Remove Computer and Electronics Remove Education Remove Events Remove Privacy Remove Security
article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. It made sense.

article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

Actually, it started yesterday, with a few events, including the Welcome Reception and the Beer and Basics: e-Discovery 101 and Relativity Fundamentals session (serving beer and wine at an education session is OK with me!). The 2018 Relativity Fest conference is here! Ball, P.C. This session has been submitted for CLE accreditation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. The economic benefits and utility of AI technologies are clear and compelling. Some argue that its provisions infringe on the First Amendment.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

This office had sort of crawled to a halt, because they were processing kids that had lost their parents and they were trying to find profiles and sponsors for them, sponsors that pay for their schooling and all that stuff, and their network, their computers were so screwed up that they had to like stop. You might not know any real hackers.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. Violating this principle is wrong, legally (copyright) and ethically (privacy). Unlike print newspapers, digital-only news has no physical form.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 looks to the future, presents next steps, and discusses key takeaways. Introduction.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Wearing a fascinating looking tube valve watch (which didn’t look like Apple’s industrial design) Steve took to the stage and ran through a rapid history of modern personal computing from a very personal perspective.