Software is eating innovation: How trapped is your company?
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Hunton Privacy
APRIL 15, 2016
As reported on the Hunton Insurance Recovery Blog , data breach claims involving customer data can present an ever-increasing risk for companies across all industries. A recent case illustrates efforts to recover the costs associated with such claims. A panel of the Fourth Circuit confirmed that general liability policies can afford coverage for cyber-related liabilities, and ruled that an insurer had to pay attorneys’ fees to defend the policyholder in class action litigation in Travelers Indem
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Elie
APRIL 10, 2016
As an experiment we dropped nearly 300 USB sticks on the UIUC campus to assess if USB drop attacks work and see if concerns about USB security were justified. We found out that at least 48% of the drive were plugged. This blog post summarizes how we ran the study, highlights the key findings, looks at what motivates people to plug in USB sticks, and discusses possible mitigations to improve USB security.
CGI
APRIL 13, 2016
Payment trends and their implications for national payment infrastructures. Anonymous. Wed, 04/13/2016 - 02:25. The payments world is both complex and complicated: Complex because of the many different parts that need to come together to facilitate the movement of value; and. Complicated because the parts are interconnected both domestically and globally.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Collaboration 2.0
APRIL 13, 2016
Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
CGI
APRIL 13, 2016
The importance of demand response for electricity providers. ankit.mehta. Wed, 04/13/2016 - 05:23. Demand response is one of many resources that have been used to satisfy the increasing demand for electricity, but with net energy consumption remaining relatively static in recent years, what is the future role, if any, for demand response? To begin with, the growing use of low-carbon technologies could increase net energy use again.
Hunton Privacy
APRIL 12, 2016
On March 30 through April 1, 2016, the 2016 Nuclear Industry Summit meetings took place in Washington D.C. In the nuclear industry, the issue of cybersecurity has grown steadily in importance over the past decade. This has been most apparent in the increasing attention and effort paid to cyber-based threats under the biennial Nuclear Industry Summit and its international meetings.
Hunton Privacy
APRIL 13, 2016
On April 11, 2016, the European Commission launched a public consultation to evaluate and review Directive 2002/58/EC on the processing of personal data and the protection of privacy in the electronic communications sector, also known as the e-Privacy Directive. Technological advances and the advent of the EU General Data Protection Regulation (“GDPR”) have prompted the European Commission to review the e-Privacy Directive, which was last updated in 2009.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
Hunton Privacy
APRIL 13, 2016
On April 12, 2016, the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs voted to approve the EU General Data Protection Regulation (“GDPR”) by a 54-3 vote, with one abstention. The GDPR replaces Directive 95/46/EC, enacted in 1995, and will significantly change EU data protection laws. This development clears the way for the European Parliament to rubber stamp the GDPR at a plenary session on April 14, 2016, completing the legislative process for adoption of the GDPR.
Hunton Privacy
APRIL 12, 2016
After much debate, the final version of the EU General Data Protection Regulation (“GDPR”) is expected to be adopted by the European Parliament this week and to take effect in early 2018. The GDPR will significantly change EU data protection law in several areas, affecting all businesses in the energy, financial, health care, real estate, manufacturing, retail, technology and transportation industries, among others.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
ForAllSecure
APRIL 11, 2016
In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
Hunton Privacy
APRIL 14, 2016
On April 14, 2016, after four years of drafting and negotiations, the long awaited EU General Data Protection Regulation (“GDPR”) has been adopted at the EU level. Following the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs’ vote earlier this week and the EU Parliament in plenary session, the GDPR is now officially EU law and will directly apply in all EU countries, replacing EU and national data protection legislation.
Let's personalize your content