April, 2017

article thumbnail

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are! What aren’t everlasting though, are the so-called information governance “technologies” we use to bring these matters to heel. In recent decades, we have cycled through imaging, document […].

article thumbnail

DXC Technology: Relevant partner or the Sears of IT services?

Collaboration 2.0

A huge opportunity to provide large-scale business innovation with smart strategies and effective execution is tempered by strong competition, legacy perceptions, and a ticking clock to successfully demonstrate relevance and effectiveness.

IT 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Israel Passes Comprehensive Data Security and Breach Notification Regulations

Hunton Privacy

Haim Ravia and Dotan Hammer of Pearl Cohen Zedek Latzer Baratz recently published an article outlining Israel’s new Protection of Privacy Regulations (“Regulations”), passed by the Knesset on March 21, 2017. The Regulations will impose mandatory comprehensive data security and breach notification requirements on anyone who owns, manages or maintains a database containing personal data in Israel.

article thumbnail

A Chapter Ends. A New One Begins.

PerezBox

This chapter in my life began March of 2011. I was invited to join the team by Dre and Daniel. Coincidently, it ended on the month that I officially hit 6. Read More. The post A Chapter Ends. A New One Begins. appeared first on PerezBox.

IT 68
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

IoT Vigilantes Act Before Washington

Outpost24

NTIA Meets on IoT Security as Vigilantes Take Action. Today in Washington, the National Telecommunications and Information Administration will hold its third meeting to discuss Internet of Things (IoT) Security Upgradability and Patching. We’ll be watching the conversation to see if the stakeholders panel has any progress to report. We are seeing that the threats from competing strains of malware coupled with limited patching capabilities by vendors is making the danger posed by unsecured IoT pr

IoT 66

More Trending

article thumbnail

Reimagining Information Governance with Blockchain

Weissman's World

A Discussion Paper Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) Statement of Purpose This discussion paper provides an overview of how future information governance (IG) platforms may be envisaged and built utilizing blockchain – perhaps the key point being that all the technologies necessary to do so are already available.

article thumbnail

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

Cybersecurity is a strategic priority for most organizations. With recent high-profile breach incidents, including Home Depot, Target, and Sony, many companies are asking themselves, “Will I be next?” The answer is “yes,” based on the number of widespread and increasingly advanced attacks. Some of these data breaches are not only a result of internal malicious acts but also unintentional mistakes by employees.

article thumbnail

German DPA Publishes English Translation of Standard Data Protection Model

Hunton Privacy

On April 13, 2017, the North Rhine-Westphalia State Commissioner for Data Protection and Freedom of Information published an English translation of the draft Standard Data Protection Model (“SDM”). The SDM was adopted in November 2016 at the Conference of the Federal and State Data Protection Commissioners. . German data protection authorities (“DPAs”) are currently reviewing the SDM, and the final version is expected to be published later this year.

GDPR 65
article thumbnail

Chief Data Officers: Who needs them?

CGI

Chief Data Officers: Who needs them? shobana.lv@cgi.com. Tue, 04/25/2017 - 07:15. As data assets grow larger and more valuable in our digital world, managing data is also becoming more complex. As a result, two of the top governance challenges facing organizations today are how best to manage the use and value of data assets, and who is best suited to take those responsibilities.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

DB2 for z/OS: Something You Might Not Know About Large Page Frames in a Post-DB2 10 Environment

Robert's Db2

I well remember the first time I saw it. August, 2016. I was looking at output from the DB2 for z/OS command -DISPLAY BUFFERPOOL(ACTIVE) DETAIL, issued on a DB2 11 system, that a client had sent to me for review. I appreciated the fact that I could see in this command output information about DB2's use of large real storage page frames for page-fixed buffer pools (in a DB2 10 environment, one had to issue -DISPLAY BUFFERPOOL -- for an individual pool, versus for all active pools -- with an odd s

IT 48
article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

GDPR 52
article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Battery Backup PSA

Roger's Information Security

One of the better things you can do to protect your money spent on electronics devices is have a good surge protector and battery backup. If you’re like me, you only buy the kind where you can disable the audible alarms. The problem with this is now you might not get any warning if the battery goes bad. In some cases you’ll have the battery backup connected to a computer via USB and receive notices that way.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Working Party Adopts Revised Guidelines on Data Portability, DPOs and Lead SA

Hunton Privacy

On April 5, 2017, the Article 29 Working Party (“Working Party”) adopted the final versions of its guidelines (the “Guidelines”) on the right to data portability, Data Protection Officers (“DPOs”) and Lead Supervisory Authority (“SA”), which were first published for comment in December 2016. The final publication of these revised guidelines follows the public consultation which ended in February 2017.

article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

Office 365 Listens: UX Improvement

JKevinParker

Earlier this month I complained here about how Outlook online in Office 365 had a weird option to "Empty Folder" and what a huge UX fail that was. I am here to report that Microsoft and Office 365 listened and made it better! Now instead of "Empty folder" (which was very confusing and did not even have a confirmation, cancellation, or undo), the option says "Delete all".

IT 40
article thumbnail

Bridging the Gap between RIM and IT

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Last month, we talked about how to get on the same page as your Legal colleagues. The euphemism was to make an attorney your “new best friend.” I hope you have been successful, with both of you now singing Randy Newman’s “You’ve Got a Friend in Me”.

IT 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Opportunities for driving client satisfaction in transaction banking

CGI

Opportunities for driving client satisfaction in transaction banking. harini.kottees…. Wed, 04/26/2017 - 05:00. Over the past year, transaction banks have faced declining client satisfaction rates, largely as a result of changing market dynamics, including digitalization and its impact on client expectations. Leading banks are responding by investing in digital strategies and solutions to improve the client experience and win more business.

article thumbnail

Subscription models and the IoT – HP Instant Ink

Information Matters

HP’s Instant Ink service offers some lessons for companies exploring what the IoT might mean for their business models. The key benefits which HP is getting from Instant Ink are: • Direct relationships with customers, bypassing retailers and getting customer names, addresses and billing details; • Monthly recurring revenue streams allowing more predictable and stable […].

IoT 40
article thumbnail

CIPL Issues Discussion Paper on GDPR Certifications

Hunton Privacy

On April 12, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a discussion paper on Certifications, Seals and Marks under the GDPR and Their Roles as Accountability Tools and Cross-Border Data Transfer Mechanisms (the “Discussion Paper”). The Discussion Paper sets forth recommendations concerning the implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions on the development and use of certification mechanisms.

Paper 60
article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Product Innovation, User Experience and the Future of Digital Preservation: Preservica Global User Group 2017

Preservica

Last week I was privileged enough to be a part of Preservica’s Global User Group Meeting, taking place this year at the stunning venue of Magdalen College, Oxford, UK. The event was open to all Preservica users and comprised two full days of presentations, interactive workshops and discussion. It was wonderful to meet with more than 70 of our customers who travelled from across the globe to be there.

article thumbnail

Pick Up the Phone and Call.

John Battelle's Searchblog

The post Pick Up the Phone and Call. appeared first on John Battelle's Search Blog. (cross posted from NewCo Shift ). People in business who like to Get S**t Done fall in love with each version of The New. When I was a kid, new was the the Apple II. Then the IBM PC, digital phones and voice mail, the Mac — oh God, the Mac! — word processing, email, the cell phone, the Internet — mmmmm, the Internet!

article thumbnail

Know your community: Critical components of a digital strategy roadmap

CGI

Know your community: Critical components of a digital strategy roadmap. harini.kottees…. Tue, 04/25/2017 - 07:00. As communities across the U.S. continue to embrace the concept of incorporating “smart” initiatives, many have hired experts to fill new positions like Chief Innovation Officers, Chief Digital Officers or even Smart Cities Officers. These individuals are responsible for developing the strategy to raise the digital profile of the community and recruit the area’s next-generation workfo

article thumbnail

Empty Folder Option for Inbox in Office 365 Mail? Really?!

JKevinParker

So my CEO calls me and says she needs help—she has somehow sent her entire email inbox contents to the trash, and she can't stop it. I should be clear here that this CEO is very intelligent as both an award-winning business owner and a computer science whiz. In other words, she is far from your average email user. So what happened?! I rushed to her office to help.

IT 40
article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Privacy Compliance Company Agrees to a Settlement with the New York Attorney General

Hunton Privacy

On April 6, 2017, New York Attorney General Eric T. Schneiderman announced that privacy compliance company TRUSTe, Inc., agreed to settle allegations that it failed to properly verify that customer websites aimed at children did not run third-party software to track users. According to Attorney General Schneiderman, the enforcement action taken by the NY AG is the first to target a privacy compliance company over children’s privacy.

article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

New Mexico Enacts Data Breach Notification Law

Hunton Privacy

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South Dakota as the two remaining states without such requirements. The Data Breach Notification Act (H.B. 15) goes into effect on June 16, 2017. Key Provisions of New Mexico’s Data Breach Notification Act: The definition of “personal identifying information” includes biometric data , defined as an individual’s “fingerprints, voice print, iris or retina patterns, facial characteristics