol Pinchefsky's profile photo
Add a comment...

Pam Baker

Shared publicly  - 
 
If you want to compare hospitals in your area on ER waits and more, I'll tell you how to do that in my post below. The government has added more data and more comparison points to this, so if you've seen it before, look at it again. Please share this so everyone knows how to get this information.
New federal data by the Centers for Medicare & Medicaid Services and posted on Hospital Compare has provided data on emergency room wait times and offers three new metrics to allow consumers to compare them.
3
1
Carol Pinchefsky's profile photo
Add a comment...

Pam Baker

Shared publicly  - 
 
Highlights from my speech on mHealth at the NY Academy of Sciences last week....
One of the hardest things for any industry to accept is that it can and will be disrupted. The tendency, especially in industries that have existed in much the same way for decades, is to think that processes have been perfected over time and that business will continue as usual.
2
1
Sally Wiener Grotta's profile photo
Add a comment...

Pam Baker

Shared publicly  - 
 
Many tech professionals think of 3D printing as little more than a toy, but Gartner and other researchers predict major growth for 3D printing in the enterprise, raising a host of data protection issues for IT professionals.  Are you ready for it? Here's what you need to know.
Many tech professionals think of 3D printing as little more than a toy, even though it's in full production swing in manufacturing operations. Gartner and other researchers predict major growth for 3D printing in the enterprise, raising a host of data protection issues for IT professionals. Here's what you need to know.
2
1
Alfred Poor's profile photogeorge oloo's profile photo
 
3D printers = trade secret repositories. One more reason why security has to be baked into any Internet-connected device starting at the most fundamental levels.
Add a comment...

Pam Baker

Shared publicly  - 
 
Analysts are now beginning to factor into valuations the companies' big data strategies. If a company doesn't have a big data strategy in place and functioning well, its valuation drops. The world is not a stage; it's data. Here's my post on that...
Companies are already reeling from the sudden and intense need to use big data in order to remain competitive in the marketplace, but now they're finding out that both buy- and sell-side analysts may change the valuations of their companies based on the strength of their data and analytics strategy too.
3
Add a comment...
Story
Tagline
freelance journalist and book author
Bragging rights
Author of Data Divination: Big Data Strategies. I find it easier to list the publications I don't write for than to list the ones that I do. Also, I produced an award-winning paper-making documentary and picked up a couple writing awards along the way too.
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Columbus, Georgia
Contact Information
Work
Email
Address
PO Box 7995 Columbus, GA 31908