Wed.Jan 03, 2018

article thumbnail

Best of TAB 2017 part 3: the top white papers

TAB OnRecord

In a four-part series, we are bringing you the top case studies, white papers, blog posts, and guides – all chosen by your records management colleagues! For part three of our series, we reveal the most popular white papers of the past year. These in-depth resources cover: survival skills for modern records managers, RIM software, [.] Read More. The post Best of TAB 2017 part 3: the top white papers appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 92
article thumbnail

Critical "Meltdown" and "Spectre" Flaws Breaks Basic Security for Intel, AMD, ARM Computers

WIRED Threat Level

Still-unidentified researchers have found a critical chip flaw that developers are scrambling to patch in millions of computers.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To renewable or not to renewable?

OpenText Information Management

My first blog of 2018 is a continuation of the blog series on mega trends affecting the oil and gas sector. I’m going to take a look at the role of renewable energies today. Over the past decade – and before – there has been a great deal of speculation about when the major oil … The post To renewable or not to renewable? appeared first on OpenText Blogs.

article thumbnail

The Logan Paul "Suicide Forest" Video Should Be a Reckoning For YouTube

WIRED Threat Level

Logan Paul's video of Japan's "suicide forest" was a nadir for the YouTube star—and the platform that enables him.

Security 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Transferring personal data under the GDPR

IT Governance

When organisations transfer data, they inevitably compromise its security to some degree. It’s no longer secured behind physical defences, such as in a locked drawer in the organisation’s secure premises, and the means of transfer can be lost, stolen or hacked. There’s not much organisations can do to eliminate data loss, so the problem becomes how to reduce the damage once the data is exposed?

More Trending

article thumbnail

A Pragmatic Approach to Fixing Cybersecurity: 5 Steps

Dark Reading

The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.

article thumbnail

Tamper-Detection App for Android

Schneier on Security

Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it: when it's moved, when the lighting changes, and so on.

IT 50
article thumbnail

Critical Microprocessor Flaws Affect Nearly Every Machine

Dark Reading

Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.

63
article thumbnail

Managing Record Retention Requirements in the Office

Record Nations

Document management in the workplace is complicated enough but add in record retention requirements and you’ll find another mountain of confusion to overcome. Most businesses use a combination of digital and physical documents to keep track of all their information. While many of these files are for the usual recordkeeping requirements, certain industries require a […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Open Source Components, Code Volume Drag Down Web App Security

Dark Reading

The number of new Web application vulnerabilities published last year was 212% greater than the number disclosed in 2016, Imperva says in a new report this week.

article thumbnail

Intel In Security Hot Seat Over Reported CPU Design Flaw

Threatpost

Intel is grappling with what many are calling a processor design flaw impacting CPUs used in Linux, Windows and some macOS systems.

article thumbnail

Your “Mashup” of eDiscovery Market Estimates Can’t Possibly Be Any Earlier: eDiscovery Trends

eDiscovery Daily

It’s become an annual tradition – the release of the eDiscovery Market Size Mashup that Rob Robinson compiles and presents on his Complex Discovery site each year. It’s also become an annual tradition for him to release it earlier and earlier each year. So, over the holidays, Rob released his worldwide eDiscovery services and software overview for 2017 to 2022.

article thumbnail

Intel Processor Security Flaw Prompts Kernel Makeovers in Linux, Windows

Dark Reading

As-yet undisclosed design flaw in Intel processors has OS programmers working on kernel updates that reportedly could slow performance.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Spotlight: Dogs in Airbrush

Unwritten Record

Airbrushing was an early method of retouching and coloring photographs which can be traced back as far as the late 1800s. It is a unique process which creates a beautiful matte effect, causing images to look as though they are caught somewhere between photograph and painting. While the technology is still employed today, in the pre-Photoshop era airbrushing was a go-to method of altering and improving images.

article thumbnail

Barracuda Hooks PhishLine in Social Engineering Security Acquisition

Dark Reading

Barracuda plans to use PhishLine's user awareness training to protect against targeted email-based attacks.

article thumbnail

Neo-Black Society Records

Archives Blogs

A major new addition to the UNCG Digital Collections is the Neo-Black Society Records, 1969-2013. From the collection finding aid : This collection contains the official records that reflect the functions and activities of the Neo-Black Society. These records contain materials related to general body and executive board meetings, budgets, correspondence, memorandums, committee and presidential reports, flyers, programs, and general topics including but not limited to the 1973 funding protest.

article thumbnail

In Mobile, It's Back to the Future

Dark Reading

The mobile industry keeps pushing forward while overlooking some security concerns of the past.

IT 46
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Support Our 2017 CTRL Survey Into Data Analytics

IGI

Please Participate In Our IGI 2017 CTRL Survey On Data Analytics. Powered by the Information Governance Initiative. For the third year in a row, the IGI is partnering with the Coalition of Technology Resources for Lawyers (CTRL) to benchmark the use of analytics by in-house legal departments. Last year’s survey provided a baseline on adoption rates for analytics over six use cases, how analytics are being used, spending rates, and more.

article thumbnail

My Predictions for 2018

John Battelle's Searchblog

The post My Predictions for 2018 appeared first on John Battelle's Search Blog. (cross posted from NewCo Shift ). So many predictions from so many smart people these days. When I started doing these posts fifteen years ago, prognostication wasn’t much in the air. But a host of way-smarter-than-me folks are doing it now, and I have to admit I read them all before I sat down to do my own.

article thumbnail

Take Advantage of Our Early Bird MER / CIGO 2018 Discount Pricing

IGI

REGISTER HERE for MER / CIGO 2018 Early Bird Pricing. We would like to invite you to take advantage of a special early bird joint registration offer for both the MER Conference and the CIGO Summit taking place back-to-back in Chicago in May 2018. The MER Experience, May 7-9 , has been the nation’s foremost educational conference specializing in addressing the growing and future challenges of electronic records management (ERM) – from the legal, technical and operational perspectives.

article thumbnail

My Predictions for 2018

John Battelle's Searchblog

(cross posted from NewCo Shift ). So many predictions from so many smart people these days. When I started doing these posts fifteen years ago, prognostication wasn’t much in the air. But a host of way-smarter-than-me folks are doing it now, and I have to admit I read them all before I sat down to do my own. So in advance, thanks to Fred , to Azeem , to Scott , and Alexis , among many others.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Join Our Webinar on January 11: The Top 5 Information Governance Predictions for 2018

IGI

Please join the IGI and Actiance on January 11th at 2pm ET / 11am PT for a webinar addressing The Top 5 Information Governance Predictions for 2018. CLICK HERE TO REGISTER. Speakers. Barclay Blair, Founder and Executive Director, Information Governance Initiative (IGI). Robert Cruz, Senior Director, Information Governance, Actiance. What IG investments are you planning for 2018?

article thumbnail

My Predictions for 2018

John Battelle's Searchblog

(cross posted from NewCo Shift ). So many predictions from so many smart people these days. When I started doing these posts fifteen years ago, prognostication wasn’t much in the air. But a host of way-smarter-than-me folks are doing it now, and I have to admit I read them all before I sat down to do my own. So in advance, thanks to Fred , to Azeem , to Scott , and Alexis , among many others.