Tue.Nov 14, 2017

article thumbnail

Document Capture Automation Tools to Improve the Way You Work With Data

AIIM

Your business deals with documents on a constant basis. Without technology in place, organizing the different types of files and contact points for written communication can be intense. You might have paper contracts, email and attachments, faxes, and web forms all integral to the same client or customer file. This is where capture automation becomes effective in streamlining your productivity and organizational ability.

ECM 97
article thumbnail

Ten things impacting the world: living to 150

OpenText Information Management

Over the course of human history, our life expectancy has been on an upward trend: increasing from 30 years (during prehistoric times) to 35 years (in the Classical Greek and Roman eras) to 48 years (in Medieval times). Better living conditions in the mid-20th century caused the average lifespan to jump to the 70-year mark. … The post Ten things impacting the world: living to 150 appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to lose your password

Thales Cloud Protection & Licensing

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. To borrow from Shakespeare’s Macbeth: “Each new morn, new widows howl, new orphans cry, new sorrows slap Internet giants on the face”. The modern era of mass data breaches perhaps began in 2009, with the hack of 32 million account credentials held by software developer RockYou, in which a SQL injection attack revealed that passwo

article thumbnail

How to Lock Down Your Facebook Privacy Settings

WIRED Threat Level

Friends, friends of friends, advertisers; keeping track of Facebook's privacy settings can get confusing. Here's how to get yours just right.

Privacy 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

OpenText File Intelligence

OpenText Information Management

Essentially, all organizations need to find and manage content for information governance or regulatory compliance and also for internal or regulatory investigations. Responding in a quick and cost-effective manner is directly related to how effectively an organization can identify, collect, analyze and act on all relevant information. Since most business communications and activities take place … The post OpenText File Intelligence appeared first on OpenText Blogs.

More Trending

article thumbnail

OpenText and BlockEx to develop blockchain-based supply chain finance solution

OpenText Information Management

Recognizing the emerging global interest in blockchain, OpenText has partnered with BlockEx, a leading provider of blockchain digital asset exchange services, to jointly explore how global supply chains can leverage blockchain technology. OpenText operates the world’s largest Business Network. More than 600,000 companies connect to our network to exchange more than 24 billion business transactions … The post OpenText and BlockEx to develop blockchain-based supply chain finance solution app

article thumbnail

How One Woman's Digital Life Was Weaponized Against Her

WIRED Threat Level

A rare court case exposes the all-too-common horror of online harassment that followed when one woman broke off a relationship.

Security 111
article thumbnail

The PCI DSS: 5 challenges that merchants face

IT Governance

Even though all merchants and service providers that store, process or transmit cardholder data are required to comply with the Payment Card Industry Data Security Standard ( PCI DSS ), many do not. There are a number of reasons for this, ranging from a lack of awareness or interest, to the general strain caused by having to comply with a broad range of other standards, laws and regulations.

article thumbnail

Watch a 10-Year-Old Beat Apple's Face ID on His Mom's iPhone X

WIRED Threat Level

Yes, twins can unlock each other's iPhones. But kids accessing their parents' devices raises different concerns.

Access 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apple iPhone X Face ID Fooled by a Mask

Threatpost

Vietnamese security company Bkav says it has built a proof-of-concept mask that fools Apple’s Face ID technology.

article thumbnail

Inside the Decades-Long Fight for Better Emergency Alerts

WIRED Threat Level

After years of pushing for a more effective emergency alert system, the carriers have finally come around to making improvements.

article thumbnail

Dispostion and its Discontents

The Schedule

As many records managers note, recordkeeping decisions are in the news on a daily basis (with today’s accelerated news cycle, it often feels like an hourly basis!). Our last Resourceful Records Manager interview astutely noted, “As I first assumed RM responsibilities, I sat in on a conference talk by a leader in the field, who cited a news headline on records mismanagement and dissected it with great enthusiasm.

IT 58
article thumbnail

Long Article on NSA and the Shadow Brokers

Schneier on Security

The New York Times just published a long article on the Shadow Brokers and their effects on NSA operations. Summary: it's been an operational disaster, the NSA still doesn't know who did it or how, and NSA morale has suffered considerably. This is me on the Shadow Brokers from last May.

IT 58
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How the Government of Canada Plans To Set CyberSecurity Policy

eSecurity Planet

At SecTor security conference, the Director General for National Cyber Security in the Government of Canada details her government's policies for keeping Canadians safe online.

article thumbnail

Microsoft Patches 20 Critical Vulnerabilities

Threatpost

This month, Microsoft's Patch Tuesday updates tackle fixes for 53 security bugs in Windows, Office, Internet Explorer, Edge, ASP.NET Core,NET Core, and its Chackra Core browser engine.

article thumbnail

Russian Developer Snuck Cryptocurrency Mining into Android Apps

Dark Reading

Apps found in Google Play turned mobile devices into cryptocurrency miners unbeknownst to their users, according to researchers from security firm Ixia.

Mining 50
article thumbnail

Debugging Tool Left on OnePlus Phones, Enables Root Access

Threatpost

Phone maker OnePlus is being blasted for leaving a developer debugging app on its handsets allowing phones to be rooted by an attacker with physical access to the device.

Access 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

2017 Has Broken the Record for Security Vulnerabilities

Dark Reading

Some 40% of disclosed vulns as of Q3 are rated as severe, new Risk Based Security data shows.

article thumbnail

Adobe Patches Flash Player, 56 Bugs in Reader and Acrobat

Threatpost

Adobe released a monster update for Acrobat and Reader patching dozens of remote code execution vulnerabilities, along with a Flash Player update addressing a handful of critical flaws.

44
article thumbnail

Records Storage: A Cost Effective Strategy for Managing What You Shred

Record Nations

Document management can be a hairy task. After planning, implementing, and trying to maintain all of your organizational strategies, you can be blinded to certain efficient strategies. The video below will show you how using two complimentary document management techniques (offsite storage and document shredding) can help you better manage your company files.

46
article thumbnail

SLRM Customer Service Survey

The Texas Record

As a valued customer who works for a state agency or local government, you are invited to rate our services in this biennial customer service survey. This survey covers Records Management Assistance (consulting, training, and publications), records storage, and imaging for state agencies and local governments. Additionally for state agencies, it covers in-depth questions for the State Records Center, the Imaging Services unit, Billing and Contracting, and Other Contract use.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CHINA: More changes to China’s looming e-commerce law – it is time to make changes

DLA Piper Privacy Matters

Further amendments to the proposed China e-commerce law have been announced which will require e-commerce platform and marketplace providers to provide users with practical mechanisms to access their users’ information, make corrections or deletions of their information, and close their accounts. E-commerce operators will also be prevented from circumventing these requirements though onerous contractual conditions which might otherwise be used to make it difficult for users to request access, co

IT 40
article thumbnail

Companies Blindly Believe They've Locked Down Users' Mobile Use

Dark Reading

IT security teams may be in for a surprise about their mobile exposure as the GDPR compliance deadline approaches, according to a new survey.

GDPR 46
article thumbnail

Remembering Vietnam

Archives Blogs

The National Archives opened our newest exhibition, Remembering Vietnam: Twelve Critical Episodes in the Vietnam War on November 10, 2017. The exhibit examines 12 critical episodes in the Vietnam War to provide a framework for understanding the decisions that led to war, events and consequences of the war, and its legacy. This 3,000-square-foot exhibit uses more than 80 original records from the National Archives – including newly declassified documents – to critically reexamine major events and

article thumbnail

ADT Expands Cybersecurity Business with Purchase of Datashield

Dark Reading

Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Here’s an Opportunity to Learn More About On-Premise and Off-Premise Solutions and Where CloudNine Fits in Both: eDiscovery Trends

eDiscovery Daily

Many say that the cloud is revolutionizing eDiscovery as we know it, while others still prefer the control of the on-premise eDiscovery solutions they’re used to using. So, what factors should you consider when selecting your own eDiscovery solution? Thanks to our friends at ACEDS , you can learn more about the different approaches and how CloudNine supports both of those environments.

Cloud 34
article thumbnail

Enterprise Physical Security Drives IoT Adoption

Dark Reading

The vast majority of respondents to a new survey are deploying IoT technologies for building safety in the form of security cameras.

IoT 43
article thumbnail

Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

eSecurity Planet

The vulnerability and phishing attack should both be easy to resolve -- but they're thriving.