December, 2016

article thumbnail

My (somewhat unreliable) data protection predictions for 2017

Data Protector

I’ve recently had a quiet year on the blogging front – my professional duties have prevented me from playing a more active role on the Internet during this year than I would have liked, but that is set to change in 2017. My professional work this year included acting as a specialist adviser to the Joint Parliamentary Committee on the Draft Investigatory Powers Act, one of the most significant pieces of legislation to be laid before Parliament for many years, to advising large (and some not so la

GDPR 120
article thumbnail

We Must Improve the HTTPS Message

PerezBox

HTTPS is as important today as it has ever been. If you are transferring sensitive data you should use HTTPS to encrypt data in transit, that is not up for. Read More. The post We Must Improve the HTTPS Message appeared first on PerezBox.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RISC-V assembly

Imperial Violet

RISC-V is a new, open instruction set. Fabrice Bellard wrote a Javascript emulator for it that boots Linux here ( more info ). I happen to have just gotten a physical chip that implements it too (one of these ) and what's cool is that you can get the source code to the chip on GitHub. The full, user-level instruction set is documented but there's a lot of information in there.

IT 66
article thumbnail

Article 29 Working Party Releases GDPR Implementation Guidance and Announces Privacy Shield Developments

Hunton Privacy

On December 15, 2016, the Article 29 Working Party (“Working Party”) issued a press release announcing its December 13, 2016, adoption and release of three sets of guidelines and FAQs on key implementation issues under the EU General Data Protection Regulation (“GDPR”): Guidelines and FAQs on the Right to Data Portability; Guidelines and FAQs on Data Protection Officers (DPO); and.

GDPR 68
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Culture change is the #1 challenge for transformation. What are utilities doing to address it?

CGI

Culture change is the #1 challenge for transformation. What are utilities doing to address it? shobana.lv@cgi.com. Tue, 12/20/2016 - 02:36. One of the biggest hurdles utilities face in embracing digital transformation is a resistance to change. For established organizations, adopting digital as an enterprise-wide business model is far more challenging compared to new market entrants that have a digital-first, customer-first mindset embedded in their organizational culture.

IT 61

More Trending

article thumbnail

Excited for the 2017 AIIM Conference

JKevinParker

I'm very excited for another AIIM Conference! AIIM17 will be held this March in Orlando. If you are an information professional, you will really benefit from attending the AIIM Conference. It is on my very short list of must-attend events in our profession. I have attended the past two AIIM Conferences and have loved every minute. This year I am teaching a pre-con course on Electronic Records Management (ERM).

article thumbnail

Vulture capitalists threaten Cognizant's continued digital evolution

Collaboration 2.0

With clients and new digital markets slow to scale up, activist investor pushes vision of more profits from legacy IT, may kill the golden goose

article thumbnail

Rogue One Sequel already being filmed!

Adam Shostack

There’s some really interesting leaked photos and analysis by Charles Goodman. “ Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoilers).

40
article thumbnail

SEC Charges Chinese Traders with Trading on Information Stolen from Law Firms

Hunton Privacy

On December 27, 2016, the Securities and Exchange Commission (“SEC”) announced charges against three Chinese traders who allegedly made almost $3 million in illegal profits by fraudulently trading on nonpublic information that had been hacked from two New York-based law firms. This is the first action in which the SEC has brought charges in connection with an incident involving hacking into a law firm’s computer network.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A consumer perspective on FinTech disruption (part 1)

CGI

A consumer perspective on FinTech disruption (part 1). shobana.lv@cgi.com. Thu, 12/22/2016 - 02:16. Today’s banks are facing a number of unprecedented challenges, including the rise in financial technology (FinTech) firms. These innovative startups are focused on taking a share of bank customers, products and revenues through new digital services, and staying ahead of them is high on banks’ agendas.

article thumbnail

Predictions 2016: How’d I Do?

John Battelle's Searchblog

The post Predictions 2016: How’d I Do? appeared first on John Battelle's Search Blog. At the beginning of each year I make predictions , and at year’s end, I hold myself to account. It’s kind of fun to look back and see how wrong (or right) my musings end up being. I’ll be writing my Predictions 2017 post this weekend (I think), and publishing it shortly thereafter.

IoT 40
article thumbnail

National Capitol Chapter of AIIM

JKevinParker

Earlier this year, I became the new President of the National Capitol Chapter of AIIM (NCC-AIIM). I have been a member of this group for the last several years, and I see a lot of potential for even greater impact in the Washington, D.C. region for Information Professionals. This group has a rich history and has some amazing professionals as members as well as past and current board members.

40
article thumbnail

Who do you love?

MIKE 2.0

An alien relying on TV for their knowledge of humanity might watch a few ads and assume our closest emotional relationships are with banks, utilities and retailers. After all, they all claim to be your best friend, look how many ads talk about “falling in love” with your service provider! It is popular to talk about the relationship between customers and the businesses that serve them.

Retail 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CSRA and RFID Global awarded $25.5M US Army Passive RFID contract

RFID Global Solution, Inc.

GovConExec. Posted By: Jay Clemens on: December 20, 2016. CSRA ‘s SRA International subsidiary has been awarded a five-year, $25.5 million contract to provide a common, integrated radio frequency identification system to the U.S. Army. The Defense Department said Monday that the Army will implement passive Radio Frequency Identification III technology to track, locate and identify commodities and assets.

IT 40
article thumbnail

FTC Announces Settlement Regarding Targeted Digital Advertising

Hunton Privacy

On December 20, 2016, the FTC announced that it has agreed to settle charges that Turn Inc. (“Turn”), a company that enables commercial brands and ad agencies to target digital advertising to consumers, tracked consumers online even after consumers took steps to opt out of tracking. In its complaint , the FTC alleged that Turn made various misrepresentations in its privacy policy, including that (1) blocking or limiting cookies would restrict Turn’s ability to track a consumer, and (2) consumers

Privacy 58
article thumbnail

Riding the blockchain wave in trade finance

CGI

Riding the blockchain wave in trade finance. ravi.kumarv@cgi.com. Mon, 12/12/2016 - 22:35. Trade finance, whether conducted on a domestic or international basis, can be a paper-intensive, costly and risk-laden proposition, involving not just companies importing and exporting goods and services but also their banks, insurers and others. The trading process can be time-consuming, error prone, vulnerable to fraud and susceptible to hacking.

article thumbnail

Seeing the Big Picture

Adam Shostack

This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Featured in Tech Leaders Today Podcast Episode

JKevinParker

I recently was interviewed for the new Tech Leaders Today podcast. In this episode, I talk with host Cassie Crossley about information strategy, architecture, and governance as the real requirements for IT solutions. We also discuss recruiting and developing talented people for Government Information Technology engagements. "Technology isn't the Real Solution with Kevin Parker" Listen to the podcast below, or check it out on the Tech Leaders Today website.

article thumbnail

My Latest Article Published at Today’s General Counsel

Getting Information Done

General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” . I coauthored the article with Doug Deems, General Counsel, The Claro Group. One of the biggest challenges posed by legal holds is getting compliance by the employees who are subject to it.

Paper 40
article thumbnail

HSBC wins Digital Preservation Initiative in Industry Award

Preservica

Recently the Preservica team had the pleasure of attending the prestigious Digital Preservation Awards (DPA) at the Wellcome Trust, London. The awards run by the Digital Preservation Coalition (DPC) are the most prominent celebration of achievement representing people and organisations who have made significant and innovative contributions to protecting the value of digital information.

article thumbnail

Privacy and Cybersecurity Law Deskbook Second Edition Released

Hunton Privacy

On December 6, 2016, Hunton & Williams announced the release of the second edition treatise Privacy and C ybersecurity Law Deskbook (Wolters Kluwer Legal & Regulatory U.S.) by lead author Lisa J. Sotto , head of the firm’s Global Privacy and Cybersecurity practice. The Deskbook has become an essential tool for those involved in managing privacy and cybersecurity law issues.

Privacy 53
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How can we meet the challenge of social care?

CGI

How can we meet the challenge of social care? ravi.kumarv@cgi.com. Tue, 12/13/2016 - 06:00. Caring for older and vulnerable citizens is one of greatest challenges facing societies in the prosperous western world today. . We all know the population is ageing but the rate of change can startle: the number of centenarians in the UK quadrupled in the last 30 years.

article thumbnail

Do Games Teach Security?

Adam Shostack

There’s a new paper from Mark Thompson and Hassan Takabi of the University of North Texas. The title captures the question: Effectiveness Of Using Card Games To Teach Threat Modeling For Secure Web Application Developments. Gamification of classroom assignments and online tools has grown significantly in recent years. There have been a number of card games designed for teaching various cybersecurity concepts.

article thumbnail

Private Right of Action under CASL coming July 2017

Privacy and Cybersecurity Law

Canada’s Anti-Spam Law came into force on July 1, 2014. Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission […].

article thumbnail

[1day] [PoC with $rip] Deterministic Linux heap grooming with huge allocations

Scary Beasts Security

Overview In a previous blog post, I disclosed CESA-2016-0002 , an 0day vulnerability (without exploit) in the vmnc decoder of the gstreamer media subsystem, which is installed by default in Fedora. Because a Fedora fix was somewhat slow in coming, I decided to attempt to exploit this vulnerability. This would have to be another scriptless vulnerability.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

In Praise of the Invisible DB2 for z/OS System

Robert's Db2

I've been working with DB2 for z/OS -- as an IBMer, as a user, as an independent consultant -- for 30 years. I was with IBM when DB2 was introduced to the market. I've met people who were part of the core team at IBM that invented relational database technology. I was privileged to serve for a year as president of the International DB2 Users Group. DB2 has been very good to me, and the work I do as a DB2 for z/OS specialist I do with commitment and passion.

article thumbnail

CIPL Issues White Paper on High Risk and DPIAs under the GDPR

Hunton Privacy

On December 21, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Risk, High Risk, Risk Assessments and Data Protection Impact Assessments under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations concerning the interpretation and implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions relating to risk and risk assessment, which will become applicable on May 25, 2018

Paper 49
article thumbnail

Best practices for verifying SaaS security

CGI

Vérification de la sécurité du logiciel service – Meilleures pratiques. shobana.lv@cgi.com. Fri, 12/02/2016 - 03:47. Le logiciel service (SaaS) est un modèle de prestation de services très prisé pour accroître l’efficacité des services en TI axés sur les activités opérationnelles. La facilité de mise en œuvre et les faibles coûts en TI des modèles de paiement à l’utilisation se sont avérés très attrayants pour les entreprises désireuses de bénéficier d’applications modernes sans devoir faire d’i