Remove tag privacy-rule
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Part 3 will discuss how to manage the various DT risks. Introduction.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Apple founder Steve Wozniak interview, answers your Tweeted questions By Oliver Marks | July 10, 2008, 9:08pm PDT Summary At the San Francisco Social Networking Conference today, Steve Wozniak, Apple co founder and personal computer legend, shared some fascinating insights into the modern world of social networking and mobile phones.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role does technology play in facilitating intimate partner abuse? What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. Vamosi: Ever get the feeling that someone is watching you. It's natural.