Software is eating innovation: How trapped is your company?
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Hunton Privacy
APRIL 14, 2016
On April 14, 2016, after four years of drafting and negotiations, the long awaited EU General Data Protection Regulation (“GDPR”) has been adopted at the EU level. Following the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs’ vote earlier this week and the EU Parliament in plenary session, the GDPR is now officially EU law and will directly apply in all EU countries, replacing EU and national data protection legislation.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Attensa
APRIL 22, 2016
It started with a simple question posed by a senior marketing exec during a staff meeting. B lindsided a couple of times in the course of a month by information related to market events that that should have known, the exec went on to ask: “If the President of the United States can get a daily briefing on the state of the world, why can’t we get one on our own company?
John Battelle's Searchblog
APRIL 18, 2016
The post Wow. The People look like ants. appeared first on John Battelle's Search Blog. The post Wow. The People look like ants. appeared first on John Battelle's Search Blog.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Robert's Db2
APRIL 29, 2016
19, 19, 23, 26. Know what these numbers have in common? They indicate the number of 4K buffer pools allocated for four different production DB2 for z/OS subsystems that I analyzed over the past couple of years. I believe that there are quite a few sites where a plethora of 4K buffer pools have been defined for a given DB2 subsystem. That's not illegal or anything (DB2 allows you to have as many as 50 different 4K pools for a single subsystem), but it does make the task of managing and monitoring
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Hunton Privacy
APRIL 19, 2016
With the recent adoption of the EU General Data Protection Regulation (“GDPR”) and the significant changes it will require from organizations, AvePoint has joined forces with the Centre for Information Policy Leadership (“CIPL”), a global privacy policy think tank at Hunton & Williams LLP, to launch the first global survey to benchmark organizations’ readiness for the GDPR.
PerezBox
APRIL 23, 2016
You will undoubtedly undervalue your product or services, and your pricing will be wrong; this I am sure of. It will be echoed by every seasoned business person, professional coach, and everyone. Read More. The post Accounting for the Pricing Journey appeared first on PerezBox.
John Battelle's Searchblog
APRIL 19, 2016
The post Where I’ll Be For NewCo Boston April 26-7 – Come Join Me! appeared first on John Battelle's Search Blog. The first ever NewCo Boston goes off in less than two weeks, and I’ve been studying the schedule and making my picks for the companies I most want to visit. The lineup is insanely great – Boston is brimming with innovative NewCos, 79 of which will open their doors on April 27th.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
JKevinParker
APRIL 30, 2016
I was interviewed by Judith Lamont, Ph.D. for a piece she wrote in KMWorld Magazine. The article is called " Evolving data issues challenge RM approaches ". For my contributions, I spoke about issues with the growing volumes of big data and how business and IT often have different priorities—if they've even thought about the implications of structured data on records management.
Elie
APRIL 3, 2016
This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.
CGI
APRIL 28, 2016
How collaboration and data sharing will help enable effective devolution. p.butler@cgi.com. Thu, 04/28/2016 - 06:22. Table. George Osborne’s March 16 th Budget upheld the Government’s previously announced drive to devolve powers to local authorities. Termed “a devolution revolution” in the Budget document, the Chancellor stated that, “this government is delivering on its commitments to transfer powers to each of the devolved administrations.”. .
Hunton Privacy
APRIL 19, 2016
On April 12, 2016, the French Data Protection Authority (“CNIL”) announced that it will participate in a coordinated online audit to analyze the impact of everyday connected devices on privacy. The audit will be coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection authorities (“DPAs”) from around the world.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Preservica
APRIL 18, 2016
Last week I had the pleasure of taking part in our Global User Group Meeting and spending time with over fifty Preservica Users in Oxford – our biggest event to date! Having studied and lived in Oxford for many year’s it’s easy to take for granted the beautiful surroundings that the city has to offer. To ensure everyone had the best experience possible we held this year’s meeting at Queens College, steeped in history and with an enviable archive and library of its own it was the perfect location
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
JKevinParker
APRIL 23, 2016
The following is an excerpt from a post I published on the AIIM blog called " Solution Success Means User Adoption ". Of all the measures of success for information management solution implementations, there is one critical success factor that stands above the rest: user adoption. In other words, your solution is only successful if it is actually used by the people in your organization.
Shoreline Records Management
APRIL 18, 2016
As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
CGI
APRIL 25, 2016
Future Cities – Is it time to dream big? p.butler@cgi.com. Tue, 04/26/2016 - 00:25. I found a business quote the other day from Victoria Beckham, yes the former Spice Girl that has created a £30m+ clothing business, where she said that 'if you can get your head around your dream, then your dream isn't big enough'. Table. I hadn't given the quote much thought until discussing my ' the whole is more than the sum of its parts ' blog with a client and the size of the challenge facing cities as they
Hunton Privacy
APRIL 15, 2016
As reported on the Hunton Insurance Recovery Blog , data breach claims involving customer data can present an ever-increasing risk for companies across all industries. A recent case illustrates efforts to recover the costs associated with such claims. A panel of the Fourth Circuit confirmed that general liability policies can afford coverage for cyber-related liabilities, and ruled that an insurer had to pay attorneys’ fees to defend the policyholder in class action litigation in Travelers Indem
Preservica
APRIL 5, 2016
Learn why you may need one in IGI’s interview with Preservica’s Mike Quinn. Recently, the IGI caught up with Mike Quinn, Commercial Director at Preservica, one of the newest IGI Supporters, to find out more about what organizations can do to better protect their valuable digital assets to ensure that it is both preserved and accessible in the future. read the full blog here.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
JKevinParker
APRIL 23, 2016
AIIM published a great ebook on Digital Transformation as a preview to the 2016 AIIM Conference. A great group of industry experts contributed their thoughts to this important topic, including me. The following were my contributions to two of the rules: RULE #11 - IF YOU CAN'T MEASURE IT - DON'T DO IT. Kevin Parker, NEOSTEK: "Use an IM maturity model and assessment (like the one from MIKE2.0 or NARA's RIM Maturity Model).
Shoreline Records Management
APRIL 17, 2016
As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.
CGI
APRIL 22, 2016
Is utopia achievable in digital customer experience? shobana.lv@cgi.com. Fri, 04/22/2016 - 05:30. I attended last week’s T-E-N (The Executive Network) Summit in central London on ‘The Customer Journey – Multichannel Customer Engagement. As a speaker at the event, I had an opportunity to speak to a broad audience of senior practitioners on their programmes and initiatives in digital customer engagement – there were some interesting recurring themes.
Hunton Privacy
APRIL 13, 2016
On April 13, 2016, the Article 29 Working Party (the “Working Party”) published its Opinion on the EU-U.S. Privacy Shield (the “ Privacy Shield ”) draft adequacy decision. The Privacy Shield was created to replace the previous Safe Harbor framework invalidated by the Court of Justice of the European Union (“CJEU”) in the Schrems decision. The Working Party also published a Working Document on the justification for interferences with the fundamental rights to privacy and data protection through s
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
Hunton Privacy
APRIL 27, 2016
The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) recently announced resolution agreements with Raleigh Orthopaedic Clinic, P.A., (“Raleigh Orthopaedic”) and New York-Presbyterian Hospital (“NYP”) for HIPAA Privacy Rule violations. Raleigh Orthopaedic. Following a breach notification report from Raleigh Orthopaedic in April 2013, OCR investigated and discovered that Raleigh Orthopaedic had improperly disclosed protected health information (“PHI”) to a third-party
Hunton Privacy
APRIL 12, 2016
On March 30 through April 1, 2016, the 2016 Nuclear Industry Summit meetings took place in Washington D.C. In the nuclear industry, the issue of cybersecurity has grown steadily in importance over the past decade. This has been most apparent in the increasing attention and effort paid to cyber-based threats under the biennial Nuclear Industry Summit and its international meetings.
Hunton Privacy
APRIL 1, 2016
On March 24, 2016, Tennessee Governor Bill Haslam signed into law S.B. 2005 , as amended by Amendment No. 1 to S.B. 2005 (the “Bill”), which makes a number of changes to the state’s data breach notification statute, Tenn. Code § 47-18-2107. The amendments take effect on July 1, 2016. The Bill: Requires businesses and state agencies to notify affected individuals “immediately, but no later than 45 days from the discovery or notification of the breach, unless a longer period of time is required du
Let's personalize your content