April, 2016

article thumbnail

CIPL and AvePoint Launch Survey to Benchmark Global Readiness for the EU GDPR

Hunton Privacy

With the recent adoption of the EU General Data Protection Regulation (“GDPR”) and the significant changes it will require from organizations, AvePoint has joined forces with the Centre for Information Policy Leadership (“CIPL”), a global privacy policy think tank at Hunton & Williams LLP, to launch the first global survey to benchmark organizations’ readiness for the GDPR.

GDPR 66
article thumbnail

Why can’t we be briefed like the President?

Attensa

It started with a simple question posed by a senior marketing exec during a staff meeting. B lindsided a couple of times in the course of a month by information related to market events that that should have known, the exec went on to ask: “If the President of the United States can get a daily briefing on the state of the world, why can’t we get one on our own company?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wow. The People look like ants.

John Battelle's Searchblog

The post Wow. The People look like ants. appeared first on John Battelle's Search Blog. The post Wow. The People look like ants. appeared first on John Battelle's Search Blog.

64
article thumbnail

Software is eating innovation: How trapped is your company?

Collaboration 2.0

Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots

Elie

As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses possible mitigations to improve USB security.

More Trending

article thumbnail

CNIL and GPEN Analyze Impact of Connected Devices on Privacy During Internet Sweep

Hunton Privacy

On April 12, 2016, the French Data Protection Authority (“CNIL”) announced that it will participate in a coordinated online audit to analyze the impact of everyday connected devices on privacy. The audit will be coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection authorities (“DPAs”) from around the world.

Privacy 53
article thumbnail

KMWorld Magazine: Evolving Data Issues Challenge RM Approaches

JKevinParker

I was interviewed by Judith Lamont, Ph.D. for a piece she wrote in KMWorld Magazine. The article is called " Evolving data issues challenge RM approaches ". For my contributions, I spoke about issues with the growing volumes of big data and how business and IT often have different priorities—if they've even thought about the implications of structured data on records management.

article thumbnail

Where I’ll Be For NewCo Boston April 26-7 – Come Join Me!

John Battelle's Searchblog

The post Where I’ll Be For NewCo Boston April 26-7 – Come Join Me! appeared first on John Battelle's Search Blog. The first ever NewCo Boston goes off in less than two weeks, and I’ve been studying the schedule and making my picks for the companies I most want to visit. The lineup is insanely great – Boston is brimming with innovative NewCos, 79 of which will open their doors on April 27th.

article thumbnail

Software is eating innovation: How trapped is your company?

Collaboration 2.0

Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

In-depth analysis of the lessons we learned while protecting gmail users

Elie

This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.

IT 48
article thumbnail

IoT and the pricing conundrum

CGI

IoT and the pricing conundrum. p.butler@cgi.com. Tue, 04/19/2016 - 04:00. "Price is what you pay. Value is what you get." - Warren Buffett. The Internet of Things (IoT) is having a profound effect on the role of marketing. As a keen runner, I use technology such as heart rate monitors, GPS, cloud-based performance analysis and tools to monitor my training and race performance – so connected devices are part and parcel of my life, both business and personal.

IoT 40
article thumbnail

If a Data Breach Occurs and Nobody Accesses Customer Data, Does it Constitute “Publication”?

Hunton Privacy

As reported on the Hunton Insurance Recovery Blog , data breach claims involving customer data can present an ever-increasing risk for companies across all industries. A recent case illustrates efforts to recover the costs associated with such claims. A panel of the Fourth Circuit confirmed that general liability policies can afford coverage for cyber-related liabilities, and ruled that an insurer had to pay attorneys’ fees to defend the policyholder in class action litigation in Travelers Indem

article thumbnail

Solution Success Means User Adoption

JKevinParker

The following is an excerpt from a post I published on the AIIM blog called " Solution Success Means User Adoption ". Of all the measures of success for information management solution implementations, there is one critical success factor that stands above the rest: user adoption. In other words, your solution is only successful if it is actually used by the people in your organization.

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Friends, Feedback and the Future of Digital Preservation: Preservica Global User Group 2016

Preservica

Last week I had the pleasure of taking part in our Global User Group Meeting and spending time with over fifty Preservica Users in Oxford – our biggest event to date! Having studied and lived in Oxford for many year’s it’s easy to take for granted the beautiful surroundings that the city has to offer. To ensure everyone had the best experience possible we held this year’s meeting at Queens College, steeped in history and with an enviable archive and library of its own it was the perfect location

article thumbnail

What to do With Paper Patient Charts When Transitioning to Electronic Medical Records

Shoreline Records Management

As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.

Paper 28
article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

Payment trends and their implications for national payment infrastructures

CGI

Payment trends and their implications for national payment infrastructures. Anonymous. Wed, 04/13/2016 - 02:25. The payments world is both complex and complicated: Complex because of the many different parts that need to come together to facilitate the movement of value; and. Complicated because the parts are interconnected both domestically and globally.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Article 29 Working Party Releases Opinion on EU-U.S. Privacy Shield

Hunton Privacy

On April 13, 2016, the Article 29 Working Party (the “Working Party”) published its Opinion on the EU-U.S. Privacy Shield (the “ Privacy Shield ”) draft adequacy decision. The Privacy Shield was created to replace the previous Safe Harbor framework invalidated by the Court of Justice of the European Union (“CJEU”) in the Schrems decision. The Working Party also published a Working Document on the justification for interferences with the fundamental rights to privacy and data protection through s

Privacy 49
article thumbnail

Digital Transformation In Action: 21 Things You Need to Know

JKevinParker

AIIM published a great ebook on Digital Transformation as a preview to the 2016 AIIM Conference. A great group of industry experts contributed their thoughts to this important topic, including me. The following were my contributions to two of the rules: RULE #11 - IF YOU CAN'T MEASURE IT - DON'T DO IT. Kevin Parker, NEOSTEK: "Use an IM maturity model and assessment (like the one from MIKE2.0 or NARA's RIM Maturity Model).

article thumbnail

Does your organization have a digital preservation strategy?

Preservica

Learn why you may need one in IGI’s interview with Preservica’s Mike Quinn. Recently, the IGI caught up with Mike Quinn, Commercial Director at Preservica, one of the newest IGI Supporters, to find out more about what organizations can do to better protect their valuable digital assets to ensure that it is both preserved and accessible in the future. read the full blog here.

article thumbnail

What to do With Paper Patient Charts When Transitioning to Electronic Medical Records

Shoreline Records Management

As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.

Paper 20
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

The importance of demand response for electricity providers

CGI

The importance of demand response for electricity providers. ankit.mehta. Wed, 04/13/2016 - 05:23. Demand response is one of many resources that have been used to satisfy the increasing demand for electricity, but with net energy consumption remaining relatively static in recent years, what is the future role, if any, for demand response? To begin with, the growing use of low-carbon technologies could increase net energy use again.

article thumbnail

OCR Settles Two Key HIPAA Privacy Rule Cases Involving X-Rays and Medical Reality TV Show

Hunton Privacy

The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) recently announced resolution agreements with Raleigh Orthopaedic Clinic, P.A., (“Raleigh Orthopaedic”) and New York-Presbyterian Hospital (“NYP”) for HIPAA Privacy Rule violations. Raleigh Orthopaedic. Following a breach notification report from Raleigh Orthopaedic in April 2013, OCR investigated and discovered that Raleigh Orthopaedic had improperly disclosed protected health information (“PHI”) to a third-party

Privacy 45
article thumbnail

DB2 for z/OS: Should You Do Some Buffer Pool Consolidation?

Robert's Db2

19, 19, 23, 26. Know what these numbers have in common? They indicate the number of 4K buffer pools allocated for four different production DB2 for z/OS subsystems that I analyzed over the past couple of years. I believe that there are quite a few sites where a plethora of 4K buffer pools have been defined for a given DB2 subsystem. That's not illegal or anything (DB2 allows you to have as many as 50 different 4K pools for a single subsystem), but it does make the task of managing and monitoring

Access 48
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Nuclear Industry Pursues Aggressive Defense Against Cyber Threats

Hunton Privacy

On March 30 through April 1, 2016, the 2016 Nuclear Industry Summit meetings took place in Washington D.C. In the nuclear industry, the issue of cybersecurity has grown steadily in importance over the past decade. This has been most apparent in the increasing attention and effort paid to cyber-based threats under the biennial Nuclear Industry Summit and its international meetings.

article thumbnail

Amended Tennessee Breach Notification Law Tightens Timing Requirement

Hunton Privacy

On March 24, 2016, Tennessee Governor Bill Haslam signed into law S.B. 2005 , as amended by Amendment No. 1 to S.B. 2005 (the “Bill”), which makes a number of changes to the state’s data breach notification statute, Tenn. Code § 47-18-2107. The amendments take effect on July 1, 2016. The Bill: Requires businesses and state agencies to notify affected individuals “immediately, but no later than 45 days from the discovery or notification of the breach, unless a longer period of time is required du

article thumbnail

Parliamentary Committee Approves Denham ICO Appointment

Hunton Privacy

On April 27, 2016, the UK House of Commons Culture, Media and Sport Select Committee (the “Committee”) confirmed Elizabeth Denham’s appointment as Information Commissioner. Denham, currently the Privacy and Information Commissioner for British Columbia, Canada, was announced as the UK Government’s preferred choice on March 22, 2016. The Committee’s announcement followed a pre-appointment hearing on the same day, during which Denham fielded questions from a number of committee members.