article thumbnail

IDEA 2008: An Interview with Andrew Hinton

ChiefTech

As IDEA 2008 draws closer, the IA Institute is conducting a series of interviews with the speakers for the conference. As Event Coordinator for IDEA , I fill a variety of roles, including the Interviewer of IDEA Presenters (which I proudly share with Liz Danzico). Even just going to conferences has been very helpful though.

article thumbnail

This is the old ChiefTech blog.: Integrating Enterprise 2.0 into your corporate Intranet - 20th September

ChiefTech

Hi James, Ditto would love to come - will you be posting your presentation in your blog after the event? You might like to suggest to Key Forums that an electronic copy of the conference brochure (listing speakers and topics) on their website would have been a good idea instead of the e-mail link to request a conference brochure!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Malware, a combination of the terms ‘malicious’ and ‘software,’ includes all malicious programs that intend to exploit computer devices or entire network infrastructures to extract victim’s data, disrupt business operations, or simply, cause chaos. Unfortunately, this could be your computer trying to give away the presence of malware.

article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Conference September 3-5 By Oliver Marks | July 31, 2008, 1:55pm PDT Summary I’ve attended every Office 2.0 Plug a keyboard and mouse into a PS3 and you have a pretty good cloud computing home workstation - we had the session schedule up and running in this format. DonnieBoy 07/31/2008 08:22 PM Reply to Flag RE: Office 2.0

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample. any designated tangible things.”36 For example, in John B.

Privacy 97
article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Apple founder Steve Wozniak interview, answers your Tweeted questions By Oliver Marks | July 10, 2008, 9:08pm PDT Summary At the San Francisco Social Networking Conference today, Steve Wozniak, Apple co founder and personal computer legend, shared some fascinating insights into the modern world of social networking and mobile phones.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. As is true with any cloud service, the Seattle cloud computing company emphasizes the shared responsibility model. Out of Palo Alto, California, Cloudera started in 2008 by alumni of Google, Yahoo!, Alibaba Cloud.

Security 106