This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.
'The post Excellent Content Marketing: Dear NSA… appeared first on John Battelle's Search Blog. This short Slideshare deck , an extremely clever satire of the now infamous NSA slide deck , should be Slideshare’s marketing calling card. Echoes of the Tide and Oreo executions that are getting such plaudits recently. Love it. Dear NSA, let me take care of your slides. from Emiland.
'I''ll get to the point of this blog post in a moment… but first: I blogged about FutureGov''s Australian Patchwork pilot back in March. This is a recording of FutureGov''s Dominic Campbell presenting at a "BlueSky" session hosted by The Australian Centre for Social Innovation (TACSI): TACSI - BlueSky FutureGov from TACSI on Vimeo. Its well worth listening to the whole ~40 minutes of Dominic''s presentation.
In the world of business, data has become the coin of the realm. Organizations that effectively leverage their informational assets tend to outperform peers and rivals. Given the value of data in today's marketplace, it's no wonder that companies are keenly focused on data security and availability, and on data delivery mechanisms that will keep pace with business growth.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On June 18, 2013, the New York office of Hunton & Williams LLP office hosted Cornell University’s Privacy and Data Security Symposium, Privacy, Security & Your Data – Concerns in a Changing World. The program focused on global privacy and cybersecurity issues, including protecting the personal information of Internet users, balancing user privacy with law enforcement concerns, and implementing responsible data stewardship and governance.
Architectural Significance. ravi.kumarv@cgi.com. Fri, 06/14/2013 - 08:00. I’ve lost count of the number of times I’ve seen systems architecture done badly. This is wearisome, and can be avoided. Poor architecture tends to come either from inexperienced architects (too wedded to technology specifics, or too dependent on formal method) or from overly-experienced architects (stuck in a groove, or too independent of method).
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Architectural Significance. ravi.kumarv@cgi.com. Fri, 06/14/2013 - 08:00. I’ve lost count of the number of times I’ve seen systems architecture done badly. This is wearisome, and can be avoided. Poor architecture tends to come either from inexperienced architects (too wedded to technology specifics, or too dependent on formal method) or from overly-experienced architects (stuck in a groove, or too independent of method).
'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.
'The post Hasta La Alta Vista, Baby. appeared first on John Battelle's Search Blog. I just saw the news that Yahoo! is “sunsetting” Alta Vista , one of the first “good” search engines. This makes me a little misty, as Alta Vista was the search engine I used BG – Before Google – and it had a real shot at *being* Google, had its various owners not utterly screwed it up over the years.
'Yes, yes, I know this is just marketing. But even so, its nice to see social innovation enabled by mobile apps being highlighted. This 10 minute video highlights the following apps: Skyscape - a clinical decision-support tool. galileo - a clinical app, for amputees. Thornton Media - apps to help save endangered North American indigenous languages. It interesting to consider these examples in the light of the just released Australian Federal government''s mobile roadmap (PDF).
You've probably seen this type of commercial many times on television: a frazzled individual vents his or her frustration over the difficulty of accomplishing some task, and finally cries out, "There must be a better way!" At which point the announcer chimes in, with a smooth and confident voice, "There is!" And then you get the product pitch (and it all concludes with the smiling, nodding approval of the formerly rattled, now happy-in-accomplishment user of the promoted product or service).
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The Bavarian data protection authority recently updated its compliance initiative regarding online tracking tools to include Adobe’s online tracking product ( Adobe Analytics (Omniture) ). As with previous initiatives of this nature , the underlying analyses were carried out in an automated manner, using a program specifically developed by the Bavarian data protection authority to verify compliance.
Thanks to all those who made IRMS 2013 such a great event, to those who dropped by the stand and everyone who participated in our survey. Reading the survey responses I was really struck by the diversity of retention schedules being managed and the challenge of archival records in operational systems. Clearly there is no one size fits all for keeping records.
'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.
'The post The Book Lives On appeared first on John Battelle's Search Blog. Faithful readers will recall that about three months ago, I announced my return to FM as CEO. I also mentioned that the projects I’d been working on – notably OpenCo and The Book , would have to be retooled given my new commitment to the company I started back in 2005 (when I last wrote a book).
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
June 7, 2013. Today, HHS published in the Federal Register “ Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules ” that were published on January 25, 2013, as the Final Rule: “ Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.” Acc
'The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog. Waaay back in the late 1990s, I started a conference called the Internet Summit. My co-producers were Bill Gurley, who remains one of the giants in venture over at Benchmark, and Mary Meeker, who was at that point the best analyst in the Internet space, at Morgan Stanley.
'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.
The Centre for Information Policy Leadership at Hunton & Williams LLP is pleased to announce that Bojana Bellamy, global director of data privacy for Accenture, will be joining the firm as president of the Centre, effective September 2, 2013. Current Centre President, Marty Abrams, who is retiring on September 1, will stay on as an advisor to the Centre.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
In recent months, the Belgian media has reported on a significant increase in data breaches. In December 2012, the National Belgian Railway Company inadvertently published 1.46 million sets of customer data online. The rise in data security incidents has caught the attention of the Belgian Privacy Commission, which has the authority to make recommendations on any matter relating to the application of the fundamental data protection principles in the Belgian Data Protection Act of December 8, 199
On June 24, 2013, the European Commission announced new technical implementing measures that address the EU data breach notification requirement for telecom operators and internet service providers (“ISPs”). Based on a Commission Regulation , these companies must: notify the competent national authority of the incident (or at least provide an initial description thereof) within 24 hours after detection of the breach; outline which data are affected and what measures have been or will be taken by
Hunton & Williams LLP proudly announces that the firm’s global Privacy and Cybersecurity practice was top-ranked in both The Legal 500 United States and EMEA 2013 guides. This is the fourth consecutive year that the practice has been listed in “Tier 1” by The Legal 500 United States. “We are very pleased that our global Privacy and Cybersecurity practice has maintained its position as one of the top practices in the world,” said firm Managing Partner Wally Martinez.
On June 20, 2013, the UK Information Commissioner’s Office (“ICO”) launched its Annual Report and Financial Statements for 2012/13 (the “Report”). Introducing the Report , Information Commissioner Christopher Graham strongly emphasized that, as consumers become increasingly aware of their information rights, good privacy practices will become a commercial benefit and a business differentiator.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On June 14, 2013, the European Data Protection Supervisor (the “EDPS”) issued an Opinion regarding a joint communication by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, Cyber Security Strategy of the European Union: an Open, Safe and Secure Cyberspace (the “Strategy”), as well as the European Commission’s proposed draft directive to ensure uniformly high security measures for network and information security across the EU (the “NIS Dir
On June 14, 2013, Texas Governor Rick Perry signed a bill requiring law enforcement agencies to obtain warrants before accessing customer electronic data held by email service providers. Introduced on March 4, 2013, the bill passed unanimously in both the Texas House and Senate on May 7 and May 22, respectively. The law takes effect immediately. The law amends the Texas Code of Criminal Procedure to require a warrant for the search and seizure of electronic customer data held in electronic stora
On June 17, 2013, the Federal Trade Commission announced that FTC Chair Edith Ramirez has appointed Jessica Rich as Director of the Bureau of Consumer Protection. Rich has served in several leadership roles in the FTC’s Bureau of Consumer Protection during her 20-year tenure with the agency. Most recently, she served as Associate Director of the Division of Financial Practices.
On June 13, 2013, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $275,000 settlement with Shasta Regional Medical Center (“Shasta”) that pertained to impermissible disclosures of protected health information (“PHI”) by Shasta officials to the media, as well as to Shasta’s entire workforce. In late 2011, Shasta officials disclosed detailed information about a patient’s medical treatment to three separate media outlets without the patient’s authorization.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On June 11, 2013, the United States Court of Appeals for the Seventh Circuit denied software maker comScore, Inc.’s petition to appeal class certification in a litigation related to comScore software that allegedly collected extensive data from consumers’ computers without authorization. The plaintiffs alleged that comScore (an online analytics company) gathered data from consumers’ computers through software that it bundled with third-party software, such as free screensavers, games, music-copy
As reported in the Hunton Employment & Labor Perspectives Blog : In an article to be published this month in the Seton Hall University Law Review , Hunton & Williams partners Terry Connor and Kevin White question whether the Equal Employment Opportunity Commission (“EEOC”) had the statutory authority to publish its April 2012 Guidance interpreting Title VII to impose disparate impact liability on employers who consider applicants’ criminal backgrounds as part of the hiring process.
The UK Information Commissioner’s Office (“ICO”) has published guidance on the application of the Data Protection Act 1998 (“DPA”) to social networking sites and online forums. The guidance emphasizes that organizations and individuals that process data for non-personal purposes must comply with DPA requirements in their use of social networking sites and online forums just as they would in any other context.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content