Remove tag personal-information
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

Henrik Liliendahl is an MDM and PIM expert; speaker and blogger ( www.liliendahl.com and [link] ) and the Co-Founder, Chairman and CTO of Product Data Lake a product information exchange service. I was educated in computer engineering but my first job was on the business side. Kate Tickner, Reltio. Data models – look at the real world.

MDM 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

Henrik Liliendahl is an MDM and PIM expert; speaker and blogger -- Liliendahl on Data Quality and The Disruptive MDM/PIM/DQM List -- and the Co-Founder, Chairman and CTO of Product Data Lake a product information exchange service. I was educated in computer engineering but my first job was on the business side. Eg a customer table.

MDM 40
article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data apparently includes users’ full names, phone numbers, addresses, email addresses and partial payment card information. Only 5 definitely haven’t had data breached.

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

I’m training and running the marathon to improve my health, to improve my own personal record. Hammond: I tend to, I guess, try and explain capture the flag is sort of gamified cybersecurity education. Yeah, I think there's definitely a well-established Jeopardy style like flavor and style of capture the flag.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

I kind of felt like it was giving back a bit to the community that I had kind of taken a lot from like when I was growing up by being IRC channels, and I had found the internet, all this information that was available. I don't kind of mix the two and I'm in charge of global sales operations, channel operations and go to market strategy.

article thumbnail

This is the old ChiefTech blog.: Why focus on Enterprise RSS?

ChiefTech

Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. However, this is strictly a personal project - as an information system user in my own right, I want Enterprise RSS too! Im definitely not saying that. And do you find that all information should be RSS-ified?