Sun.Apr 22, 2018

article thumbnail

Why So Many People Make Their Password 'Dragon'

WIRED Threat Level

The mythical creature's popularity says a lot about the psychology of password creation.

Passwords 108
article thumbnail

Judge Recommends Jury Decision on Impact of Spoliation of Emails: eDiscovery Case Law

eDiscovery Daily

In BankDirect Capital Fin., LLC v. Capital Premium Fin., Inc., No. 15 C 10340 (N.D. Ill. April 4, 2018) , Illinois Magistrate Judge Jeffrey Cole recommended that the court follow the decision in Cahill v. Dart and “allow the appropriate evidence to be presented to the jury” to enable it to determine the “impact, if any, the non-production of the challenged emails has on the merits of the parties’ claims”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What other banks can learn from BB&T's glitch

Information Management Resources

Several banks have reported digital service outages this year, but now there’s a detailed breakdown of one of them — and it shows that the damage goes far beyond reputation.

IT 29
article thumbnail

Reliance

InfoGovNuggets

“U.S. Prosecutors to Weigh Criminal Case for McCabe,” The Wall Street Journal , April 20, 2018 A1. The DOJ Inspector General referred the case/matter of former FBI Deputy Director for criminal prosecution over his responses to investigators looking into leaks. What does it say about the culture of an organization when two of its top officers, both of whom are lawyers, may have lied to federal investigators?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Did SunTrust wait too long to announce data theft?

Information Management Resources

SunTrust let about eight weeks pass before telling the public that data tied to 1.5 million customers had been stolen.