Has Microsoft blown it? Part II
Collaboration 2.0
JULY 28, 2015
I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices.
Collaboration 2.0
JULY 28, 2015
I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices.
John Battelle's Searchblog
JULY 16, 2015
The post NewCo Cincinnati Is Next Week. Here Are The Companies I’m Getting Inside appeared first on John Battelle's Search Blog. I know I rave about all the NewCo cities, but once again I am picking my companies from a new festival lineup – and once again, I’m blown away. Next week is NewCo Cincinnati , and wow – what a stellar group of companies to chose from.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Positively RIM
JULY 13, 2015
10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.
Hunton Privacy
JULY 31, 2015
Recent class actions filed against Facebook and Shutterfly are the first cases to test an Illinois law that requires consent before biometric information may be captured for commercial purposes. Although the cases focus on biometric capture activities primarily in the social-media realm, these cases and the Illinois law at issue have ramifications for any business that employs biometric-capture technology, including those who use it for security or sale-and-marketing purposes.
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Robert's Db2
JULY 31, 2015
So, I've seen something interesting lately in reviewing some DB2 for z/OS data sharing systems, and as is often the case in such situations, when I see something interesting I want to write about it. Thus this blog entry. Hope you find it to be useful. What has caught my eye recently in looking over DB2 data sharing configuration information? Big group buffer pool (GBP) directory to data entry ratios.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
JULY 28, 2015
I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices. In response to some of the comments and debate last week here are some further thoughts on my rationale.
CGI
JULY 29, 2015
Visualizing better healthcare. kathy.jacquay@…. Wed, 07/29/2015 - 05:20. Graphical displays of data have been with us since the 1700s, according to visualization guru Edward Tufte. People are visual creatures, so if we want to really understand a set of data, it’s of great value to be able to see points of comparison, say in a timeline, graph or diagram.
Productivity Bytes
JULY 27, 2015
There is one word that strikes fear into the heart of government agencies and firms engaged in dealings of a secretive and questionable nature. “Hacktivism” has inspired decentralized groups of hackers dedicated to routing out unlawful espionage, corporate greed and human rights violations wherever they occur. And sometimes other hackers are the target of such … + Read More.
Hunton Privacy
JULY 23, 2015
On July 1, 2015, Connecticut’s governor signed into law Public Act No. 15-142, An Act Improving Data Security and Agency Effectiveness (the “Act”), that (1) amends the state’s data breach notification law to require notice to affected individuals and the Connecticut Attorney General within 90 days of a security breach and expands the definition of personal information to include biometric data such as fingerprints, retina scans and voice prints; (2) affirmatively requires all businesses, includi
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Robert's Db2
JULY 9, 2015
About seven years ago, in an entry posted to the blog I maintained while working as an independent DB2 consultant (prior to rejoining IBM), I wrote of the evolution of DB2 for z/OS SQL from merely a data manipulation language to a programming language. That evolution continues with DB2 Version 11, in part through the introduction in that DB2 release of global variable functionality.
Positively RIM
JULY 16, 2015
On June 30 online , KM World published an article I wrote on Document-Level Redaction of Electronic Documents. While this is not everyone's cup of tea, it is an important tool for many RIMmers. [As it has fallen out of use a bit, I remind my gentle readers that RIM is an acronym for Records & Information Management.] The article can be found at [link].
Collaboration 2.0
JULY 22, 2015
Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.
CGI
JULY 29, 2015
Open Innovation 2.0 for future cities. ravi.kumarv@cgi.com. Wed, 07/29/2015 - 22:49. Open Innovation 2.0 (OI2.0) is a new paradigm where government, industry, academia and citizens work together to co-create the future and drive structural changes far beyond the scope of what any one organization or person could do alone. It is about sharing ideas, results and intellectual creativity to maximize economic and social impact.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
JKevinParker
JULY 8, 2015
On 7/8/2015, I was the featured speaker for an AIIM Webinar on Capture called "Everything you Always Wanted to Know About Capture into Process". View the presentation recording on the AIIM site , or browse the slide deck below. Everything you Always Wanted to Know About Capture into Process from AIIM Webinar Description Capture today is far more than scanning and mailroom automation; more than being a trigger for workflows and processes in the organization.
Hunton Privacy
JULY 17, 2015
On July 10, 2015, the United States House of Representatives passed the 21st Century Cures Act (the “Act”), which is intended to ease restrictions on the use and disclosure of protected health information (“PHI”) for research purposes. Currently, the HIPAA Privacy Rule permits the use and disclosure of PHI for research purposes without requiring authorization from an individual but does require that any waiver of the authorization requirement be approved by an institutional review board or a pri
Scary Beasts Security
JULY 26, 2015
I just released vsftpd-3.0.3, as noted on the vsftpd home page. It's actually been almost three years(!) since vsftpd-3.0.2, so things do seem to be getting very stable and calming down. The exception to things getting very stable and calming down seems to be SSL over FTP, which has been a constant source of, uh, joy, for some time now. Some issues fixed relate to security and warrant describing here because I think they are interesting.
Collaboration 2.0
JULY 22, 2015
Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Collaboration 2.0
JULY 22, 2015
Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.
Hunton Privacy
JULY 8, 2015
How do we focus on individuals and ensure meaningful control and the empowerment of individuals in the modern information age? What data privacy tools would drive empowerment in the digital world of today and tomorrow, perhaps more effectively and more nimbly than traditional individual consent? At a time when many countries are legislating or revising their data privacy laws and organizations are searching for best practices to embed in their business models, these questions are more relevant t
Hunton Privacy
JULY 15, 2015
On July 6, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published a draft of the country’s proposed Network Security Law (the “Draft Cybersecurity Law”). A public comment period on the Draft Cybersecurity Law is now open until August 5, 2015. At this point, the Draft Cybersecurity Law has not yet been finalized.
Hunton Privacy
JULY 15, 2015
On July 9, 2015, Hunton & Williams LLP hosted a webinar on the Proposed EU General Data Protection Regulation: Preparing for Change (Part 1). Hunton & Williams partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto moderated the session, which was led by speakers Bridget Treacy , managing partner of the firm’s London office; Wim Nauwelaerts, managing partner of the firm’s Brussels office; and Jörg Hladjk, counsel in the firm’s Brussels office.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Hunton Privacy
JULY 31, 2015
On July 27, 2015, Giovanni Buttarelli, the European Data Protection Supervisor (“EDPS”), published Opinion 3/2015 on the reform of Europe’s data protection laws, intended to “assist the participants in the trilogue in reaching the right consensus on time.” The Opinion sets out the EDPS’ vision for the regulation of data protection, re-stating the case for a framework that strengthens the rights of individuals and noting that “the time is now to safeguard individuals’ fundamental rights and freed
Hunton Privacy
JULY 27, 2015
On July 20, 2015, the United States Court of Appeals for the Seventh Circuit reversed a previous decision that dismissed a putative data breach class action against Neiman Marcus for lack of Article III standing. Remijas et al. v. Neiman Marcus Group, LLC , No. 14-3122. The litigation arose from a 2013 data breach in which approximately 350,000 customers’ cards were exposed.
Hunton Privacy
JULY 24, 2015
Hunton & Williams is pleased to announce its participation with the Global Legal Group in the publication of the second edition of the book The International Comparative Legal Guide to: Data Protection 2015. Members of the Hunton & Williams Global Privacy and Cybersecurity team prepared several chapters in the guide, including the opening chapter on “Legislative Change: Assessing the European Commission’s Proposal for a Data Protection Regulation,” and chapters on Belgium, China, France,
Hunton Privacy
JULY 21, 2015
On July 16, 2015, the Federal Energy Regulatory Commission (“FERC”) issued a new Notice of Proposed Rulemaking (“NOPR”) addressing the critical infrastructure protection (“CIP”) reliability standards. The NOPR proposes to accept with limited modifications seven updated CIP cybersecurity standards. The NOPR also proposes that new requirements be added to the CIP standards to protect supply chain vendors against evolving malware threats and addresses risks to utility communications networks.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
CGI
JULY 20, 2015
Les services partagés : un modèle efficace pour réaliser des économies et stimuler l’innovation. narmada.devarajan. Tue, 07/21/2015 - 01:29. Dans le secteur privé, les services partagés sont courants et généralement admis. Il convient même aux entreprises de très grande envergure d’utiliser des processus et systèmes administratifs uniques pour la facturation, l’approvisionnement, les ressources humaines, la formation et les finances ainsi que pour le soutien en matière de communications, de mark
Hunton Privacy
JULY 17, 2015
On July 14, 2015, pursuant to an implementation requirement of Government Regulation 82 of 2012, the Indonesian government published the Draft Regulation of the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems (“Proposed Regulation”). The Proposed Regulation addresses the protection of personal data collected by a variety of government agencies, enumerates the rights of those whose personal data is collected and the obligations of users of
Hunton Privacy
JULY 17, 2015
On July 10, 2015, the Federal Communications Commission (“FCC”) released a Declaratory Ruling and Order that provides guidance with respect to several sections of the Telephone Consumer Protection Act (“TCPA”). The Declaratory Ruling and Order responds to 21 separate requests from industry, government and others seeking clarifications regarding the TCPA and related FCC rules.
Let's personalize your content