Remove 11
Remove 2009 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Useful-tech-only 11/11/2008 12:16 PM Reply to Flag The article doesnt say. It sounds good.

Paper 88
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Searching for definition | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0 What OS do you run?

Paper 40
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Binni Shah | @binitamshah.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. When assessing the risks, consider them as inter-related, not discrete. DT Capabilities.

article thumbnail

aiim-new-enterprise-20-report-explains

ChiefTech

©2005-2009. technologies to McAfees SLATES model, but while I see what they are trying to do I found myself questioning the analysis at this level. On the other hand, and you would expect this from an AIIM report, the introduction of issues about findability, control/distribution and security into the Enterprise 2.0

article thumbnail

DB2 Dispatch from Vegas: IOD, Day One

Robert's Db2

That's a 44X increase in 11 years. Is the growing pile of data in organizations' systems effectively managed today? DST has a large and very active (particularly from a data-change perspective) DB2 for z/OS database. terabytes of data. One of the tables in that database has 61 billion rows and holds 9.5