YDT Blog

In the YDT blog you'll find the latest news about the community, tutorials, helpful resources and much more! React to the news with the emotion stickers and have fun!
Bottom image

Hitachi Vantara to Acquire Waterline Data

Hitachi Vantara, a wholly owned subsidiary of Hitachi, Ltd., has announced plans to acquire the business of privately held Waterline Data, Inc. Waterline Data’s patented “fingerprinting” technology uses AI- and rule-based systems to automate the discovery, classification, and analysis of distributed and diverse data assets to accurately and efficiently tag large volumes of data based on common characteristics.

Source: Database Trends & Applications

Women in Data Science (WiDS), have someone attended before? How was it?

Hi, I was thinking to go to WiDS, and I wanted to know if someone attended some previous edition of the conference. How was it? How was your experience? Where the speakers good? Organization? And the workshops?

And if you recommend a different DS conference, which one and why…

I'll be glad to read your experience… cheers!

submitted by /u/lautarolobo
[link] [comments]

Source: Reddit Data Science

How Genius Big Data Background Tools Transform The Probate Process

In a court of law, probate is carried out as a judicial process. The probate process is one where the will of the deceased is accepted as a valid public document – in other words, this process makes sure that the last testament in question is, in fact, the true last testament.  The probate process also involves itself in the case that the deceased did not leave behind a legal will – in such a case, the laws of intestacy in the state of residence (or real property) settle the estate.

It might sound grim, but big data, legal proceedings, and death do meet at a crossroads more often than we think. Perhaps the only things certain in life, these days, are death, taxes, and big data.

The Probate Process – Step by Step

So, what exactly takes place during the probate process? Let’s try to explain the process before we delve into big data’s role here.

Basically, probate (or the granting thereof) is the first stage in a legal process regarding the administering of the estate of one who’s deceased. During the process, the court decides whether the will of the deceased is valid. If so, the will gains approval – in legal terminology, the executor is granted probate by the judicial court. When this happens, the will of the deceased transforms into a legal instrument that can be enforced by the executor in the law courts if necessary.

The probate process, in fact, will also name a said executor (usually, an individual whose name is in the will). The executor has the legal right, then to distribute (or dispose of) the assets of the deceased as is spelt out in the will. On the other hand, the will of the deceased can also be contested or challenged in a probate process.

In a nutshell, the legal proceedings of the probate process in the United States occur in four steps.

1. Filing the petition and notifying beneficiaries and heirs

First and foremost, the will needs to be admitted and the executor should be appointed. As mentioned earlier, if there is no will, an administrator of the estate needs to be appointed. However, all beneficiaries and heirs of the deceased must be notified of the court hearing – this is so that each is given the opportunity to object to the petition in court. Notice of the probate hearing published in local newspapers, for example, also serve to parties like unknown creditors of the deceased of the court proceeding.

2. The notice should be given to all known creditors of the estate so that inventory of the estate can be carried out

The executor, or personal representative, of the probate process, must send written notice to all creditors of the estate. Creditors, then, have a limited to lay a claim on assets included in the estate (this varies, depending on where in the United States you’re located).

Inventory is taken of all probate property – this includes stocks, bonds, property, business interests, etc. Sometimes, where non-cash assets are involved, an independent appraiser could be hired by the estate for evaluation. It’s also important to note that if creditors do not make their claims in time, their claims are extinguished, much like a bankruptcy case. This also applies if a creditor’s claims are of lesser priority than other creditors or beneficiaries.

3. Debts, taxes, funeral and estate expenses need to be paid for from the estate

The executor needs to make sure that all these bills, as well as claims from creditors, are paid from the estate. There are instances where the executor is allowed to sell some of the assets of the estate so that the obligations of the deceased are taken care of.

4. The will explains how legal title in property is transferred – in the case of the deceased not leaving a will, the laws of intestacy decide

Once all the above steps are complete – creditors have filed claims and bills have been paid – the assets that remain will then be distributed to the beneficiaries, as per the executor’s petition.

Big Data and the Legal Profession

As you’d imagine, the probate process can potentially be an arduous one. After all, the legal profession is known to be one of the conservative professional sectors. Even so, technology and big data have been making waves in the industry in recent years.

It began when big data tools helped greatly when it came to more mundane functions, like time management and billing. This has extended into marketing and customer relations, but innovations and application of big data in the digital age has allowed the legal sphere to use this availability and categorization of information to the industry’s advantage.

Background Checks through Big Data

Of course, there are pros to having big data involved in legal proceedings, probate processes included. What’s even more advantageous can be a lawyer who knows how to use big data and tech in ways which are novel and add value to the industry, its clients, and the individual cases.

As is the nature of the probate process in that it deals with the deceased, these can often be sensitive proceedings. It’s necessary, therefore, that they move forward as seamlessly as possible (this is not always the case, but one should strive for the ideal). Long-lost family members may even be sought if they’re listed as heirs or beneficiaries, adding to the already tense situation – Nuwber provides access to accurate and reliable information to find estranged relatives and to verify the identities of beneficiaries.

Such tools also help in the case of creditors who lay claim at judicial proceedings of the probate. Big data allows more swift, cutting-edge methods to verify the identities, backgrounds, and the nature of creditors who may come forth.

A lawyer with the ability and expertise in using smart legal systems knows that they can provide valuable insight without as little delay as possible. In the case of contestations, it’s access to big data and knowing how to employ it in a judicial court that could even swing a case.

The post How Genius Big Data Background Tools Transform The Probate Process appeared first on SmartData Collective.

Source: Smart Data Collective

Are Leetcode and Hackerearth participations necessary for data science internships? (USA)

I've been applying to countless data science summer internships over the past few months, and I've only gotten rejects. I'm pursuing a pretty good Masters program, and I think I have a decent profile for landing an internship but I feel like I'm lacking in some way. Is Leetcode or Hackerearth going to help in any way?

Also, altruists of the sub, if you don't mind, can you dm me for profile evaluation? I can send you a link to my LinkedIn profile. Maybe I'll get a proper evaluation of my profile instead of a self perceived one.

submitted by /u/justARegularGuy_95
[link] [comments]

Source: Reddit Data Science

Absolutely Essential Cloud Security Practices For 2020

In recent years, cloud computing has gained increasing popularity and proved its effectiveness. There is no doubt that cloud services are changing the business environment. Small companies value the ability to store documents in the cloud and conveniently manage them. Large business players appreciate the opportunity to save money on the acquisition and maintenance of their own data storage infrastructure. The movement towards cloud technologies is perceived as an undoubtedly positive trend that facilitates all aspects of human interaction with information systems.

Despite the obvious benefits of cloud technologies, there is a set of problematic issues that pose a significant threat to cloud users, such as:

  • The degree of trust to the cloud service provider;
  • Ensuring confidentiality, integrity, relevance, and incontrovertibility of information at all levels;
  • Loss of data control and data leaks;
  • Protection against unauthorized access;
  • Malicious insiders;
  • Saving personal data of users transmitted and processed in the cloud.

Although cloud computing today is no longer a new technology, issues of ensuring data security represents a relevant point for users worldwide. Security concerns remain to be the main obstacle to the widespread adoption of cloud technologies. What are the main threats to cloud security today? How will they affect the industry? What measures are essential to keep your sensitive data confidential? Read on to figure it out!

Risks Associated with Cloud Computing

As you can guess, cloud computing servers have become a very attractive target for hackers. A virtual threat is associated with the possibility of remote penetration due to the vulnerable infrastructure. Cybercriminal groups often steal users’ data for the purposes of blackmailing and committing various frauds. As a rule, cybercriminals focus on small business networks because they are easier to breach. At the same time, the cases of data leakages among large corporation still take place. Fraudsters often go after larger companies because of the allure of larger payouts.

In November 2018, Marriott International announced that cyber thieves stole data on 500 million customers. The attackers’ targets were contact info, passport number, Starwood Preferred Guest numbers, travel information, credit card numbers and expiration dates of more than 100 million customers. Moreover, police officials have noted that the “human factor” was directly related to the problem. Employees did not follow all security rules, which made the system vulnerable to hacker attacks.

Security Threats

When a cloud service vendor supplies your business and stores your corporate data, you place your business in the partner’s hands. According to Risk Based Security research published in the 2019 MidYear QuickView Data Breach Report, during the first six months of 2019, there were more than 3,800 publicly disclosed breaches exposing 4.1 billion compromised records.

In case you entrust your data to the cloud provider, you should be confident about the reliability of the cloud server. Thus, it is essential to be aware of the existing risk to prevent disclosure of your sensitive information.

The cloud computing system can be exposed to several types of security threats, which can be divided into the following groups:

  • Threats to the integrity;
  • Threats to confidentiality;
  • Accessibility risks;
  • Authorization risks;
  • Browser vulnerabilities.

Data Security

Nobody wants their personal information to be disclosed to the broad audience. However, according to Forbes research, unsecured Facebook databases leakages affected more than 419 million users.The principles of virtual technology pose potential threats to the information security of cloud computing associated with the use of shared data warehouses. When the data is transmitted from one VM to another, there is a risk of disclosure from a third party.

Threats Related to the Functioning of Virtual Machines

Virtual machines are dynamic. They are cloned and can move between physical servers. This variability affects the development of the integrity of the security system. However, vulnerabilities of the OS or applications in a virtual environment spread unchecked and often manifest after an arbitrary period of time (for example, when restoring from a backup). In a cloud computing environment, it is important to securely record the security status of the system, regardless of its location.

Vulnerability of Virtual Environment

Another major risk you may face is vulnerability within the virtual environment. Cloud computing servers and on-premises servers use the same OS and applications. For cloud systems, the risk of remote hacking or malware infection is high. An intrusion detection and prevention systems are installed to detect malicious activity at the virtual machine level, regardless of their location in the cloud.

Blurring of Network Perimeter

When you sign in your cloud, the network perimeter is blurred or disappears. This leads to the fact that the protection of the less secure part of the network determines the overall level of security. To distinguish between segments with different levels of trust in the cloud, virtual machines must be provided with protection by moving the network perimeter to the virtual machine itself. A corporate firewall is the main component for implementing IT security policies and delimiting network segments that will protect your business from undesired disclosure.

Attacks on Hypervisor

The hypervisor is one of the key elements of a virtual system. Its main function lies in the sharing of resources across virtual machines. An attack on a hypervisor can help one virtual machine (usually installed on the fraudsters’ side) to gain access to the memory and resources of another. To secure your data, it is recommended to use specialized products for virtual environments, integrate host servers with the Active Directory service, use high password complexity and expiration policies, standardize procedures for accessing host server management tools, and use the built-in virtualization host firewall. It is also possible to disable frequently unused services such as web access to the virtualization server.

Solutions to Decrease Cloud Computing Risks


As you already know, most of the problems related to cloud technologies can be solved with the help of cryptographic information protection. Encryption is one of the most effective ways to protect data. The provider must encrypt the client’s information stored in the data center and also permanently delete it after it is removed from the server. Encryption makes users’ data useless for any person who does not have the keys to decrypt it. The owner of the encryption keys maintains data security and decides to whom, and to what degree their access should be provided.

Encrypted data is available after authentication only. This data cannot be read or changed, even in cases of access through untrusted nodes. Such technologies are well known, and algorithms and reliable protocols AES, TLS, IPsec have long been used by providers.


Authentication is an approach to ensure data security. In simple terms, it can be defined as a reliable password protection method. Certification and tokens can also be used to gain a higher level of reliability. For instance, such protocols as LDAP (Lightweight Directory Access Protocol) and SAML (Security Assertion Markup Language) can ensure your sensitive data is stored securely on the cloud server.


In these times, data security is more important than ever. Be sure to enact key cloud security measures as we head into 2020.

The post Absolutely Essential Cloud Security Practices For 2020 appeared first on SmartData Collective.

Source: Smart Data Collective

Latest Posts