- Talend Open Studio
- TIBCO Jaspersoft ETL
- Truedat (Bluetab Solutions)
PDF (104 Pages): Berkeley Protocol on Digital Open Source Investigations
Phi Beta Iota: If you want to be a drunk under the streetlamp looking for keys far far away, this is the best manual available. It is also a road map for FAKING digital online sources. OSINT is HUMINT. Harnessing digital volunteers is helpful — Crisis Mappers demonstrated that until they were bought out and repressed — but anyone who thinks online is more than 10-15% of the solution is stupid or corrupt.
An open data project is exploring new ways to use shareable databases in creative, public-spirited ways.
Now Medialab Prado is trying to go global with its civic incubation model. In September and October, it will be hosting a MOOC course (in Spanish) on “how to grow your own citizen laboratory and build networks of cooperation.” The idea is to foster very localized citizen innovation labs, even in rural areas, by helping people learn how to host prototyping workshops, use helpful digital tools, issue open calls to identify projects and collaborators, and run communication plans, mediation, documentation, evaluation, etc.
Organisations are turning to open source storage solutions to gain value from the data they store. But, what has driven this trend?
- Cloud architectures and open source storage
- Open source in the analytics space
- Open source storage driving intelligence
Phi Beta Iota: The release was either written by a machine or by someone in Bangladesh or Pakistan not fluent in English. We are anticipating an international open source inventory in 2020 that goes far beyond software and hardware. See the graphic below.
Congress should require the Director of National Intelligence to make open source intelligence more widely available, the U.S.-China Economic and Security Review Commission recommended in its latest annual report.
Last June, the former OpenSource.gov web portal was “decommissioned.” Its contents were transferred to classified or restricted networks that are mostly inaccessible to those outside the intelligence community.