Data Protection

Discover data protection, include the articles, news, trends, analysis and practical advice about data protection on alibabacloud.com

Trade talks with the United States next week will also hold consultations on data protection and privacy rights

July 6 News, according to foreign media reports, EU officials said in Friday, next week with the United States trade negotiations, will also be "data protection and privacy rights" consultations. But Jose Manuel Barroso, the European Commission's President, said members must be wary of US intelligence because it endangered national security. Officials in the European Union were outraged by reports late last week that the U.S. National Security Agency (NSA) had installed eavesdropping devices in the European Union's Washington and New York offices and hacked into the office's computer network. Many European leaders ...

EMC enhances Atmos cloud storage System Data protection efficiency

EMC recently upgraded its Atmos cloud storage system to not only enhance data protection, but also improve performance and capacity.   The latest Geoprotect feature provides Atmos with a RAID-like data protection feature that supports 3 or 6 failures (33% and 66% of storage overhead, respectively) by encoding and distributing targets between atmos clouds. Atmos also uses the latest Xeon 5500 processor ...

What is high availability (HA)? What is ha?

Highly available ha (high availability) refers to improving system and application availability by minimizing downtime due to day-to-day maintenance operations (schedules) and burst system crashes (unplanned). It is different from the fault tolerant technique which is considered to be uninterrupted operation. The HA system is the most effective way for enterprises to prevent the core computer systems from being shut down. Features of high Availability (HA) 1, software fault monitoring and exclusion 2, backup and Data protection 3, management station can monitor the operation of each site, can be at any time or timing report system operation ...

US officials have lobbied EU to give up data protection

According to three senior European Union officials, the Obama administration has succeeded in persuading the European Commission (European Commision) not to include in its data privacy legislation a measure that could have restricted U.S. intelligence agencies ' ability to monitor EU citizens. The measure, known as the "anti-FISA clause" within the EU, is named after the US Foreign Intelligence Surveillance Act (Foreign FDI Surveillance Act, FISA), which empowers the US government to monitor international calls and e-mails ...

Cloud computing opens new chapter for disaster recovery

At present, the construction of disaster preparedness center in our country is basically self-sufficient, self built, some departments and industries including local construction according to their own needs, uneven level, causing duplication of construction and waste of resources. Experts from all walks of life proposed to strengthen cross-sectoral coordination across sectors, vigorously promote the disaster recovery system under the cloud computing environment, and provide socialized, intensive, specialized and shared disaster preparedness services.   It is not difficult to foresee that cloud computing will play an important role in our future disaster recovery and data protection strategy. With the development of technology and innovation, cloud computing brings a ...

Provides data encryption for IBM DB2 on Red Hat Linux V6.2 hosts

IBM Infosphere Guardium is a software http://www.aliyun.com/zixun/aggregation/13681.html "> Data protection and encryption system." It provides limited access and encryption for files, file systems, and IBM DB2 files that are specified using policies. Figure 1 shows the architecture of the Infosphere Guardium. Figure 1. Infosphere Guardium ...

Maple Browser v1.6.2.0 for Windows (based on chromium 11.0.696.77)

Maple Browser is based on Google http://www.aliyun.com/zixun/aggregation/33824.html ">chrome browser speed dual-core security browser." With all the features of Google Browser, Maple browser also increased privacy data protection, mouse gestures, ie tags, advertising filtering, Boss key, proxy settings, common download tool support, super drag and so on enhancements. Maple Browser is completely free, you can use any. Maple Browser V1.6.2.0 ...

Count eight noteworthy duplicate data removal products

Not long ago, there were only a few initial companies in the field of data deduplication, such as data domain. The technology has been growing over the last five years. Now, almost all manufacturers are using data deduplication technology. If you want to use this technology, the following products are worth noting. 1. Quantum DXi8500 Quantum's DXI series built-in data deduplication disk system contains several products. For example, DXi8500 is for enterprise-wide backup, disaster recovery, and data protection. It offers high ...

V1.3.3.3 for Linux (based on chromium 5.0.342.9) release

Maple browser with Google http://www.aliyun.com/zixun/aggregation/33824.html ">chrome browser all the features, while the Maple browser also increased mouse gestures, ie tags, advertising filtering, super drag, Enhanced features such as private data protection. Maple Browser is free of charge, and there is no function limit, you can use any. Update log: (2010-04-12) 1, fixed: cannot be set as the default browser. 2, upgrade the base version to C ...

Hackers blackmail Nintendo for stealing information from players

The BBC reported that Spanish police had captured a cyber hacker who claimed to have stolen thousands of Nintendo player account information and was deliberately blackmailing Nintendo.  According to the Spanish Ministry of the Interior, the suspect has stolen 4,000 information from the Nintendo players and threatened the Japanese game maker to report the information to the data Protection unit to sue Nintendo's negligence of information protection, and it is unclear what he has asked Nintendo. Without a reply from Nintendo, the suspect began leaking part of the information, but he planned to expose all the information to each other.

Rising launched Enterprise mobile management system REMM

March 25, Rising launched Enterprise mobile management system REMM. Rising Remm is a company for mobile office security management Solutions, to solve the enterprise mobile office related to equipment, business and WiFi security issues.   Its flagship mobile Equipment unified management, Enterprise mobile application market, mobile virus protection, WiFi security access and protection and data protection, such as five functions, notebook, mobile phone and pad and other mobile devices to unify the control, to avoid mobile office for the enterprise security risks. With the rapid development of mobile devices and WiFi networks, the more ...

Allow users to close their geographic services at the request of European authorities

Peter Fleischer, Google's global privacy advisor, said in a blog post today that Google would allow global WiFi users to shut down services that Flesche their location. Data protection regulators in 27 countries said in May that any information that might disclose the location of service users should be treated as privacy data. Technology companies can use user location data to send targeted ads and help users find peripheral facilities. Google says it uses WiFi data that is publicly broadcast by wireless access points and does not disclose personal information. Fleiss ...

Cleversafe-assisted storage service Provider

Cleversafe plans to release the first commercial dispersed Storage receptacle (dsnet) tomorrow, a platform for storing digital content. DSNet uses Cleversafe devices, which are created by some of the company's service providers, communications and hosting partners, and will serve as the basis for new online data protection services targeting the SME market. Cleversafe's technique is to use information dispersal algorithms (...

Enterprise Selection Data Security protection platform nine considerations

In a recent study, CA Technologies analyzed several factors to consider in selecting and deploying data protection and management platforms: 1. Identifying and protecting sensitive data a powerful information protection and control solution ultimately requires protecting many of the potential risk points of the enterprise. Most businesses start with data loss protection and then extend protection to other areas, such as misuse of information.   The solution should also address broader regulatory and country-specific legal compliance needs. 2, the choice of flexible, customized repair options such information protection and control ...

British media said Google abuse of the right to be forgotten

In early July, Google, the search engine giant, was "besieged" by a number of British media that accused it of over-fulfilling the "forgotten rights" in the European Data Protection Act and adopting a very sloppy, Cruel ways to directly delete name-related search links, and Google believes that this move is strictly enforced in May this year, a European Supreme Court verdict. The two sides each stick to the word, by the "forgotten rights" controversy has caused widespread concern in Europe and throughout the world. British media said Google abuse of the right to be forgotten In early July, a number of heavy British ...

Facebook unreasonable procedure will be punished

According to foreign media reports, a German government data protection Agency said in Wednesday that the agency has taken legal action against Facebook and accused Facebook of illegally reading and saving personal information from users who do not use the social networking site. Johannes Caspar, Johannes Caspar, the Hamburg Data protection office, said the Hamburg data protection Office has started to launch the law because Facebook has collected and saved personal information about users who do not use the social networking site without the user's permission.

Neelie Kroes: Cloud computing will create up to € 1 trillion in GDP in eight years

Recently, EU Digital Agenda Commissioner Neelie Kroes told a press conference on cloud computing that if the EU's policy guidance and unification are lost, cloud computing may not be able to break through the barriers of various countries and may also lead Europe to thousands Billion euros of economic growth opportunities missed. Neelie Kroes, European Union's digital agenda specialist, recently announced that cloud computing will increase Europe's annual GDP by 160 billion euros by 2020 and that it will raise trillions of euros in eight years.

EU Justice Commissioner: US tech giants must comply with data protection rules

Vivien Redding Viviane Reding, EU Justice commissioner, said in Thursday that Google, Facebook, Apple and other non-European companies offering services in the EU market must comply with the comprehensive overhaul of data protection rules. In a speech in Brussels today, Reading said the same restrictions must apply to all companies operating in the EU market. EU consumers need to know that their data is being processed in a way that is in line with EU rules, which "reflects the fact that data protection is a fundamental right", she said. Ray ...

The cloud computing pattern of disaster preparedness and recovery is subtly

Cloud computing will play an important role in our future disaster recovery and data protection strategy. Experts from all walks of life proposed to strengthen cross-sectoral coordination across sectors, vigorously promote the disaster recovery system under the cloud computing environment, and provide socialized, intensive, specialized and shared disaster preparedness services. The frequent occurrence of natural disasters and the continuous occurrence of system paralysis make our country's disaster recovery system urgent, but at present our country disaster preparedness Center's construction basically is self-sufficient, the self constructs the state, some departments and the profession including the place according to own demand own construction, the level is uneven, has caused the duplicate construction ...

Through Hadoop security deployment experience summary

& Http://www.aliyun.com/zixun/aggregation/37954.html "nbsp; Through the Hadoop security deployment experience summed up the following ten suggestions to ensure data security in large and complex and diverse environment information. Strong! Determine the privacy protection strategy for your data during planning and deployment, preferably before putting data into Hadoop ...

Total Pages: 2 1 2 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.