This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Like so many others, I have lots of nice things to say about last week’s AIIM17 conference in Orlando, FL. Energy levels were high, sessions were engaging, exhibitors seemed happy, and a good time was had by all. However, rather than write yet another trip report on the subject (links to some are listed below), […]. The post View From AIIM17: New Blood or Fresh Meat?
Concern has been mounting that the attitude the Information Commissioner’s Office is currently taking towards charities will result in it becoming even harder to raise funds from supporters and potential supporters. New guidance about how charities should obtain consent to contact supporters, and how this consent should be used, has recently been published by both the ICO and the Fundraising Regulator.
On March 15, 2017, the French data protection authority (the “CNIL”) published a six step methodology and tools for businesses to prepare for the EU General Data Protection Regulation (“GDPR”) that will become applicable on May 25, 2018. The six steps are summarized below. Step 1: Appointing a Data Protection Officer (“DPO”) or “Pilot”. The CNIL’s methodology first stresses the need for organizations to appoint a leader to pilot governance of data protection within their structure.
What is smart? Some communities are finding out. harini.kottees…. Wed, 03/22/2017 - 07:00. Today, many affiliate the word “smart” with technology – smart phones, smart TVs, smart homes, etc. - but is infusing the latest technology in all aspects of life necessarily the smart thing to do? Not always. What is smart is to understand what your highest priorities are and invest in those areas to make improvements that produce maximum results.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Google is king when it comes to interoperability and extending the functionality of the web. But now those perceived benefits could be impacting our IoT security. Recently Google developed and supported two new HTML APIs that while work towards their goals, also have the ability to make the web less safe. Compound the APIs with existing security flaws of IoT devices and we could have a big problem on our hands.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Think of why you run the DB2 for z/OS REORG utility, and a number of reasons are likely to come quickly to mind: to restore row order per a table's clustering key; to reestablish free space (for inserts and/or for updates ); to remove the AREO* status set for a table space following (for example) an ALTER TABLE ADD COLUMN operation; or to materialize a pending DDL change such as an enlargement of a table space's DSSIZE.
George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). After some recent gloom and doom posts about future challenges to the profession and fact denial and fake news , it’s probably time to take a slightly more glass half-full perspective of our job.
China’s new Cybersecurity Law will impose new restrictions on information flows from operators of key information infrastructure, and will become effective in June 2017. Hunton & Williams LLP will host a webinar on China’s New Cybersecurity Law on March 7, 2017, at 12:00 p.m. EST.
Darwin’s advice to the energy sector: get agile! shobana.lv@cgi.com. Thu, 03/30/2017 - 07:00. What does Charles Darwin have to do with digital transformation in the energy sector? More than you might think. Darwin’s theory—that it isn’t the strongest of the species that survives, but the ones most responsive to change—can point the way for utilities to move faster toward a sustainable energy system.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Hospital administrators read the news. They know that their industry is the most popular target for hackers by a huge margin. Therefore, many hospitals are upgrading their defenses—but it doesn't seem to be working.
AIIM 2017 State of Information Management. For purposes of context for our survey, we positioned digital transformation as the concept of being paperless, using multi-channel inbound capture, and the impact digital transformation will have on individuals, business organizations, and operational processes. What we found is that there is progressive movement, albeit not the hockey stick inclination everyone hopes for, but movement nonetheless.
In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.
Read my reflections on the 2017 AIIM Conference on LinkedIn Pulse: Intelligent Information Management and AIIM17. In that post, I also link to others' reflections on AIIM17.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
On March 17, 2017, retailer Neiman Marcus agreed to pay $1.6 million as part of a proposed settlement (the “Settlement”) to a consumer class action lawsuit stemming from a 2013 data breach that allegedly compromised the credit card data of approximately 350,000 customers. The consumer plaintiffs sued Neiman Marcus in March 2014, alleging that the company failed to protect customers’ privacy and waited 28 days to inform affected customers of the breach.
Architecting in a digital world: Anticipating and accommodating change. shobana.lv@cgi.com. Tue, 03/21/2017 - 02:49. Digital transformation success requires anticipating and accommodating change in every area of the organization, including the architecting of IT solutions that run the business and drive digitalization. In fact, evolution is part of the definition of architecture in the ISO/IEC 42010:2011 standard.
In transmitting and storing critical patient data, wireless devices are integral to the response time (and often the resulting quality of care) offered by our healthcare systems. However, thanks largely in part to government acts like the. Health Insurance Portability and Accountability Act (HIPAA) (1) and. Health Information Technology for Economic and Clinical Health (HITECH) Act (2) have increasingly been prodding healthcare providers to adopt more and more technology in order to fully comply
The post It’s Time For Facebook to Start Making Media appeared first on John Battelle's Search Blog. There’s only one company that can possibly spin media gold on Facebook. And that’s Facebook. Round and round and round goes the debate — Facebook’s not a media company , Facebook’s not a traditional media company , Facebook’s a new kind of media company.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.
Today my first CMSWire article was published: Why You Need a Unified Information Strategy. Information is one of the most important business assets, yet organizations continue to struggle with growing information chaos. Even with continuing advances in technology, buying more tech is not solving the problem. Yes, technology is part of the solution, but to get it right, you must get your information strategy right.
Hunton & Williams LLP, in coordination with the U.S. Chamber of Commerce, recently issued a series of recommendations to enhance the effectiveness of data privacy regulators. The report, Seeking Solutions: Attributes of Effective Data Protection Authorities , identifies seven key attributes of data protection authorities (“DPAs”) that contribute to effective data protection governance.
Making instant payments pay. harini.kottees…. Fri, 03/17/2017 - 08:00. In the UK, instant payments went live on May 27, 2008, some nine years ago. As a service brought about by regulation and the government’s desire to improve the efficiency of the country’s payment systems, little attention was paid to its potential uses and impact on the market. Standing orders (a UK payment instruction to make regular fixed transfers to a beneficiary) were converted at launch, but overall take up was gradual,
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Few records managers work solo. Nor should they. Today’s RIM requires expertise and contributions from a variety of disciplines beyond the scope and/or capabilities of any one person. Not many RIMmers are technologically super-savvy, and few techies understand RIM.
Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence.
Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity Blog.
At the annual AIIM Conference , I was honored with the 2017 AIIM Leadership Award for Community Engagement. This is the second year AIIM has given Leadership Awards, and it is the second year that I received one. I also nominated a couple of this year's recipients. From the press release : "The AIIM Leadership Award recognizes individuals whose outstanding leadership within our community goes above and beyond to benefit the advancement of the information management industry and AIIM.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On March 28, 2017, the French Data Protection Authority (“CNIL”) published its Annual Activity Report for 2016 (the “Report”) and released its annual inspection program for 2017. The Report presents the main accomplishments in 2016 and highlights the diversified activity at both the national and EU level with the adoption of two major pieces of legislation, namely: The EU General Data Protection Regulation (“GDPR”), which imposes new accountability obligations, including the obligation to (1) k
Leave the “running” of cybersecurity to trusted partners to focus on digital transformation. harini.kottees…. Wed, 03/08/2017 - 08:00. My previous blog discussed how the path to greater cybersecurity maturity requires viewing security as more than just mandatory to running the business, but also as a key enabler of change and growth. This blog continues our cybersecurity insights from the CGI Global 1000 outlook , drawn from in-person conversations with 1,000 senior business and technology leade
Blockchain & ECM. Blockchain in some ways defeats the point of centralized records management but the likelihood is that more specialized applications will be adding this kind of functionality to their systems. Potentially disrupting the traditional approach to RIM. The More Things Change – ECM Isn’t Really Dead. ECM is not a technology, methodology, or process.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content