Remove 12
article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. In 2015, construction began on a dedicated facility located a 12-acre business incubator campus, called the Velocity Collaboration Center , in Sterling Heights, a Detroit suburb. They answered, yes. Shoring up weak links.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

Twelve years of making predictions doesn’t make writing them any easier, regardless of my relatively good showing in 2015. And given that more than 125,000 of you read my post summarizing how I did in 2015 (thanks Medium and LinkedIn!), Ouch, 2015 was not kind to Twitter, especially if you were a stockholder.

IoT 75
article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Still, this has been a useful exercise to understand not just how the various entities relate to each other, but also because it shows that the scope of this issue isn't just constrained to kids, it affects the elderly too.

Passwords 111