This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I’ve recently had a quiet year on the blogging front – my professional duties have prevented me from playing a more active role on the Internet during this year than I would have liked, but that is set to change in 2017. My professional work this year included acting as a specialist adviser to the Joint Parliamentary Committee on the Draft Investigatory Powers Act, one of the most significant pieces of legislation to be laid before Parliament for many years, to advising large (and some not so la
HTTPS is as important today as it has ever been. If you are transferring sensitive data you should use HTTPS to encrypt data in transit, that is not up for. Read More. The post We Must Improve the HTTPS Message appeared first on PerezBox.
RISC-V is a new, open instruction set. Fabrice Bellard wrote a Javascript emulator for it that boots Linux here ( more info ). I happen to have just gotten a physical chip that implements it too (one of these ) and what's cool is that you can get the source code to the chip on GitHub. The full, user-level instruction set is documented but there's a lot of information in there.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On December 15, 2016, the Article 29 Working Party (“Working Party”) issued a press release announcing its December 13, 2016, adoption and release of three sets of guidelines and FAQs on key implementation issues under the EU General Data Protection Regulation (“GDPR”): Guidelines and FAQs on the Right to Data Portability; Guidelines and FAQs on Data Protection Officers (DPO); and.
Strategic information management in the digital age. ravi.kumarv@cgi.com. Thu, 12/22/2016 - 01:09. Corporate information management has undergone a steady evolution over the past three decades. Organizations that have been quick to embrace new strategies and tools are surviving and thriving in continuously changing business landscapes. Those that have not embraced the value of information are going under and facing a crowded, competitive marketplace filled with companies looking to pounce on the
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Strategic information management in the digital age. ravi.kumarv@cgi.com. Thu, 12/22/2016 - 01:09. Corporate information management has undergone a steady evolution over the past three decades. Organizations that have been quick to embrace new strategies and tools are surviving and thriving in continuously changing business landscapes. Those that have not embraced the value of information are going under and facing a crowded, competitive marketplace filled with companies looking to pounce on the
George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). As if we don’t have enough challenges, controlling information today. Part of our culture, at least here in the U.S., has embraced the acceptance of non-truths and the repudiation of facts in the record.
I'm very excited for another AIIM Conference! AIIM17 will be held this March in Orlando. If you are an information professional, you will really benefit from attending the AIIM Conference. It is on my very short list of must-attend events in our profession. I have attended the past two AIIM Conferences and have loved every minute. This year I am teaching a pre-con course on Electronic Records Management (ERM).
I've been working with DB2 for z/OS -- as an IBMer, as a user, as an independent consultant -- for 30 years. I was with IBM when DB2 was introduced to the market. I've met people who were part of the core team at IBM that invented relational database technology. I was privileged to serve for a year as president of the International DB2 Users Group. DB2 has been very good to me, and the work I do as a DB2 for z/OS specialist I do with commitment and passion.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On December 27, 2016, the Securities and Exchange Commission (“SEC”) announced charges against three Chinese traders who allegedly made almost $3 million in illegal profits by fraudulently trading on nonpublic information that had been hacked from two New York-based law firms. This is the first action in which the SEC has brought charges in connection with an incident involving hacking into a law firm’s computer network.
Culture change is the #1 challenge for transformation. What are utilities doing to address it? shobana.lv@cgi.com. Tue, 12/20/2016 - 02:36. One of the biggest hurdles utilities face in embracing digital transformation is a resistance to change. For established organizations, adopting digital as an enterprise-wide business model is far more challenging compared to new market entrants that have a digital-first, customer-first mindset embedded in their organizational culture.
Fans of the latest Star Wars saga Rogue One will notice that Digital Archiving forms a prominent part in the new film. This is good news for all of us in the industry, as we can use it as an example of how we are working every day to ensure the durability and security of our content. Perhaps more importantly it makes our jobs sound much more glamorous – when asked “so what do you do” we can start with “remember the bit in Rogue One….”.
Earlier this year, I became the new President of the National Capitol Chapter of AIIM (NCC-AIIM). I have been a member of this group for the last several years, and I see a lot of potential for even greater impact in the Washington, D.C. region for Information Professionals. This group has a rich history and has some amazing professionals as members as well as past and current board members.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
There’s some really interesting leaked photos and analysis by Charles Goodman. “ Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoilers).
The post Predictions 2016: How’d I Do? appeared first on John Battelle's Search Blog. At the beginning of each year I make predictions , and at year’s end, I hold myself to account. It’s kind of fun to look back and see how wrong (or right) my musings end up being. I’ll be writing my Predictions 2017 post this weekend (I think), and publishing it shortly thereafter.
On December 20, 2016, the FTC announced that it has agreed to settle charges that Turn Inc. (“Turn”), a company that enables commercial brands and ad agencies to target digital advertising to consumers, tracked consumers online even after consumers took steps to opt out of tracking. In its complaint , the FTC alleged that Turn made various misrepresentations in its privacy policy, including that (1) blocking or limiting cookies would restrict Turn’s ability to track a consumer, and (2) consumers
A consumer perspective on FinTech disruption (part 1). shobana.lv@cgi.com. Thu, 12/22/2016 - 02:16. Today’s banks are facing a number of unprecedented challenges, including the rise in financial technology (FinTech) firms. These innovative startups are focused on taking a share of bank customers, products and revenues through new digital services, and staying ahead of them is high on banks’ agendas.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
An alien relying on TV for their knowledge of humanity might watch a few ads and assume our closest emotional relationships are with banks, utilities and retailers. After all, they all claim to be your best friend, look how many ads talk about “falling in love” with your service provider! It is popular to talk about the relationship between customers and the businesses that serve them.
Canada’s Anti-Spam Law came into force on July 1, 2014. Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission […].
GovConExec. Posted By: Jay Clemens on: December 20, 2016. CSRA ‘s SRA International subsidiary has been awarded a five-year, $25.5 million contract to provide a common, integrated radio frequency identification system to the U.S. Army. The Defense Department said Monday that the Army will implement passive Radio Frequency Identification III technology to track, locate and identify commodities and assets.
This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On December 6, 2016, Hunton & Williams announced the release of the second edition treatise Privacy and C ybersecurity Law Deskbook (Wolters Kluwer Legal & Regulatory U.S.) by lead author Lisa J. Sotto , head of the firm’s Global Privacy and Cybersecurity practice. The Deskbook has become an essential tool for those involved in managing privacy and cybersecurity law issues.
How can we meet the challenge of social care? ravi.kumarv@cgi.com. Tue, 12/13/2016 - 06:00. Caring for older and vulnerable citizens is one of greatest challenges facing societies in the prosperous western world today. . We all know the population is ageing but the rate of change can startle: the number of centenarians in the UK quadrupled in the last 30 years.
I recently was interviewed for the new Tech Leaders Today podcast. In this episode, I talk with host Cassie Crossley about information strategy, architecture, and governance as the real requirements for IT solutions. We also discuss recruiting and developing talented people for Government Information Technology engagements. "Technology isn't the Real Solution with Kevin Parker" Listen to the podcast below, or check it out on the Tech Leaders Today website.
General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. One of the biggest challenges posed by legal holds is getting compliance by the employees who are subject to it.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
There’s a new paper from Mark Thompson and Hassan Takabi of the University of North Texas. The title captures the question: Effectiveness Of Using Card Games To Teach Threat Modeling For Secure Web Application Developments. Gamification of classroom assignments and online tools has grown significantly in recent years. There have been a number of card games designed for teaching various cybersecurity concepts.
On December 21, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Risk, High Risk, Risk Assessments and Data Protection Impact Assessments under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations concerning the interpretation and implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions relating to risk and risk assessment, which will become applicable on May 25, 2018
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content