April, 2017

article thumbnail

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are! What aren’t everlasting though, are the so-called information governance “technologies” we use to bring these matters to heel. In recent decades, we have cycled through imaging, document […].

article thumbnail

DXC Technology: Relevant partner or the Sears of IT services?

Collaboration 2.0

A huge opportunity to provide large-scale business innovation with smart strategies and effective execution is tempered by strong competition, legacy perceptions, and a ticking clock to successfully demonstrate relevance and effectiveness.

IT 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Chapter Ends. A New One Begins.

PerezBox

This chapter in my life began March of 2011. I was invited to join the team by Dre and Daniel. Coincidently, it ended on the month that I officially hit 6. Read More. The post A Chapter Ends. A New One Begins. appeared first on PerezBox.

IT 68
article thumbnail

IoT Vigilantes Act Before Washington

Outpost24

NTIA Meets on IoT Security as Vigilantes Take Action. Today in Washington, the National Telecommunications and Information Administration will hold its third meeting to discuss Internet of Things (IoT) Security Upgradability and Patching. We’ll be watching the conversation to see if the stakeholders panel has any progress to report. We are seeing that the threats from competing strains of malware coupled with limited patching capabilities by vendors is making the danger posed by unsecured IoT pr

IoT 66
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

German DPA Publishes English Translation of Standard Data Protection Model

Hunton Privacy

On April 13, 2017, the North Rhine-Westphalia State Commissioner for Data Protection and Freedom of Information published an English translation of the draft Standard Data Protection Model (“SDM”). The SDM was adopted in November 2016 at the Conference of the Federal and State Data Protection Commissioners. . German data protection authorities (“DPAs”) are currently reviewing the SDM, and the final version is expected to be published later this year.

GDPR 65

More Trending

article thumbnail

Reimagining Information Governance with Blockchain

Weissman's World

A Discussion Paper Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) Statement of Purpose This discussion paper provides an overview of how future information governance (IG) platforms may be envisaged and built utilizing blockchain – perhaps the key point being that all the technologies necessary to do so are already available.

article thumbnail

DB2 for z/OS: Something You Might Not Know About Large Page Frames in a Post-DB2 10 Environment

Robert's Db2

I well remember the first time I saw it. August, 2016. I was looking at output from the DB2 for z/OS command -DISPLAY BUFFERPOOL(ACTIVE) DETAIL, issued on a DB2 11 system, that a client had sent to me for review. I appreciated the fact that I could see in this command output information about DB2's use of large real storage page frames for page-fixed buffer pools (in a DB2 10 environment, one had to issue -DISPLAY BUFFERPOOL -- for an individual pool, versus for all active pools -- with an odd s

IT 48
article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

GDPR 52
article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Working Party Adopts Revised Guidelines on Data Portability, DPOs and Lead SA

Hunton Privacy

On April 5, 2017, the Article 29 Working Party (“Working Party”) adopted the final versions of its guidelines (the “Guidelines”) on the right to data portability, Data Protection Officers (“DPOs”) and Lead Supervisory Authority (“SA”), which were first published for comment in December 2016. The final publication of these revised guidelines follows the public consultation which ended in February 2017.

article thumbnail

Battery Backup PSA

Roger's Information Security

One of the better things you can do to protect your money spent on electronics devices is have a good surge protector and battery backup. If you’re like me, you only buy the kind where you can disable the audible alarms. The problem with this is now you might not get any warning if the battery goes bad. In some cases you’ll have the battery backup connected to a computer via USB and receive notices that way.

article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

Office 365 Listens: UX Improvement

JKevinParker

Earlier this month I complained here about how Outlook online in Office 365 had a weird option to "Empty Folder" and what a huge UX fail that was. I am here to report that Microsoft and Office 365 listened and made it better! Now instead of "Empty folder" (which was very confusing and did not even have a confirmation, cancellation, or undo), the option says "Delete all".

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bridging the Gap between RIM and IT

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Last month, we talked about how to get on the same page as your Legal colleagues. The euphemism was to make an attorney your “new best friend.” I hope you have been successful, with both of you now singing Randy Newman’s “You’ve Got a Friend in Me”.

IT 40
article thumbnail

Know your community: Critical components of a digital strategy roadmap

CGI

Know your community: Critical components of a digital strategy roadmap. harini.kottees…. Tue, 04/25/2017 - 07:00. As communities across the U.S. continue to embrace the concept of incorporating “smart” initiatives, many have hired experts to fill new positions like Chief Innovation Officers, Chief Digital Officers or even Smart Cities Officers. These individuals are responsible for developing the strategy to raise the digital profile of the community and recruit the area’s next-generation workfo

article thumbnail

CIPL Issues Discussion Paper on GDPR Certifications

Hunton Privacy

On April 12, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a discussion paper on Certifications, Seals and Marks under the GDPR and Their Roles as Accountability Tools and Cross-Border Data Transfer Mechanisms (the “Discussion Paper”). The Discussion Paper sets forth recommendations concerning the implementation of the EU General Data Protection Regulation’s (“GDPR’s”) provisions on the development and use of certification mechanisms.

Paper 60
article thumbnail

Subscription models and the IoT – HP Instant Ink

Information Matters

HP’s Instant Ink service offers some lessons for companies exploring what the IoT might mean for their business models. The key benefits which HP is getting from Instant Ink are: • Direct relationships with customers, bypassing retailers and getting customer names, addresses and billing details; • Monthly recurring revenue streams allowing more predictable and stable […].

IoT 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Product Innovation, User Experience and the Future of Digital Preservation: Preservica Global User Group 2017

Preservica

Last week I was privileged enough to be a part of Preservica’s Global User Group Meeting, taking place this year at the stunning venue of Magdalen College, Oxford, UK. The event was open to all Preservica users and comprised two full days of presentations, interactive workshops and discussion. It was wonderful to meet with more than 70 of our customers who travelled from across the globe to be there.

article thumbnail

Pick Up the Phone and Call.

John Battelle's Searchblog

The post Pick Up the Phone and Call. appeared first on John Battelle's Search Blog. (cross posted from NewCo Shift ). People in business who like to Get S**t Done fall in love with each version of The New. When I was a kid, new was the the Apple II. Then the IBM PC, digital phones and voice mail, the Mac — oh God, the Mac! — word processing, email, the cell phone, the Internet — mmmmm, the Internet!

article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

The true value of customer-centric default management

CGI

The true value of customer-centric default management. harini.kottees…. Fri, 04/07/2017 - 05:20. Bill collecting is as old as business itself. Debtor prisons are gone, thankfully, but sometimes it seems like the basic dynamics of debt collection have not changed much since Victorian times. To the customer, repayment demands are often adversarial and off-putting.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Privacy Compliance Company Agrees to a Settlement with the New York Attorney General

Hunton Privacy

On April 6, 2017, New York Attorney General Eric T. Schneiderman announced that privacy compliance company TRUSTe, Inc., agreed to settle allegations that it failed to properly verify that customer websites aimed at children did not run third-party software to track users. According to Attorney General Schneiderman, the enforcement action taken by the NY AG is the first to target a privacy compliance company over children’s privacy.

article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

article thumbnail

Empty Folder Option for Inbox in Office 365 Mail? Really?!

JKevinParker

So my CEO calls me and says she needs help—she has somehow sent her entire email inbox contents to the trash, and she can't stop it. I should be clear here that this CEO is very intelligent as both an award-winning business owner and a computer science whiz. In other words, she is far from your average email user. So what happened?! I rushed to her office to help.

IT 40
article thumbnail

Bad Policy Makes Us Sick. Business Must Lead Us Back.

John Battelle's Searchblog

The post Bad Policy Makes Us Sick. Business Must Lead Us Back. appeared first on John Battelle's Search Blog. (Cross posted from NewCo Shift ). Walking around Disneyland with my daughter the other night, I found myself face to face with one of our country’s most intractable taboos. (Disneyland is still awesome for me, as a kid from 1970s LA. Truly magical.).

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Colorado Proposes New Cybersecurity Rules For Financial Advisers

Privacy and Cybersecurity Law

Earlier this month, the Colorado Division of Securities released a set of proposed changes to the Colorado securities laws that would, if […].

article thumbnail

Organizational changes to consider in pursuing digital transformation

CGI

Organizational changes to consider in pursuing digital transformation. harini.kottees…. Tue, 04/04/2017 - 08:00. As digitalization continues to drive significant change across industries, more and more companies recognize the need to transform for the future. In my previous blog , we discussed the three key areas that a digital transformation strategy should cover—organization, business model and technology.

article thumbnail

New Mexico Enacts Data Breach Notification Law

Hunton Privacy

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South Dakota as the two remaining states without such requirements. The Data Breach Notification Act (H.B. 15) goes into effect on June 16, 2017. Key Provisions of New Mexico’s Data Breach Notification Act: The definition of “personal identifying information” includes biometric data , defined as an individual’s “fingerprints, voice print, iris or retina patterns, facial characteristics