article thumbnail

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. I am continuously amazed by how bad electronic voting machines are. Yes, they're computers. Now it's easy for a hacked machine to cheat undetectably!

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

We originally published an article addressing this question back in 2013, but some state agencies have wondered if the answer has changed since the administrative rules were updated this year. While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4),

Paper 40
article thumbnail

For Digital Transformation, You Need Content AI

AIIM

I'll point AIIM readers to my deck and retrace key points in this article. Of course, we've been digitizing content and delivering electronically -- and wrestling with metadata, search, information governance, and compliance -- for decades. New Training Course from AIIM: Practical AI for the Information Professional.

article thumbnail

My Love for What I Do: eDiscovery Love Story

eDiscovery Daily

Even back then, I wrote an article here or there. I once wrote an article about CAR systems back in the mid-80s – Computer Assisted (microfilm) Retrieval (good luck finding that article today) – and it seemed like the wave of the future back then. Of course, my true love is my wife Paige!

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Thanks to an article I came across last week, I now know that there was a recent ABA opinion on the topic. An article written by Anton Janik, Jr. An article written by Anton Janik, Jr. Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers!

article thumbnail

Cheating at Professional Poker

Schneier on Security

Of course it is! Could they contain a secret camera that reads electronic sensors on the cards? This isn't the first time someone has been accused of cheating because they are simply playing significantly better than computer simulations predict that even the best player would play. News article. It's so obvious!