article thumbnail

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. CES is a huge event, one that almost everybody in our industry has been to at least once, if not multiple times. Call that the first incarnation of CES – literally, electronics for consumers.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

O’Hara denied the plaintiff’s motion for sanctions based on the defendant’s alleged spoliation of a surveillance video that shows an altercation between the plaintiff and her supervisor, stating that “plaintiff has failed to meet the requirements of Fed. Brykan Legends, LLC, No. 17-2412-JWL (D. 7, 2019) , Kansas Magistrate Judge James P.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France: the CNIL has released its annual dawn raid Program for 2023: four national priorities and one priority coming from the EDPB!

DLA Piper Privacy Matters

As a reminder, in 2022, the CNIL priority topics were (i) direct marketing (ii) monitoring telework and (iii) the use of cloud computing (see our previous post ). The CNIL’s roadmap for its dawn raids in 2023 is thus to check that the use of “smart” cameras, complies with the legal framework. management of data subjects’ rights).

article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

Check out our video to learn more about IBM’s new Madrid MZR Additionally, we continue to co-create with clients and partners globally—such as BNP Paribas, Wasabi Technologies, SAP and VMware—and across industries to unlock business value with a hybrid cloud approach.

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

Encryption technology has evolved over the years to cover data in use, and the emerging power of quantum computing has given rise to quantum cryptography. The advent of quantum computing has given them far more juice to crack traditional encryption methods. This adds a vital extra layer of security. New Quantum Encryption Standards.

article thumbnail

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

Of course, Zoom has been on a media blitz recently touting their low latency, network optimization, decision to remove a 40-minute limit on free accounts and even offering free video conferencing for schools. So, there are workarounds; however, I have heard some people have had issues with the computer audio option as well.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

This post summarizes the practical measures that may be adopted to protect your firm against cyberattacks and the keys to successful crisis management in the event that an unauthorized data breach occurs. Impersonation of key senior personnel to remit fraudulent payment instructions via telephone and video. standard login passwords).