Remove category general
article thumbnail

This is the old ChiefTech blog.: The Trouble with LinkedIn Answers

ChiefTech

Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Using LinkedIn is pretty much event drive - e.g. adding someone to your network, responding to an invitation, finding someone, etc. One solution might be to introduce user tagging, along side their formal categories.

Paper 40
article thumbnail

FRANCE: ONE MORE STEP TO ENSURE CONSISTENCY OF THE NEW FRENCH DATA PROTECTION LAW

DLA Piper Privacy Matters

On 12 December 2018, the French Government issued an ordinance [1] finalizing, at the legislative level [2] , the alignment of the French Data Protection Law (“FDPL”) with the General Data Protection Regulation [3] (“GDPR”) and the Directive 2016/680 [4]. Following-up the adoption of the GDPR, the French Law No.

GDPR 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Saving E2.0's Soul

ChiefTech

Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Tools emerging under the category of social software are benefiting from common application, infrastructure and network services that were not mature in the eighties and nineties. This is the old ChiefTech blog. ©2005-2009.

article thumbnail

Information Architecture for Audio: Doing It Right - Boxes and Arrows: The design behind the design

ChiefTech

Boxes And Arrows : The Design Behind the Design Register or Log In Search Stories Ideas Forums People Events Jobs About December Issue, 2008 Jens Jacobsen 32 Reputation points Jens likes writing for multimedia and loves tracking down usability issues. He founded the company “ Content Crew ” in 2006, and is its CEO since this time.

article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. The IBM Security QRadar Security Information and Event Management is an enterprise favorite that’s adapted with the evolution of the SIEM market.

Analytics 113
article thumbnail

Documentation Theory for Information Governance

ARMA International

It is important to note that this article does not claim that a documentary focus is a major departure from conventional scholarly or professional approaches to information governance, or even to information generally. x] Marc Kosciejew, “Documentation and the Information of Art,” Tate Papers 29, Spring 2008, [link]. 2017: 96-111. [ix]

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. L119/1), [link]. Code § 1798.100. Clute , 1 F.R.D.

Privacy 97