Thu.Nov 30, 2017

article thumbnail

4 essential RIM practices to prepare for mergers and acquisitions

TAB OnRecord

Records management teams have a key role to play in mergers, acquisitions and divestitures. Whether big or small, the sale of any corporate asset must be supported by accurate and complete records. These provide buyers with historical information, compliance documentation and other crucial records. Most importantly, complete and accurate records help demonstrate the full value… Read More.

article thumbnail

A Head Scratcher - Solving the Productivity Riddle

AIIM

I came across a chart recently that left me scratching my head. It was a chart from the Federal Reserve Bank of St. Louis, featuring U.S. Bureau of Labor Statistics (BLS) on labor productivity. Per BLS, “Labor productivity is a measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK police to lose phone and web data search authorisation powers

The Guardian Data Protection

Change is one of several to snooper’s charter law proposed by ministers in attempt to comply with European court ruling Senior police officers are to lose the power to self-authorise access to personal phone and web browsing records under a series of late changes to the snooper’s charter law proposed by ministers in an attempt to comply with a European court ruling on Britain’s mass surveillance powers.

Access 100
article thumbnail

Providing transactional data to your Hadoop and Kafka data lake

IBM Big Data Hub

The data lake may be all about Apache Hadoop, but integrating operational data can be a challenge. Learn how to deliver real-time feeds of transactional data from mainframes and distributed environments directly into Hadoop clusters and make constantly changing data more available.

77
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Spreading OpenText Cheer: Brazil

OpenText Information Management

The holidays are fast approaching, and our employees are starting to get festive in their offices around the world! In this post, OpenText employee Luis Barbosa talks about his favourite holiday customs and traditions that take place in his home city of Sao Paulo, Brazil. What is your favourite part about this time of year? … The post Spreading OpenText Cheer: Brazil appeared first on OpenText Blogs.

72

More Trending

article thumbnail

Weekly podcast: Imgur, Uber (again), Apple vulnerability, NHS Digital

IT Governance

This week, we discuss a data breach affecting 1.7 million Imgur users, the 2.7 million UK victims of the Uber breach, a major security flaw in macOS High Sierra, and a new investment in data security from the NHS. Hello and welcome to the IT Governance podcast for Friday, 1 December 2017. Here are this week’s stories. The image-sharing website Imgur – which until this week I have to confess I thought was pronounced as spelt: im-gur – has confirmed that 1.7 million users’ email addresses and pass

article thumbnail

EU Data Protection Authorities Establish Task Force to Collaborate on Uber Data Breach

Hunton Privacy

On November 29, 2017, the EU’s Article 29 Working Party (”Working Party”) announced the establishment of a task force to coordinate the plethora of national investigations throughout the EU into Uber’s 2016 data breach that affected approximately 57 million users worldwide. The task force is being led by the data protection authority (”DPA”) in the Netherlands, where Uber has its EU headquarters, and includes representatives from the DPAs in France, Italy, Germany, Belgium, Spain and the United

article thumbnail

Weekly Update 63 (US Congress Edition)

Troy Hunt

Last week, I was sitting next to a croc-infested river in the middle of nowhere (relatively speaking). This week, I'm in front of the United States Capital having just spoken to the very people who create the laws that govern not just the US but let's face it, have a significant impact on the rest of the world. Today was just one of those moments that make you go. whoa.

article thumbnail

The IoT Attacks Everyone Should Know About

Outpost24

This piece is part 2 of our ongoing series on IoT security. Read part 1 here. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.

IoT 58
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NSA "Red Disk" Data Leak

Schneier on Security

ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA. The disk image, when unpacked and loaded, is a snapshot of a hard drive dating back to May 2013 from a Linux-based server that forms part of a cloud-based intelligence sharing system, known as Red Disk. The project, developed by INSCOM's Futures Directorate, was slated to complement the Army's so-called distributed common ground system (DCGS), a legacy

article thumbnail

How do I implement ISO 27001?

IT Governance

Information security breaches are becoming the new normal. Security teams must now take dedicated measures to reduce the risk of suffering a damaging breach. The only solution to the growing threat of cyber attacks is to implement a robust approach that tackles all aspects of information security and business continuity throughout the organisation. What is ISO 27001?

article thumbnail

Cisco Patches Critical Playback Bugs in WebEx Players

Threatpost

A Cisco Systems security advisory is urges users of its WebEx platform to patch six vulnerabilities that could allow attackers to execute remote code.

article thumbnail

AI seen as key tool in government's cybersecurity defense

Information Management Resources

Data security is viewed as the best place for government to harness artificial intelligence today, with a majority of federal IT leaders selecting it first for that purpose.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lawsuits Pile Up on Uber

Dark Reading

Washington AG files multimillion-dollar consumer protection lawsuit; multiple states also confirm they are investigating the Uber breach, which means more lawsuits may follow.

50
article thumbnail

It’s E-Discovery Day! Here are Some Great Webcasts to Check Out Today!: eDiscovery Best Practices

eDiscovery Daily

It’s December 1st, which can only mean one thing – it’s E-Discovery Day 2017! This (now third) annual event includes a combination of webcasts and in-person events to promote discussion and education of eDiscovery (that’s the way I prefer to spell it, by the way). Here are some of the webcasts to consider checking out today. According to Exterro, the organizer of the event, there were over 1,500 webinar participants in 12 webinars last year and 7 in-person events.

article thumbnail

The Critical Difference Between Vulnerabilities Equities & Threat Equities

Dark Reading

Why the government has an obligation to share its knowledge of flaws in software and hardware to strengthen digital infrastructure in the face of growing cyberthreats.

article thumbnail

RAT Distributed Via Google Drive Targets East Asia

Threatpost

Researchers say a new remote access Trojan dubbed UBoatRAT is targeting individuals or organizations linked to South Korea or video games industry.

Access 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Final Countdown: Last Minute Preparation for GDPR

Hanzo Learning Center

Are you feeling the pressure yet? The start of 2018 means that GDPR goes into effect in 5 months, which will undoubtedly approach quickly. Will your organization be caught off guard when May 25, 2018 comes around? Whether you’re completely, somewhat, or not-at-all prepared for the data rules outlined in the GDPR, check out our last-minute preparation tips below.

GDPR 40
article thumbnail

ABBYY Real-Time Recognition SDK Adds Instant Data Capture Functionality

Info Source

MILPITAS, Calif., Nov. 28, 2017 – ABBYY , a global provider of intelligent capture solutions to improve business outcomes, today announced the release of the new version of the ABBYY Real-Time Recognition Software Development Kit (RTR SDK) with added data capture functionality on iOS and Android mobile platforms. The Real-Time Recognition technology is capable of pulling text information from on-screen objects and automatically converting it into digital data on the mobile device.

article thumbnail

My favorite software for academic productivity

Information Matters

I’ve been working as a lecturer for over 14 years and have tried a large number of software tools (desktop, mobile and browser-based) to help manage my teaching and writing workload. Over that time I’ve seen the technology landscape change with mobile and cloud solutions coming to the fore. So after many hundreds of hours of experimenting here is what I am currently using.

Paper 40
article thumbnail

Kofax Announces “First Year Free” Offer for its Market Leading Information Capture Solutions

Info Source

Irvine, CA, November 30, 2017 – Kofax® , a leading provider of software to simplify and transform the First Mile™ of business, today announced a “First Year Free” offer that allows organizations to try and buy its market leading Kofax Capture™ and Kofax Transformation™ software on a no charge basis. Customers now have a risk-free means to assess these solutions in a full production setting.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Rebecca B. Rankin: Early Advocate for Public Access to Government Information

Archives Blogs

Rebecca B. Rankin was the Director of the Municipal Reference Library for the City of New York. Her work included the promotion of resources and services of the library to its clients. When budget cuts forced her to curtail the traditional publications used for publicity and outreach, Rankin took the pioneering step of employing radio to communicate with prospective customers in the local government and their constituents.

article thumbnail

Plustek Announces the MobileOffice AD480 Document and Card Scanner

Info Source

Santa Fe Springs, CA, November 28, 2017 – Plustek Technology, today announced the availability of the new MobileOffice AD480 document and card scanner. The compact footprint of this scanner makes it ideal for scanning documents and cards at registration counters or any crowded desktop. The AD480 is a 20 page per minute scanner with a 1500 page per day duty cycle.

Paper 40
article thumbnail

Making an effective case for increasing the data security budget

Information Management Resources

Essentially, there is no one resource, tool or methodology that can be implemented which miraculously causes your company to be secure.

article thumbnail

Qualys Buys NetWatcher Assets for Cloud-based Threat Intel

Dark Reading

The cloud security company plans to add threat detection, incident response, and compliance management to its platform.

Cloud 44
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Legal Industry Analyst Ari Kaplan Interviews CloudNine CEO Brad Jenkins

eDiscovery Daily

Podcast: The Alignment of E-Discovery, Technology, and Industry Insight. Interview with Brad Jenkins by Legal Industry Analyst Ari Kaplan. I spoke with Brad Jenkins , the co-founder and CEO of CloudNine Discovery , a cloud-based e-discovery software provider. We discussed the genesis of CloudNine, how e-discovery has changed over the past 15 years, the trends that are driving what the company offers, its approach to security, how CloudNine differs from other companies in this sector, its port

article thumbnail

The Good News about Breaches: It Wasn't You this Time

Dark Reading

Somewhere in every application there is a vulnerability waiting to be exploited.

IT 46
article thumbnail

Robots are coming for jobs of as many as 800M worldwide

Information Management Resources

Machine operators, fast-food workers and back-office employees are among those who will be most affected if automation spreads quickly through the workplace.

34