December, 2016

article thumbnail

My (somewhat unreliable) data protection predictions for 2017

Data Protector

I’ve recently had a quiet year on the blogging front – my professional duties have prevented me from playing a more active role on the Internet during this year than I would have liked, but that is set to change in 2017. My professional work this year included acting as a specialist adviser to the Joint Parliamentary Committee on the Draft Investigatory Powers Act, one of the most significant pieces of legislation to be laid before Parliament for many years, to advising large (and some not so la

GDPR 120
article thumbnail

We Must Improve the HTTPS Message

PerezBox

HTTPS is as important today as it has ever been. If you are transferring sensitive data you should use HTTPS to encrypt data in transit, that is not up for. Read More. The post We Must Improve the HTTPS Message appeared first on PerezBox.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RISC-V assembly

Imperial Violet

RISC-V is a new, open instruction set. Fabrice Bellard wrote a Javascript emulator for it that boots Linux here ( more info ). I happen to have just gotten a physical chip that implements it too (one of these ) and what's cool is that you can get the source code to the chip on GitHub. The full, user-level instruction set is documented but there's a lot of information in there.

IT 66
article thumbnail

Article 29 Working Party Releases GDPR Implementation Guidance and Announces Privacy Shield Developments

Hunton Privacy

On December 15, 2016, the Article 29 Working Party (“Working Party”) issued a press release announcing its December 13, 2016, adoption and release of three sets of guidelines and FAQs on key implementation issues under the EU General Data Protection Regulation (“GDPR”): Guidelines and FAQs on the Right to Data Portability; Guidelines and FAQs on Data Protection Officers (DPO); and.

GDPR 68
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Strategic information management in the digital age

CGI

Strategic information management in the digital age. ravi.kumarv@cgi.com. Thu, 12/22/2016 - 01:09. Corporate information management has undergone a steady evolution over the past three decades. Organizations that have been quick to embrace new strategies and tools are surviving and thriving in continuously changing business landscapes. Those that have not embraced the value of information are going under and facing a crowded, competitive marketplace filled with companies looking to pounce on the

More Trending

article thumbnail

Fact Denial and the Record Under Threat

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). As if we don’t have enough challenges, controlling information today. Part of our culture, at least here in the U.S., has embraced the acceptance of non-truths and the repudiation of facts in the record.

article thumbnail

Excited for the 2017 AIIM Conference

JKevinParker

I'm very excited for another AIIM Conference! AIIM17 will be held this March in Orlando. If you are an information professional, you will really benefit from attending the AIIM Conference. It is on my very short list of must-attend events in our profession. I have attended the past two AIIM Conferences and have loved every minute. This year I am teaching a pre-con course on Electronic Records Management (ERM).

article thumbnail

In Praise of the Invisible DB2 for z/OS System

Robert's Db2

I've been working with DB2 for z/OS -- as an IBMer, as a user, as an independent consultant -- for 30 years. I was with IBM when DB2 was introduced to the market. I've met people who were part of the core team at IBM that invented relational database technology. I was privileged to serve for a year as president of the International DB2 Users Group. DB2 has been very good to me, and the work I do as a DB2 for z/OS specialist I do with commitment and passion.

article thumbnail

SEC Charges Chinese Traders with Trading on Information Stolen from Law Firms

Hunton Privacy

On December 27, 2016, the Securities and Exchange Commission (“SEC”) announced charges against three Chinese traders who allegedly made almost $3 million in illegal profits by fraudulently trading on nonpublic information that had been hacked from two New York-based law firms. This is the first action in which the SEC has brought charges in connection with an incident involving hacking into a law firm’s computer network.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Culture change is the #1 challenge for transformation. What are utilities doing to address it?

CGI

Culture change is the #1 challenge for transformation. What are utilities doing to address it? shobana.lv@cgi.com. Tue, 12/20/2016 - 02:36. One of the biggest hurdles utilities face in embracing digital transformation is a resistance to change. For established organizations, adopting digital as an enterprise-wide business model is far more challenging compared to new market entrants that have a digital-first, customer-first mindset embedded in their organizational culture.

IT 61
article thumbnail

How not to build a digital archive: lessons from the dark side of the force

Preservica

Fans of the latest Star Wars saga Rogue One will notice that Digital Archiving forms a prominent part in the new film. This is good news for all of us in the industry, as we can use it as an example of how we are working every day to ensure the durability and security of our content. Perhaps more importantly it makes our jobs sound much more glamorous – when asked “so what do you do” we can start with “remember the bit in Rogue One….”.

article thumbnail

Rogue One Sequel already being filmed!

Adam Shostack

There’s some really interesting leaked photos and analysis by Charles Goodman. “ Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoilers).

40
article thumbnail

Predictions 2016: How’d I Do?

John Battelle's Searchblog

The post Predictions 2016: How’d I Do? appeared first on John Battelle's Search Blog. At the beginning of each year I make predictions , and at year’s end, I hold myself to account. It’s kind of fun to look back and see how wrong (or right) my musings end up being. I’ll be writing my Predictions 2017 post this weekend (I think), and publishing it shortly thereafter.

IoT 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

National Capitol Chapter of AIIM

JKevinParker

Earlier this year, I became the new President of the National Capitol Chapter of AIIM (NCC-AIIM). I have been a member of this group for the last several years, and I see a lot of potential for even greater impact in the Washington, D.C. region for Information Professionals. This group has a rich history and has some amazing professionals as members as well as past and current board members.

40
article thumbnail

FTC Announces Settlement Regarding Targeted Digital Advertising

Hunton Privacy

On December 20, 2016, the FTC announced that it has agreed to settle charges that Turn Inc. (“Turn”), a company that enables commercial brands and ad agencies to target digital advertising to consumers, tracked consumers online even after consumers took steps to opt out of tracking. In its complaint , the FTC alleged that Turn made various misrepresentations in its privacy policy, including that (1) blocking or limiting cookies would restrict Turn’s ability to track a consumer, and (2) consumers

Privacy 58
article thumbnail

Who do you love?

MIKE 2.0

An alien relying on TV for their knowledge of humanity might watch a few ads and assume our closest emotional relationships are with banks, utilities and retailers. After all, they all claim to be your best friend, look how many ads talk about “falling in love” with your service provider! It is popular to talk about the relationship between customers and the businesses that serve them.

Retail 40
article thumbnail

CSRA and RFID Global awarded $25.5M US Army Passive RFID contract

RFID Global Solution, Inc.

GovConExec. Posted By: Jay Clemens on: December 20, 2016. CSRA ‘s SRA International subsidiary has been awarded a five-year, $25.5 million contract to provide a common, integrated radio frequency identification system to the U.S. Army. The Defense Department said Monday that the Army will implement passive Radio Frequency Identification III technology to track, locate and identify commodities and assets.

IT 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Riding the blockchain wave in trade finance

CGI

Riding the blockchain wave in trade finance. ravi.kumarv@cgi.com. Mon, 12/12/2016 - 22:35. Trade finance, whether conducted on a domestic or international basis, can be a paper-intensive, costly and risk-laden proposition, involving not just companies importing and exporting goods and services but also their banks, insurers and others. The trading process can be time-consuming, error prone, vulnerable to fraud and susceptible to hacking.

article thumbnail

Seeing the Big Picture

Adam Shostack

This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.

article thumbnail

Featured in Tech Leaders Today Podcast Episode

JKevinParker

I recently was interviewed for the new Tech Leaders Today podcast. In this episode, I talk with host Cassie Crossley about information strategy, architecture, and governance as the real requirements for IT solutions. We also discuss recruiting and developing talented people for Government Information Technology engagements. "Technology isn't the Real Solution with Kevin Parker" Listen to the podcast below, or check it out on the Tech Leaders Today website.

article thumbnail

Privacy and Cybersecurity Law Deskbook Second Edition Released

Hunton Privacy

On December 6, 2016, Hunton & Williams announced the release of the second edition treatise Privacy and C ybersecurity Law Deskbook (Wolters Kluwer Legal & Regulatory U.S.) by lead author Lisa J. Sotto , head of the firm’s Global Privacy and Cybersecurity practice. The Deskbook has become an essential tool for those involved in managing privacy and cybersecurity law issues.

Privacy 53
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

My Latest Article Published at Today’s General Counsel

Getting Information Done

General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. One of the biggest challenges posed by legal holds is getting compliance by the employees who are subject to it.

Paper 40
article thumbnail

HSBC wins Digital Preservation Initiative in Industry Award

Preservica

Recently the Preservica team had the pleasure of attending the prestigious Digital Preservation Awards (DPA) at the Wellcome Trust, London. The awards run by the Digital Preservation Coalition (DPC) are the most prominent celebration of achievement representing people and organisations who have made significant and innovative contributions to protecting the value of digital information.

article thumbnail

How can we meet the challenge of social care?

CGI

How can we meet the challenge of social care? ravi.kumarv@cgi.com. Tue, 12/13/2016 - 06:00. Caring for older and vulnerable citizens is one of greatest challenges facing societies in the prosperous western world today. . We all know the population is ageing but the rate of change can startle: the number of centenarians in the UK quadrupled in the last 30 years.

article thumbnail

Do Games Teach Security?

Adam Shostack

There’s a new paper from Mark Thompson and Hassan Takabi of the University of North Texas. The title captures the question: Effectiveness Of Using Card Games To Teach Threat Modeling For Secure Web Application Developments. Gamification of classroom assignments and online tools has grown significantly in recent years. There have been a number of card games designed for teaching various cybersecurity concepts.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

HHS Issues Warning About Phishing Campaign Disguised As Official Communication

Privacy and Cybersecurity Law

As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department […].

article thumbnail

CIPL Issues White Paper on High Risk and DPIAs under the GDPR

Hunton Privacy

On December 21, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Risk, High Risk, Risk Assessments and Data Protection Impact Assessments under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations concerning the interpretation and implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions relating to risk and risk assessment, which will become applicable on May 25, 2018

Paper 49
article thumbnail

Redux: compromising Linux using. SNES Ricoh 5A22 processor opcodes?!

Scary Beasts Security

Overview TL;DR: full reliable 0day drive-by exploit against Fedora 25 + Google Chrome, by breaking out of Super Nintendo Entertainment System emulation via cascading side effects from a subtle and interesting emulation error. Very full details follow. [ UPDATE 13 Dec 2016 -- a couple of competent readers inform me that I've named the wrong processor!

IT 34