<div dir="ltr"><br><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">SourceForge Resources</b> <span dir="ltr"><<a href="mailto:sourceforge@resources.sourceforge.com">sourceforge@resources.sourceforge.com</a>></span><br>
Date: 2014-07-11 21:08 GMT+03:00<br>Subject: Securing Big Data - 10 Steps<br>To: <a href="mailto:eleni.kassapi@gmail.com">eleni.kassapi@gmail.com</a><br><br><br>
        
                
                
        
        <div>
                <center>
                        
                        <table cellpadding="10" cellspacing="0" align="center" border="0" width="660">
                                <tbody>
                                        <tr>
                                                <td style="font-family:Helvetica,Arial,sans-serif;font-size:12px;color:#333" align="center">
                                                        To view a web version of this message, <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,7zdr,51ie,4nv8,f7mr&MLM_MID=3291876&MLM_MLID=6640&MLM_SITEID=2010001400&MLM_UNIQUEID=351d4ad463" target="_blank">click here</a></td>

                                        </tr>
                                </tbody>
                        </table>
                        
                        <table cellpadding="0" cellspacing="0" align="center" border="1" width="660">
                                <tbody>
                                        <tr>
                                                <td>
                                                        <img src="" alt="SourceForge Resources" style="display:block" height="52" width="660"></td>
                                        </tr>
                                        <tr>
                                                <td bgcolor="#f1fbf4">
                                                        
                                                        <table cellpadding="15" cellspacing="0" border="0" width="660">
                                                                <tbody>
                                                                        <tr>
                                                                                <td style="font-family:Helvetica,Arial,sans-serif;font-size:23px">
                                                                                        <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,4zrn,dmw2,4nv8,f7mr&EMAIL_ADDRESS=eleni.kassapi@gmail.com" style="text-decoration:none;color:#000" target="_blank"><b>10 Ways to Build a Better Big Data Security Strategy </b></a></td>

                                                                        </tr>
                                                                </tbody>
                                                        </table>
                                                        </td>
                                        </tr>
                                        <tr>
                                                <td>
                                                        
                                                        <table cellpadding="15" cellspacing="0" border="0" width="660">
                                                                <tbody>
                                                                        <tr>
                                                                                <td valign="top" width="152">
                                                                                        <p>
                                                                                                <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,j46i,gknc,4nv8,f7mr&EMAIL_ADDRESS=eleni.kassapi@gmail.com" target="_blank"><img src="" alt="Learn More" height="155" width="150"></a></p>

                                                                                        <div>
                                                                                                <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,1tp6,d5zk,4nv8,f7mr&EMAIL_ADDRESS=eleni.kassapi@gmail.com" style="background-color:#339933;border:1px solid #aaaaaa;border-radius:3px;color:#ffffff;display:inline-block;font-family:sans-serif;font-size:13px;font-weight:bold;line-height:30px;text-align:center;text-decoration:none;width:150px" target="_blank">Download</a></div>

                                                                                </td>
                                                                                <td style="font-family:Helvetica,Arial,sans-serif;font-size:14px;line-height:18px" valign="top">
                                                                                        <p>
                                                                                                Collecting vast amounts of data from disparate sources - including the cloud - exposes the enterprise to new threats and creates vast new stores of data you must protect. But you can apply Big Data techniques for finding insight in mountains of data to find security threats as well.</p>

                                                                                        <p>
                                                                                                This IT Manager's Journal will discuss 10 best practices you can employ in your journey down the path of securing Big Data and show how Big Data can be both a problem and a solution. Then it will guide you through four documents that lay out how to put Big Data to work for your
organization as part of a comprehensive enterprise security solution. <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,l2st,rfj,4nv8,f7mr&EMAIL_ADDRESS=eleni.kassapi@gmail.com" style="color:#006400;text-decoration:none" target="_blank"><b>Download Now
»</b></a></p>
                                                                                </td>
                                                                        </tr>
                                                                </tbody>
                                                        </table>
                                                        </td>
                                        </tr>
                                </tbody>
                        </table>
                        
                        <table cellpadding="10" cellspacing="0" align="center" border="0" width="660">
                                <tbody>
                                        <tr>
                                                <td style="font-family:Helvetica,Arial,sans-serif;font-size:13px">
                                                        <p>
                                                                You are subscribed to SourceForge Resources as <a href="mailto:eleni.kassapi@gmail.com" target="_blank">eleni.kassapi@gmail.com</a></p>
                                                        <p>
                                                                To unsubscribe, <a href="http://clicks.slashdot.org/functions/mailing_list.html?mid=3291876&submitaction=2&mlid=6640&activity=submit&siteid=2010001400&email=eleni.kassapi%40gmail.com&redirection=http%3A%2F%2Fclicks.slashdot.org%2Ffunctions%2Funsubscribed.html" target="_blank">click here</a> or send an
email to: <a href="mailto:unsubscribe-6640@elabs10.com" target="_blank">unsubscribe-6640@elabs10.com</a></p>
                                                        <p>
                                                                To ensure delivery to your inbox and to enable images, please add <a href="mailto:sourceforge@resources.sourceforge.com" target="_blank">sourceforge@resources.sourceforge.com</a> to your e-mail address book or safe senders list.</p>

                                                        <p>
                                                                SourceForge | 594 Howard Street, Suite 300 | San Francisco, CA 94105</p>
                                                        <p>
                                                                To view our Privacy Policy click <a href="http://clicks.slashdot.org/c.html?ufl=3&rtr=on&s=x8pb08,1yk10,54g,lrsa,m3j5,4nv8,f7mr" target="_blank">here</a>.</p>
                                                </td>
                                        </tr>
                                </tbody>
                        </table>
                        </center>
        <img src=""></div>
</div><br><br clear="all"><br>-- <br>πηγή: illusion and disillusion in David Olson and John DeFrain<br>McGrawHill [2003]<br><br>negοtiate from the adult position<br>avoid ultimatums<br>if one part loses, both lose<br>say what you really mean<br>
avoid accusations and attack<br>own your own feelings first<br>state your wishes and request clearly and directly<br>repeat the message you think you received<br>refuse to fight dirty<br>resist giving the silent treatment<br>
focus on the issue and focus on the present<br>call "time-out" and 'foul"<br>use humor and comic relief<br>always go for closure<br>---<br>dr eleni kassapi<br>dottorato di ricerca in traduttologia<br>dipartimento di lingua e letteratura italiana<br>
universita' aristotele<br>salonicco 54124<br>00306976730203<br>grecia<br><br><br><br>Important notices<br>Due to strict security and anti-spam set/tings on our mail server please request a read receipt if you consider the email important. The read receipt though does not imply that the recipient neither agrees nor has fully understood the content of the message. It implies only that your message has appeared to the recipients PC.<br>
<br>This email is intended only for the party to whom it is addressed, and may contain information which is privileged or confidential. Any other disclosure is strictly prohibited. If you have received this email in error, or are not a named recipient, please notify the sender immediately and destroy all copies of this email. Thank you.<br>
<br>Αυτό το ηλεκτρονικό ταχυδρομείο προορίζεται μόνο για το συμβαλλόμενο μέρος στο οποίο απευθύνεται, και μπορεί να περιέχει τις πληροφορίες που είναι προνομιούχες ή εμπιστευτικές. Οποιαδήποτε άλλη κοινοποίηση είναι απαγορεύεται αυστηρά. Εάν έχετε λάβει αυτό το ηλεκτρονικό ταχυδρομείο κατά λάθος, ή δεν είστε ένας ονομασμένος παραλήπτης, παρακαλώ ειδοποιήστε τον αποστολέα αμέσως και καταστρέψτε όλα τα αντίγραφα αυτού του ηλεκτρονικού ταχυδρομείου. Ευχαριστώ.<br>
<br><br>
</div>