Remove Computer and Electronics Remove Events Remove Presentation Remove Video
article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). This document provides guidance on the conditions applicable to the use of this technology which presents high risks to the data subjects’ right to privacy.

article thumbnail

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

Reporting that he had no feeling in three of his fingers and his thumb and was in constant, severe pain, the plaintiff claimed he was entitled to damages of $3 million, but the defendant had surveillance video that seemed to contradict the plaintiff’s testimony regarding the extent and severity of his injuries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system. The airline industry wrote it off as an unlikely scenario.

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. Now take that, and imagine that for some people, the game is a video game and the lawn is a network. If your mind is not blown already, here’s a crowd of about six hundred people cheering for a video game to start.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.

article thumbnail

The Hacker Mind: Hacking Latency In Live Music Online

ForAllSecure

I'm a freelance musician and a computer scientist. I've been a freelance musician for a long time and I'm a computer science graduate now retired and I've spent most of my career bouncing back and forth between technology and art and art and technology. So I turned to an expert in digital music and technology. What's that?

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. So nothing to do with electronics whatsoever other than we sell, you know, technology products, right, and cameras and things like that. It's a different kind of thing.