Remove 10
Remove 2009 Remove Access Remove Analysis Remove Computer and Electronics
article thumbnail

This is the old ChiefTech blog.: Social Data Analysis. But what about compliance?

ChiefTech

©2005-2009. Wednesday, 24 January 2007 Social Data Analysis. Its also interesting to consider with these social data analysis tools that not only are they making data analysis "social", but I can also see tools like begin to challenge our concept of a basic information unit like a "document". But in a Web 2.0

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? 3 As a result, an emerging consensus of courts and commentators has concluded that privacy interests may — and indeed, should — be considered as part of the proportionality analysis required under Rule 26(b)(1).

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. The intent of this analysis is to link the scope and the CSFs with the use cases into a succinct narrative describing the new DT capabilities to deliver products and services. DT Capabilities. 2020, p 6).

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. Dave Kennedy started as forensic analysis and cyber warfare specialist in the US Marine Corps before entering the enterprise space. — Jack Daniel (@jack_daniel) October 10, 2018. Dave Kennedy | @hackingdave.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And now it was like how can I contribute back to Tibet and put material out and help other people maybe join in the same way I did by not traditional means like, it wasn't really college or anything that got me into electronics.