Sat.Jan 02, 2016 - Fri.Jan 08, 2016

article thumbnail

Anti-Terrorism Law Enacted in China

Hunton Privacy

On December 27, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published the P.R.C. Anti-Terrorism Law. The law was enacted in response to a perceived growing threat from extremists and terrorists, particularly in regions in Western China, and came into effect on January 1, 2016. As its name suggests, the main goal of the law is to strengthen national security and to prevent terrorism.

article thumbnail

Dear Microsoft. I Want To Use Office 365. But…

John Battelle's Searchblog

The post Dear Microsoft. I Want To Use Office 365. But… appeared first on John Battelle's Search Blog. Here’s what I encountered when I, as a first time ever user, was directed to a document that lived in Office 365 World: Holy crap, Microsoft! I just wanted to read the document a colleague at another (much larger, older, and traditional) company had sent me.

49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Preservica wins two ARMA LIVE! ‘Best In Show’ Awards

Preservica

What a great start to 2016! After an exciting 2015, it was wonderful to read in the latest Jan/Feb issue of ARMA International’s Information Management magazine that Preservica has been awarded not just one, but two “ Best In Show ” awards for our contribution to the ARMA LIVE! conference in Washington DC at the end of last year. Preservica took the top honors for Best Product or Product Demo , and Best Industry Intelligence Session for our workshop “Will Your Vital Long-Term Digital Records Sti

article thumbnail

Internet of Things (IoT) and the Marketing Revolution

CGI

Internet of Things (IoT) and the Marketing Revolution. p.butler@cgi.com. Thu, 01/07/2016 - 04:00. The Internet of Things (IoT) has been described as the next ‘Industrial Revolution’ – but it also has major implications for marketers. At CGI, we define The Internet of Things (IoT) as a world where smart objects are seamlessly integrated as part of a global network; where smart objects interact without human intervention to deliver new services or improved processes.

IoT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Dutch Law Includes General Data Breach Notification Obligation and Larger Fines for Violations of the Data Protection Act

Hunton Privacy

On January 1, 2016, a Dutch law became effective that (1) includes a general obligation for data controllers to notify the Data Protection Authority (“DPA”) of data security breaches, and (2) authorizes the DPA to impose direct fines for violations of the Data Protection Act. Under the law, data controllers are required to immediately notify the DPA of any data security breaches that have, or are likely to have, serious adverse consequences to the protection of personal data.

More Trending

article thumbnail

Pew Research Center Issues Report on Attitudes Toward Sharing Personal Information with Private Sector

Hunton Privacy

On December 30, 2015, the Pew Research Center released a report on the results of a recent survey that asked 461 Americans about their feelings toward sharing personal information with companies. The survey found that a “significant minority” of American adults have felt “confused over information provided in company privacy policies, discouraged by the amount of effort needed to understand the implications of sharing their data, and impatient because they wanted to learn more about the informat

Privacy 45
article thumbnail

Digital transformation: are you flying, or falling with style?

CGI

Digital transformation: are you flying, or falling with style? shobana.lv@cgi.com. Wed, 01/06/2016 - 04:00. A pilot told me what it’s like to land a small plane. First, you hear your co-pilot counting down your approach: “8 miles, 10,000 feet.”. “6 miles, 6,000 feet.”. “4 miles, 2,000 feet.”. Finally, he says: “2 miles to run, 1,000 feet – DECIDE.”.

article thumbnail

FTC Issues Guidance on Native Advertising: Businesses Must Consider the Likelihood of Consumer Confusion

Hunton Privacy

Late last year the Federal Trade Commission issued enforcement guidance on “native advertising” — ads that purposely are formatted to appear as noncommercial and are integrated into surrounding editorial content. The agency’s guidance took two parts: an Enforcement Policy Statement on deceptively formatted ads, and a Guide for Business on native advertising.

IT 40
article thumbnail

Defense Department Issues Interim Rule Extending Time for Federal Contractors to Comply with Cybersecurity Regulations

Hunton Privacy

On December 30, 2015, the Department of Defense (“DoD”) issued a second interim rule (80 F. R. 81472) that extends the deadline by which federal contractors must implement the new cybersecurity requirements previously issued by the agency. This extension pushes back the compliance deadline to December 31, 2017. The second interim rule builds upon the first interim rule previously issued by the DoD on August 26, 2015.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is Tech Getting Boring?

John Battelle's Searchblog

The post Is Tech Getting Boring? appeared first on John Battelle's Search Blog. Finishing up my reading for the evening, I came across this serendipitous tweet.*. Intrigued (well done, Mr. Rosoff), I clicked the link, noting it was to Business Insider , a publication for which I have decidedly complicated feelings**. In any case, the story was great, if single sourced.

article thumbnail

Cybersecurity is everyone’s responsibility

CGI

Cybersecurity is everyone’s responsibility. kathy.jacquay@…. Thu, 01/07/2016 - 04:32. It’s no surprise to say that we have become a technology-reliant culture. Every organization, whether operating in the public or the private sector, relies on technology in some way as part of its processes. As a result, keeping this information secure has become a focal point for organizations.