article thumbnail

UK government’s response to AI White Paper consultation: next steps for implementing the principles

Data Protection Report

The authors acknowledge the assistance of Salma Khatab, paralegal, in researching and preparing some aspects of this blog The UK Department for Science, Innovation, and Technology (DSIT) has published its response to its consultation on its white paper, ‘A pro innovation approach to AI regulation ’ (the Response).

Paper 63
article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

An early case study of BPR was Ford Motor Company, which successfully implemented reengineering efforts in the 1990s to streamline its manufacturing processes and improve competitiveness. Organizations of all sizes and industries implement business process reengineering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records 2020 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. If you are interested in presenting, please complete the online Presentation Proposal Submission Form.

article thumbnail

e-Records 2021 Call for Presentations

The Texas Record

The conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. If you are interested in presenting, please complete the online Presentation Proposal Submission Form.

article thumbnail

e-Records 2019 Call for Presentations

The Texas Record

The one-day conference gathers records management and information technology staff from the state and local level together to learn from each other by sharing case studies, solutions, best practices, challenges, and lessons learned. Presentations should deliver takeaways that are immediately useful to attendees’ work.

article thumbnail

Identifying People by Metadata

Schneier on Security

Abstract: Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world. In this paper, we use Twitter as a case study to quantify the uniqueness of the association between metadata and user identity and to understand the effectiveness of potential obfuscation strategies.

article thumbnail

Creating and nourishing a DevOps culture: key takeaways for agencies

CGI

A few months ago, I took part in a DevOps Collaboration Symposium hosted by the Advanced Technology Academic Research Center (ATARC) which led to a MITRE-ATARC white paper that summarized various presentations from the event. Trust all levels of the organization and ensure open communication so that everyone is heard. Add new comment.