Remove Case Study Remove Cloud Remove Examples Remove Libraries
article thumbnail

Deploying applications built in external CI through IBM Cloud DevSecOps

IBM Big Data Hub

IBM Cloud for Financial Services This is where IBM Cloud for Financial Services shines—it helps clients to fill that gap by supporting innovation while guaranteeing security and compliance. The goal of IBM Cloud for Financial Services is to provide security and compliance for financial services companies.

Cloud 77
article thumbnail

The Future of RegTech for AI Governance

IBM Big Data Hub

Examples of RegTech include chatbots that can advise on regulatory questions, cloud-based platforms for regulatory and compliance data management, and computer code that enables more automated processing of data relating to regulations [9]. Case studies on OpenPages: Using RegTech for AI governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records Conference 2018: Call for Presentations

The Texas Record

From governance initiatives to cloud, here is an opportunity to share your solutions, best practices, challenges and lessons learned to help other Texas state and local governments. This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored by the Texas Department of Information Resources (DIR).

article thumbnail

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Jennifer Weintraub began the session by introducing the panelists and highlighting some of its major themes and points: “Controversial material” : Weintraub defined “controversial material” broadly–”it depends”– and noted that the Schlesinger Library, along with many other institutions, already collect this kind of content.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

This article dives into the lexicon of malware, offering descriptions, protections, and examples of each. Examples of Adware Malware Attacks. While there are hundreds of adware versions, some of the most common examples include Fireball, Appearch, DollarRevenue, Gator, and DeskAd. Examples of Backdoor Malware Attacks.

Phishing 104
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Take for example, that German candy, Gummy Bears. Vamosi: What Iain’s talking about is that when you step up to an ATM, for example, the bank can … Paterson: But by and large, Justin really nailed it and biometric really is the human side of it. For example, what of us is measurable by a machine?