Research & Development – Social Semantics
The unit of Research & Development is working on “BS2R – Beyond Social Semantic Recommendation”, a PIA, POR FESR 2013 project based on a “Social Semantic Search” platform to which Consulthink, CRS4 and the “Dipartimento di Ingegneria Elettrica ed Elettronica” (Department of Electrical Engineering and Electronics) of the University of Cagliari have been working since the spring of 2016 and whose end is scheduled for April 2018.
BS2R platform represents an “intelligent” search engine that analyzes the behaviors and the web searches made by “authoritative” and “trusted” users and anticipates their possible interests by suggesting them “potentially useful” contents, helping them to orientate themselves among the myriad of obtainable results. Who, during the research, has actually found that a content is interesting, suggests it, explicitly or implicitly, to his own contacts. The latter is going to be “directed” towards such information by viewing it in the first positions of SERP (Search Engine Results Page) pages.
At the basis of social interaction facilitated by the platform, there are mechanisms of TrustRank that measure the relationships between users and resources and the evolution of the social correlation engine AVIC (project resulting from the work on the announcement financed POR SARDEGNA 2000 – 2006 MISURA 3.13) that considers and studies the issues related to Social Networking and integrates itself with open source Knowledge Management systems to manage business knowledge in an unified way. Besides, the platform exploits social and semantic technologies to allow correlations between documents and users.
The project has remarkable characteristics of uniqueness and originality and its purpose is the creation of a platform that allows to formalize explicit knowledge and to enhance the implicit one, that knowledge which is difficult to encode, store and transmit, but which is a personal patrimony of experience – working or not – extremely important and useful. Therefore, the project intends to be able to catalog and manage the huge and growing amount of data that companies daily produce and improve internal business communication. To be precise, it is not just a matter of storing data, but of creating a system that can guarantee its authoritativeness, quality and reliability through social-semantic algorithms.
BS2R intends to overcome problems and limits related to the use of social networks, such as access to data under the control of third party and cultural hesitations associated with the use of social networks in the business. The platform is developed for the corporate reality, not for a non-global one. This means that employees do not need to sign up for Facebook, LinkedIn, Twitter or other social networks.
The work is distributed between Consulthink which deals with the development of the platform, the Department of Electrical Engineering and Electronics of the University of Cagliari which deals with image semantics (for the development of techniques useful for analyzing visual content in order to be relevant to the social interactions of the network) and the CRS4 that deals with the semantics of textual content developing tools of Computational Linguistics, a discipline that with automatic tools studies human language and defines algorithms to extract meaning from the texts analyzed.
In the picture, BS2R logo.
On 6 August 1991 at CERN in Geneva, the research group of Tim Berners-Lee created the first website written in HTML, a language that is fundamental for the web even now. In the same period the first browser “WorldWideWeb” (WWW) was created and the network took its name from it.
In 1999 there were a million of websites, nowadays there are more than a billion and the number of pages and content grows exponentially, for this reason search engines focused on how access quickly the content. For a long time the challenge between the major players in the sector was played on the ground of indexing, that is on the ability to index the largest portion of the accessible web, but with an exponential increase in data, traditional search engines are increasingly facing problems to relate with the research based on keywords because these fail to return to the user the pages that have relevance to the research carried out, point on which currently search engines are focusing considering also the semantic web.
From web 2.0 to web 3.0
Web 2.0 is characterized by interaction, participation and sharing, actions made easier by social network sites, of the web 3.0, however, it is more difficult to give a definition because it is a phenomenon that is still emerging. In any case, web 3.0 aims to turn the web into a database, to make the most of technologies based on artificial intelligence, to give space to the enhanced web – a web capable of influencing reality – to the 3D web that transforms many web spaces in 3D and to the semantic web. In fact, semantics states that words do not have an absolute meaning, but that this depends on the context, for this reason research that considers the keywords in the document, their context, hyperlinks, images and much more will be possible.
From AVIC to AVIC 2.0
BS2R uses and strengthens AVIC (Virtual Assistant Intelligent Collaborative) platform, already financed by “Sardegna Ricerche” in 2008. AVIC is an integrated platform with a search engine that works with a recommendation system and is promoted by INAIL within its own intranet portal. AVIC implements social re-ranking algorithms, trusting algorithms between users and implicit and explicit feedbacks. AVIC reorganizes the results obtained by a search engine using feedbacks (implicit and explicit) received by users who are connected each other through a social network during their normal web browsing. However, AVIC has some limits that BS2R resolved. AVIC pointed out, in fact, that open source systems are extremely slow in retrieving information making AVIC inadequate for a real system. In fact, BS2R system needs to record a large amount of semantic data that depends on the number of users of the social network and the number of interactions they have between them and with the resources used (especially documents).
Moreover, in the evolution of AVIC, two users who do not know each other, but who share the same interests, can meet each other.
BS2R is designed for all those realities where the explicit and/or implicit user experience, can considerably improve the identification of the results provided by any research carried out on a set of content which is considered interesting within the reality involved. The ideal habitat, therefore, is in companies or in the public administration, a reality in which traditional tools for knowledge management such as document systems and indexing engines are already present.
Large companies, public bodies, local and central public administrations see that every day the bulk of information increases in their systems and they begin to understand that to distribute successful services to citizens it is essential that they easily find the information they are looking for both because they do not have the time to refine their research and because they could signal the information they believe it is useful for the next visitors of the site.
Trust & Correlation Engine: Columbus’s egg
The relationship between users and between users and content is measured with TrustRank mechanisms that work thanks to the correlation engine used by the platform. A user’s access to a resource is uniquely identified by a URI (a sequence of characters that identifies a generic resource) that is saved in the system. When the user accesses a resource, the system recovers all the contacts of the social network of the user who have visited the same resource and determines the degree of trust between the two according to the feedbacks detected. More visits in common between similar resources have two users, more the degree of reliability and mutual trust improves.
To determine the trust among users, in addition to analyzing the common resources, BS2R analyzes also the similar that can be based on a statistical analysis of the text, on the analysis of the characteristics of low-level visual content such as color, texture and highlights in the text and semantic similitude that requires the definition of multiple domain ontologies.
Social relationships and useful relationships
Many Social Networking platforms have a problem with relationships. In real life, distinct social groups – friends, family, colleagues – in most cases do not come into contact, in social networking platforms this distinction does not exist and different social groups get in touch. In this way aspects related to relationships are easier to manage. However, this non-distinction can lead to incorrect suggestions in the research phase (false positive). False positive can be documents that do not have a correlation with the search query, but also a resource that, compared to the level of user competence, has an excessively complex information content. BS2R aims to overcome these limitations with semantic web tools that will allow to model relationships like: “A trusts B in the search for resources that deal with the topic C”.
Collaborative semantic web
To retrieve documents, traditional search engines use keywords and statistical analysis. Semantic research aims to define ontologies that are used both in the research phase, in order to disambiguate the user’s query, and during the indexing phase, in order to mark which are the semantic concepts in the text. The scientific literature presents numerous solutions and techniques consolidated in this field, but their diffusion is still considerably limited as they are difficult to apply. The semantic web is characterized by the definition of complex ontologies and their application with automatic techniques, BS2R, instead, proposes a semi-automatic approach that sees the active collaboration of users, one of the objectives of web 3.0.
Consulthink partners for BS2R: CRS4
CRS4 (“Centro di Ricerca, Sviluppo e Studi Superiori in Sardegna”) is an interdisciplinary research center founded in 1990 that promotes the study, development and application of innovative solutions to problems coming from natural, social and industrial systems. It is located in the “Parco Scientifico e Tecnologico” (Polaris), 40 km from Cagliari. The center studies qualifying computational technologies applied to the fields of biomedicine, biotechnology, information society, energy and the environment.
Multidisciplinary approach, highly specialized skills and knowledge, agreements with academic, entrepreneurial and scientific world, participation in important national and international projects, these are the keys to the development and application of innovative solutions on which the center focuses.
The Center is focused on 4 thematic areas: Biomedicine, Data Fusion, Energy and the Environment and Information Society.
The goal of CRS4, therefore, is innovation and its mission is to help Sardinia to create and grow a fabric of hi-tech companies which is essential for its economic and cultural development.
Consulthink partners for BS2R: Dipartimento di Ingegneria Elettrica ed Elettronica (DIEE) University of Cagliari
The Department of Electrical and Electronic Engineering was founded in 1995, inheriting the Institute of Electrical Engineering founded in 1945. It includes 52 permanent members among professors, researchers and technical and administrative staff and over 100 collaborators among doctoral students, holders of research grants and contracts for self-employment.
The educational courses on offer consists of two three-year bachelor’s degree (electrical and electronic engineering and biomedical engineering) and four master’s degree programs (electrical, electronic, energy and telecommunications). In addition, two PhD courses belong to the DIEE: the PhD program in electronic and IT engineering and the PhD program in Industrial Engineering.
DIEE can count on close links of cooperation with various research centers, both public and private and with other academic institutions in Italy and abroad.
The research activities carried out by DIEE take place within projects financed by the European Union, the Region of Sardinia and collaboration agreements with companies in the area. The sectors studied are many and the results achieved by research are testified annually by numerous publications in international journals.
Social Networking, Natural Language Processing and Voice Recognition
Semantic interpretation of texts.
Study of specific tools, elaboration of algorithms based on the syntactic and semantic analysis of natural language with the aim of improving the performance of semantic disambiguation tools and interpreting the commands in natural languages, entered through a special vocal interface.
Analysis of the results achieved by recommendation tools based on user profiling. Description of the functionalities necessary to increase the relevance of the results coming from the search queries executed by the users of the system.
SardaNet: thanks to specially created automatic tools, it is possible to link the information obtained from the analysis of terms and their meanings to the pre-existing structure of WordNet. Development of SardaNet that allows to apply the tools of the Toolkit to the existing documentary heritage in the Sardinian language.
Multimedia Semantic Engine
Thanks to the techniques of image retrieval, object detection, object classification and similar, the most suitable visual characteristics for the representation of images, videos and other multimedia contents are going to be identified considering factors such as the extraction timing, the different semantic concepts to be detected, the characteristics and the integrability in the system.
Construction of a visual vocabulary of semantic concepts in order to describe a scene globally. Furthermore, the possibility of characterizing a scene through the presence or absence within it of more elementary semantic concepts such as objects, image attributes and similar is studied.
The developed machine learning techniques deal with the detection of objects that can refer to elementary concepts.
Development of techniques that measure the relevance of a multimedia content respect to a given semantic concept and integrate it with social analysis.
What does an IT security expert do? This question is so general that it is like asking a specialist doctor what they do without knowing their specialization. The right answer is: it depends on the situations. If we talk about the doctor’s specializations, he or she will have more than one, but all doctors have travelled a common […]... Continue Reading
When we talk about computer networks, we need to focus on two fundamental aspects: architectures: peer-to-peer and client-server; extensions. Peer-to-peer networks and client-server networks The architecture of the network represents the structure with which the functions of the network are organized and positioned. The peer-to-peer architecture ( P2P) provides that the devices it contains do not have a specified hierarchy, but they are equivalent to each other and have all the same functionalities. This means that the […]... Continue Reading
The topic of antivirus for Android is particularly hot today. Android is an operating system derived from Linux, very stable and well organized. Let’s immediately destroy one of the most widespread myths on the internet: viruses for Android (at the root of Linux) exist, are as damaging as those written for Windows systems and therefore antivirus for Android is needed! For many years, Windows was the […]... Continue Reading
Last week we analyzed the typologies of computer networks, this week, we will look deeper their topologies. In fact, there are different ones. In addition to considering the definition of each topology, we will also look at the advantages and disadvantages of each one. The topology of a computer network is the geometric arrangement of […]... Continue Reading
Computer networks are, fundamentally, sets of interconnected electronic devices, which communicate with each other to exchange information for visualization, storage and processing. Types of computer networks: classifications The most representative computer network in the world is the internet. The Internet is characterized by a strong heterogeneity of communication protocols and user devices (for example […]... Continue Reading
Internet of Things (IoT) is a trend that continues to march on. For this reason, companies must invest in the Internet of Things, as reiterated by Nick Jones, Gartner’s vice president: “CEO’s who master innovative IoT trends have the opportunity to lead digital innovation in their business”. Naturally, to be able to master these IoT […]... Continue Reading
2019 is coming and Gartner has already drafted the top 10 strategic technology trends for 2019, we have already seen some of these trends in 2018. Let’s find out them immediately! Autonomous Things; Augmented Analytics; AI-Driven Development; Digital Twins; Empowered Edge; Immersive Experience; Blockchain; Smart Spaces; Digital Ethics and Privacy; Quantum Computing. The 10 strategic […]... Continue Reading
Last month the TGT network of companies met to share their latest news with the other companies of the network. TGT is the acronym of ToGetThere, a network of companies created in 2016 that brings together 20 SMEs of the ICT market. The goal of the network of companies is to escape the isolation that […]... Continue Reading
Elasticsearch: what it is and how it works Elasticsearch is a Lucene-based search engine. Lucene is a free and open source API for information retrieval and is widely used for creating search engines. Through HTTP web interfaces and JSON documents, Elasticsearch allows to interact in a simple way with its core and perform very effective […]... Continue Reading
Gartner begins his 2018 Magic Quadrant for WAF making a point about the situation regarding WAF technology. In fact, in recent years, WAF technology has been used less and less by companies, prefering Cloud technology which is evolving much faster. WAF can protect companies against web attacks such as SQLInjection and Cross-Site Scripting. This protection […]... Continue Reading
System and network security is essential in a modern world like ours which is strongly interconnected (in fact this historical period is called “information age”) and many of our daily activities rely on computer networks. For this reason, it is absolutely critical and essential to protect computer networks. It’s like building a beautiful house (Internet […]... Continue Reading
Last month we saw the best cloud platforms according to the 2017 Gartner Magic Quadrant. Today we will have a look at the 2018 Gartner Magic Quadrant, released few months ago. IaaS cloud services Like the 2017 Magic Quadrant, the 2018 Gartner Magic Quadrant also refers to IaaS Cloud Solutions. At the same time, […]... Continue Reading
DoS attacks: what are they A DoS (Denial of Service) is an attack that aims to impede the supply or use of a service, making it unavailable or unusable to legitimate users. There are various types of DoS attacks: Some hacker attacks exploit a known vulnerability of a system, to crash it and make it […]... Continue Reading
Today we are increasingly talking about applied artificial intelligence both in reference to very complicated and rare engineering problems born in laboratories “lost” in some high-profile university campus as well as to real situations much closer to every-day life, comprised of simple things for everyone. There are many examples of AI and we have chosen […]... Continue Reading
Data warehouses, what are they The development of information systems and the web has created a vast amount of data assets. The use of these information assets of the company is done by using Data Warehouse technologies. Data Warehouse (DWH) is a database that stores all information regarding the company’s activities and it is used […]... Continue Reading
New month, new memories! Last month we inaugurated this monthly column about the history of technology, looking back at the birth of the PHP scripting language, the marketing of Apple II and Windows 98, the switch of Facebook, Yahoo and Google to IPv6 and the launch of the first iPhone. If you want to read […]... Continue Reading
The World Report has highlighted attacks on 65 countries: how can a country be safe? Unfortunately most people and organizations think that backups are enough as a countermeasure to ransomwares for the PC Backups are not the solution. The need for a precise plan emerges made up of policies, processes, procedures and integrated technologies (for […]... Continue Reading
Spain will win the FIFA World Cup 2018! That’s the word from the artificial intelligence that guesses the results of football matches! Not Paul the octopus, Achilles the cat or goats to “guess” which team will win the final of the FIFA World Cup 2018 to be played on July 15th. Artificial intelligence has guessed […]... Continue Reading
The term ransomware indicates a sophisticated category of malware that infects desktop and mobile systems, restricting access to the lawful owners. To regain access to files, the owner must pay a ransom (from this the word “ransomware”). There are mainly two types of ransomware: Locker ransomwares: the first distributed versions: they block the victim out […]... Continue Reading
In our blog, we spoke about Blockchain several times, the distributed database used for Bitcoin and that can be used in many sectors. Blockchain is a technology that is constantly expanding, and it is finding new sectors of application. Let’s look at some of the latest Blockchain news, the new areas of use in business from the […]... Continue Reading
Today we frequently hear talk about applications of artificial neural networks to the problems associated with artificial intelligence and machine learning. Let’s examine briefly, and simply what they are and how these technologies can actually help us to solve problems of an engineering nature. Artificial Neural Networks An artificial neural network is a mathematic […]... Continue Reading
If you follow us on social networks, we have, in recent weeks, looked back at the release of Microsoft Excel, the Apple Imac and the Windows 3.0 operating system posts. We thought it would be interesting to, very briefly trace the history of technology, examining important events that happened on certain days, using social media, […]... Continue Reading
Today the GDPR, the European new data and privacy law comes into force. Yesterday we saw how to conform to the GDPR for websites, today we will see how the principles of the European new privacy law apply in the field of e-mail marketing. E-mail marketing is a type of direct marketing that consists of sending […]... Continue Reading
The GDPR is the new European general data protection regulation applicable as of 25 May 2018. From this date on, all penalties anticipated if web sites do not conform to GDPR regulations will be applicable. Regarding the penalties, the new privacy law and changes for companies, we already talked about an initial detailed-study of the […]... Continue Reading
Il più noto motore di ricerca per immagini è sicuramente Google Immagini. Ne esistono, però, altri: Facebook, GazoPa, Yahoo Image Search, Istagram, Pinterest e Corbisimages. ... Continue Reading
How many times do you read a job advertisement that requires that the candidate have specific characteristics – years of experience, knowledge of a specific language or a software – and aware that you do not have these qualifications, you apply anyway, thinking that maybe you will be lucky and will obtain a job interview? […]... Continue Reading
The Forum PA 2018 comes back in May in Rome, to be exact from 22 to 24 of May. The Forum PA 2018 focuses on how to innovate and modernize the Italian public administration and takes place in the Roma Convention Center “La Nuvola”. The edition of the Forum PA 2018 resumes the discourse of […]... Continue Reading
Tomorrow the Hannover Messe will close its doors. As we have already told you, the Hannover Messe is the Hanover fair dedicated to Industry 4.0 and this year the Hannover Messe and the CEMAT are taking place together. Energy: essential topic on the Hannover Fair 2018 Energy is an important topic at the Hanover […]... Continue Reading
The e-CF standard is a reference system for professional and managerial skills in the ICT sector, recognized at the Italian and European level which allows systems which exist at international, national and individual corporate levels to “speak” to each other. The definition of the European e-CF standard is “e-Competence Framework (e-CF) – A common European […]... Continue Reading
Industry 4.0, a term that by now echoes: it will change the labor market, it will increase productivity to the detriment of jobs, through the Government Budget the government wants to promote the transition to what could be a fourth industrial revolution, there is a lack of skills to deal with this… Moreover, we also discussed […]... Continue Reading
The GDPR (General Data Protection Regulation) is the New General Regulation on Data Protection (better known as GDPR or EU Regulation 2016/679), issued by the EU. It became effective on 24 May 2016 and it will be enforceable starting from 25 May 2018 with a legislative decree that harmonizes national legislation with community regulation and […]... Continue Reading
Hannover Messe 2018 and CeMAT 2018 From 23 April to 27 April 2018 Hannover Messe comes back, the Hanover Fair which brings together commercial and energetic technologies and shows the whole value chain. Like every year, the fair takes place in Hanover, in the specific exhibition area of the German city. Mexico is the partner […]... Continue Reading
On 21 March, the Italian “Task Force sull’Intelligenza Artificiale” (“Task Force on Artificial Intelligence) published the “Libro Bianco sull’Intelligenza Artificiale al servizio del cittadino” (“White Paper on Artificial Intelligence serving the citizen”). The Task Force is responsible for studying and evaluating the impact of IA solutions to improve the relationship between citizens and public institutions. […]... Continue Reading
On 26 May, HackInBo returns, the IT security event now in its 10th edition and it takes place in the city of Bologna at Fico Eataly World. HackInBo was born in 2013 by the commitment of Mario Anglani who every year organizes two events, of which the spring edition has a workshop. HackInBo was born to […]... Continue Reading
Today more than ever, IT security and the protection of company data are indispensable for the survival of a company. An attack can have huge consequences for their business. For this reason, companies must have a security plan and must rely on expert professionals who are able to plan a data defense suitable for company […]... Continue Reading
There are various definitions of artificial intelligence, one of them which is recapitulatory states that AI is the ability of a computer to carry out activities and reasonings that are a prerogative of the human mind. AI is connected to the automatic learning, that is the discipline that allows objects that have AI to automatically […]... Continue Reading
Sanremo is the Italian Song Festival which takes place in February in the city of Sanremo, in northern Italy. If we told you that there is a relationship between Sanremo and Big Data, would you believe it? It seems strange, but it is true. In fact, the conversations on social networks, blogs news sites, and […]... Continue Reading
Penetration Test and Vulnerability Assessment: what are they, what are they for, how are they different?
Vulnerability Assessment (VA) is the process of identifying and classifying vulnerabilities in the target system. This process analyzes operating systems, application software, as well as hardware and networks to identify known and unknown vulnerabilities (Zero-day). These vulnerabilities occur because of improper software design, unsafe authentication, or even because of the many vulnerabilities due to programming […]... Continue Reading
Di solito i programmatori commettono errori (bug) nella scrittura del codice: questi errori sono la radice delle vulnerabilità software, perché è attraverso gli errori che si crea una porta d' accesso. Il software è così esposto a delle vulnerabilità.... Continue Reading
Hadoop, what is it and how it works Hadoop is a platform designed to handle and analyze large amounts of data in a business-oriented perspective. Hadoop is one of the first framework to work on Big Data and it is still one of the most reliable. Hadoop is an Open Source implementation of a platform […]... Continue Reading
On the last Monday of January Consulthink had a page dedicated to itself in “La Repubblica“, an important Italian newspaper, in the section “Special Consultancy”. La Repubblica describes us as: “A[n] [Italian] organization with strong technological and organizational skills that, in just over ten years, has become the protagonist of the sector and an important […]... Continue Reading
Big Data is large amounts of data which can be analyzed, worked on and used in order to better understand the events studied. Big Data is essential for Marketing activities in all sectors because Big Data allows information to be analyzed in a way which was not previously possible. To understand the extent of the […]... Continue Reading
The entrepreneurs of the TechMission2018, organized by the “Gruppo Giovani Imprenditori di Confindustria Lombardia” in collaboration with the American Consulate of Milan, visited the CES 2018, but also Amazon headquarters on 7th Avenue in Seattle and they were impressed for this place. It is, in fact, a place of work so large, well-kept, in one […]... Continue Reading
New achievements for Consulthink! Consulthink wins the funding “POR CALABRIA FESR-FSE 2014-2020”, for the “Asse I – Promozione della ricerca e dell’innovazione” whose goal is the “rafforzamento del sistema innovativo regionale e nazionale” with the objective being: “Supporto alla realizzazione di progetti complessi di attività di ricerca e sviluppo su poche aree tematiche di rilievo […]... Continue Reading
A decision tree is a model which allows to take a decision based on a classification system. What is a decision tree? Decision trees are a technique to resolve some types of classification problems. In classification problems generally we have a set of data, which are called “historic” because they are already in our possession […]... Continue Reading
In Las Vegas, the CES 2018 has closed its doors. On our blog, we have seen a lot of new gadgets in these recent days: home automation, robots, virtual assistants, electronics, and wearable devices have made a splash among the stands of CES2018. Now, while companies are thinking about developing new gadgets for next year, […]... Continue Reading
The magazine “World Excellence”, an Italian monthly magazine by Editrice Le Fonti, dedicated a page to Consulthink in its last issue. World Excellence is a magazine that has become a veritable reference point for companies of excellence in innovation and leadership and seeing our name while leafing through the pages fills us with pride and […]... Continue Reading
Durante il CES2018 sono state presentate le novità in ambito tecnologia. Scopriamo cosa potremo acquistare nei prossimi mesi!... Continue Reading
Techmission 2018 Innovation, it is the engine that develops technology and consequently our world and our daily life. Companies which operate in the IT environment know how important this word is, so, as in the past, Consulthink went to CES – Consumer Electronics Show – 2018 in Las Vegas, taking place in this period (9-12 […]... Continue Reading
In an earlier article we explained what Blockchain is and how it works. In this article, we will look at what the possible areas of use for the Blockchain paradigm are and what advantages can emerge using this paradigm that allows you to manage and track transactions that are carried out on the network. Blockchain […]... Continue Reading
Blockchain is a distributed database, structured in network nodes or “blocks” connected to each other – “chain”. Thanks to this chain it is possible to make, manage and keep track of the transactions that are carried out on the network. Blockchain is a paradigm that is taking more and more space in various sectors. Thanks […]... Continue Reading
Predictive Analytics is a mix of data analysis related to phenomena observed in the past integrated into predictive models and machine learning with the aim of predicting future trends. Modern Predictive Analysis is more than ever focused on data, Big Data, as well as large volumes of data segmentable by different variables. Today we have […]... Continue Reading
Celebrations are moments to be with your loved ones and with your family. For this reason on the 20th of December, the Consulthink family gathered to wish each other a Merry Christmas and a Happy New Year. These occasions are moments to be in a peaceful, relaxed and friendly environment; working together makes it easier […]... Continue Reading
Any company active in the market, regardless of sector, type of company and size, needs to have a secure and robust data storage system. In fact, data today is in effect, a company asset and, for this reason, companies must safeguard their data. Above all, in terms of protection, privacy and competition, corporate data is […]... Continue Reading
Bitcoins Bitcoins (BTC or XBT) is electronic currency based on peer-to-peer network. The history of bitcoins begins in 2008 when an author who writes under the pseudonym of Satoshi Nakamoto, in an article, explains the algorithmic theory behind this currency. In 2009 an open source software is released. It allows people’s computers to enter into […]... Continue Reading
The term DevOps stems from the contraction of “development” and “operations“, namely, the team which deals with aspects of software production and maintenance. However, DevOps does not refer only to an operative group, but it is a cultural and methodological change that includes a set of practices, automatic tools and processes of Development and Lean […]... Continue Reading
Presenting the new headquarters, giving its customers and partners a pleasant, immersive and interactive experience, toasting with them to the future, telling them about our daily commitment, our solutions and achievements, these were the watchwords of the event of November 16th “Future Start” organized by Consulthink. A charismatic and professional welcome, the engaging notes of […]... Continue Reading
The term Business Intelligence was used for the first time by an IBM employee, Hans Peter Luhn, to indicate the process of collecting data to turn it into information to be used to plan business decisions. Today, the relationship between Big Data and Business Intelligence is strictly interconnected and can bring significant benefits to the […]... Continue Reading
The theme of Big Data is very current today, we talk about it both at the company level and at the Public Administration one, but it is not always clear what Big Data is used for, how to store it and how to manage it. We have done a bit to define and clarify Big […]... Continue Reading
With the evolution of information systems and with the growing need to organize large amounts of data, we need experts who are able to analyze, manage and support companies in cataloging, analyzing and reading data. Moreover, the amount and types of data on the network grow exponentially as do the number of devices connected to […]... Continue Reading
Cloud computing can be imagined as a new way of thinking about applications, an opportunity to free oneself from the logic of managing systems in IT environments in order to focus only on business, a set of services (provided by third parties) ready to use to manage business processes without being forced to install applications […]... Continue Reading
Every company, whatever its size, must set up a strategy for corporate IT security, built considering its business, the reference market and the presence of databases of data to be managed. Although it is impossible to guarantee 100% security – because even the best computer system could be attacked and because, even if the company […]... Continue Reading
August was not a month of rest and vacation for the Movimento 5 Stelle which had to face 2 hacker attacks on its platform, Rousseau, in a few days. Two hacker attacks that prevent it would not be difficult.... Continue Reading
A cyberattack can be defined as a hostile activity towards systems, instruments, applications or elements that have an IT component. It is an activity that aims to obtain a benefit for the attacker to the detriment of the attacker. There are different types of cyberattacks, they depend on the objectives to be achieved and on […]... Continue Reading
2018 is going to arrive in a few months and Gartner draws up the ranking of the 10 trends for next year. Once again technologies like Blockchain, Artificial Intelligence, app and intelligent objects are excellent investments for the future.... Continue Reading
What are the main IT threats that a company or an individual can meet? We have already discussed some of these in the first part of our article. After examining important issues such as GDPR, the Internet of Things and new opportunities of attack for hackers in the world, we continue here the excursus dedicated […]... Continue Reading
In the contemporary technological landscape, while on the one hand there is a tendency to integrate codes, platforms and regulations, on the other, cyberattacks increase. Cybercriminals move in parallel with the evolution of technology, and defensive systems are not always able to face with these attacks. Let’s see together what are the main critical issues […]... Continue Reading
On 20 July 2017, due to the approach of the summer holidays, we gathered all the members of the large Consulthink family, to say goodbye each other with a toast in our headquarters.... Continue Reading
The quantity and formats of data on the network, especially gradually that more devices are connected to the Internet is growing exponentially.... Continue Reading
The Mobile Security Lab, the Business Unit of Consulthink specialized in mobile Security, participated in the latest Android Hacking Event 2017.... Continue Reading
Blockchain is the basis of the virtual currency of Bitcoin, a current topic; the cryptocurrency (or digital system of non-physical "tokens") has a certain value and is used for the negotiation of goods or services, in the same way as physical money.... Continue Reading
Le Fonti Awards: Consulthink wins the award “Eccellenza dell’Anno – Innovazione – Servizi ICT & Big Data”
Le Fonti Awards: Consulthink wins the award Eccellenza dell'Anno - Innovazione - Servizi ICT & Big Data, the last 22nd June in Palazzo Mezzanotte, headquarters of Milan Stock Exchange.... Continue Reading
"A good security system is one that predicts attacks" this is the new challenge that Consulthink's Research and Development Division has been responding to, and that Dr. Carotenuto discusses in the pages of The Sun 24 hours, together with the successes achieved by the company during the last 13 years.... Continue Reading
As happens every year, the ranking of the 10 technology trends created by Gartner have arrived and, of course, Consulthink, always oriented towards new challenges, could not fail to engage in such technological perspectives.... Continue Reading
The seventh edition of Le Fonti Awards happens in Milan at Palazzo Mezzanotte on 22 june. Le Fonti Awards is part of the international IAIR AWARDS and among the finalists figure Consulthink in the special category “Eccellenza dell’Anno/Innovazione – servizi ICT”, which is a perfect category for the company.... Continue Reading
"BS2R - Beyond Social Semantic Recommendation" This is the name of the project carried out by Consulthink. A platform combining a search engine with a corporate social network: "expert" and "trusted" users suggest potentially useful and interesting content for their contacts with whom they can share their opinions. All thanks, to the ability of that platform, which uses social and semantic technologies, to identify the business team's preferences and behaviors.... Continue Reading