- Are you sure, Rita?

Collaborate on cutting-edge hong kong data technologies and solutions.
Post Reply
relemedf5w023
Posts: 409
Joined: Sun Dec 22, 2024 7:16 am

- Are you sure, Rita?

Post by relemedf5w023 »

“And this means that we will be able not only to track Michael’s movements, but also to find out who approached him, that is, to identify his contact.”


- Absolutely! We'll find out which smartphone was next to Michael's smartphone, and then we'll track it. Yes! It will take time and effort, but it's entirely possible! Especially since we have time to prepare.

- Yes... Johann, do you know what your department is called?

- No, how?
How to implement the data economy
itWeek №4 (940) September 11, 2018
Sergey Svinarev | 08/14/2018
IncreaseAlexey Sokolov
Alexey Sokolov
IncreaseVladislav Onishchenko
Vladislav Onishchenko
The topic of the round table "Data is the new currency. Who benefits from data leakage?", held by the Analytical Center under the Government of the Russian Federation, turned out to be much broader and went far beyond the issues of information security.

"The digital economy is the data economy," recalled Alexey Sokolov, Deputy Minister of Digital Development, Communications and Mass Media. Data (including Big Data) received the status of an economic category relatively recently, and therefore there are a number of problems that both the state and business will need to solve. Will each company be able to solve them independently or is strict government regulation necessary in this matter?

Acting Head of the Analytical Center Vladislav hong kong mobile database listed a number of questions that do not have a definitive answer today. For example, how to properly handle big data, who should be held responsible for their illegal use (if any), how to reconcile these rules taking into account the data belonging to different jurisdictions? How to combine the popular concept of open data with the confidentiality of individual fragments? How to approach the assessment of damage and should insurance mechanisms be used to compensate for it? If in the case of compromise of bank card data and theft of money from it it is clear who the victim is, who the culprit is, what is the amount of damage and who will compensate for it, then what to do in the case of unauthorized access to correspondence? Who is damaged here - the account owner or third parties? How to assess the amount of this damage, and who and how should compensate for it?


— The Department of Magicians and Wizards! And completely sincerely! Congratulations!

Such technologies are already being used in the UK and US. British firm Pointr is installing tiny Bluetooth beacons around the area that can be used by smartphones to navigate in places where GPS is unreliable. In London, the solution has already been installed at King 's Cross Station , Harrods and Gatwick Airport .
Post Reply