Sat.Aug 26, 2017 - Fri.Sep 01, 2017

article thumbnail

Mergers and acquisitions: How to evaluate the target company’s RIM program

TAB OnRecord

In any merger or acquisition, you must have an accurate picture of what you are getting as part of the deal. For records and information management teams, this means having a clear understanding of the target company’s RIM program and records collections. In a two-part blog post we share a set of assessment questions that… Read More. The post Mergers and acquisitions: How to evaluate the target company’s RIM program appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Begin your cognitive enterprise journey at DataWorks Summit Sydney

IBM Big Data Hub

The power of machine learning, data science and big data is no longer considered a hype or fad. It’s a reality and it’s impacting the bottom lines of businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Releases Draft Guidelines on De-Identification of Personal Information

Hunton Privacy

Recently, the National Information Security Standardization Technical Committee of China published a draft document entitled Information Security Technology – Guidelines for De-Identifying Personal Information (the “Draft Guidelines”). The Draft Guidelines are open for comment from the general public until October 9, 2017. The Draft Guidelines provide a voluntary technical specification, the purpose of which is to provide guidance to data processers on the de-identification of personal informati

article thumbnail

Db2 12 for z/OS SQL Enhancements: Advanced Triggers

Robert's Db2

In this, the fourth of a set of four entries covering SQL enhancements introduced with Db2 12 for z/OS, I will describe new trigger capabilities delivered by way of what are called "advanced triggers" (the kind of trigger that you could define prior to Db2 12 -- and which you can still create in a Db2 12 system -- is now referred to as a "basic trigger").

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hurricane Harvey Update

Gimmal

Below is a letter to our customer and partner community from Gimmal CEO, K. David Quackenbush.

73

More Trending

article thumbnail

How to trace ransomware payments end-to-end - an overview

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Dark Web and the Evolving Credit Card Fraud Threat

Rippleshot

As if issuers didn’t have enough to worry about as they combat rising card fraud rates, the dark web market continues to be a haven for hackers to scoop up droves of credit card data — which is then used to commit even more fraud. From advanced techniques, bots that make online fraudulent purchases to hacking payment systems, the packaging and auctioning of compromised cards across the dark web to commit and monetize card fraud occurs faster than a bank can detect a compromise, identify compromi

article thumbnail

New Data Processing Notice Requirements Take Effect in Russia

Hunton Privacy

As reported in BNA Privacy Law Watch , on August 22, 2017, the Russian privacy regulator, Roskomnadzor, announced that it had issued an order (the “Order”), effective immediately, revising notice protocols for companies that process personal data in Russia. Roskomnadzor stated that an earlier version of certain requirements for companies to notify the regulator of personal data processing was invalidated by the Russian Telecom Ministry in July.

article thumbnail

Experts answer your top data science and machine learning questions

IBM Big Data Hub

There’s no doubt data science and machine learning are main areas of focus for enterprises to better their business. However, talking about data science and machine learning isn’t the same as making it a reality.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Confessions of an InfoSec Burnout

The Falcon's View

Soul-crushing failure. If asked, that is how I would describe the last 10 years of my career, since leaving AOL. I made one mistake, one bad decision, and it's completely and thoroughly derailed my entire career. Worse, it's unclear if there's any path to recovery as failure piles on failure piles on failure. The Ground I've Trod. To understand my current state of career decrepitude, as well as how I've seemingly become an industry pariah.

Paper 45
article thumbnail

Delaware amends data breach notification law

Data Protection Report

Earlier this month, Delaware revamped its data breach notification law, with changes to go into effect April 14, 2018. Most notably, the new law requires any entity that has suffered a data breach that includes social security numbers to provide free credit monitoring services to affected residents for one year. The entity must provide all information necessary for the resident to enroll in such services as well as instructions for how to implement a credit freeze.

article thumbnail

FTC Posts Seventh Blog in Its “Stick with Security” Series

Hunton Privacy

On September 1, 2017, the FTC published the seventh blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Secure remote access to your network , outlines important security measures businesses should take to ensure that outside entryways to their systems are sensibly

IT 40
article thumbnail

Companies that share data can’t ignore governance

IBM Big Data Hub

Some people think of master data management (MDM) purely as a platform for organizing and mobilizing enterprise information. While this is true, leading companies view MDM more as a philosophy or a set of best practices, not just a suite of software tools.

MDM 72
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to diversify your IT sourcing strategy

CGI

How to diversify your IT sourcing strategy. Anonymous. Tue, 08/29/2017 - 08:00. Changing market dynamics are pushing many organizations to diversify their IT sourcing portfolios to achieve the best balance of quality, risk management, value and time to market. Today’s IT buyers increasingly seek to optimize the geographic distribution of their sourcing by taking into account the type of work to be performed to smartly achieve business outcomes while minimizing cost.

IT 40
article thumbnail

Who will win the driverless / autonomous car wars?

Information Matters

I’ve been planning some new classes for the fast-approaching semester and have decided to use the example of driverless vehicles to help my students think about what determines which type of companies win when a new technology emerges. I think the autonomous car will provide some food for thought. Historical case studies ( eg. Microsoft and the PC market, Android/iOS and the smartphone market) are great because we can see very clearly why the winners in those markets emerged but, as with o

article thumbnail

Record Breach Settlement in Anthem Class Action Receives Judge Approval

Hunton Privacy

On August 25, 2017, U.S. District Judge Lucy Koh signed an order granting preliminary approval of the record class action settlement agreed to by Anthem Inc. this past June. The settlement arose out of a 2015 data breach that exposed the personal information of more than 78 million individuals, including names, dates of birth, Social Security numbers and health care ID numbers.

article thumbnail

Deliver more intelligence to intelligent energy systems

IBM Big Data Hub

In today’s energy industry, one of the key priorities is finding new ways to cost efficiently keep up with insatiable demands for power, while also delivering renewable energy. You must be able to predict when events will occur and make the first move. Being first to respond to customer or market events could be the difference between success and failure.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Difference between Document Scanning and Document Conversion

Archive Document Data Storage

The decision about whether or not to “go paperless” can be daunting, especially if you don’t understand the terminology that’s used by scanning and imaging providers. Although the terms “document scanning” and “document conversion” are used interchangeably, each is a unique process. In this blog, we help you understand the difference between the two.

Paper 40
article thumbnail

Skin Vision in the Soviet Union

Archives Blogs

How would you describe the physical feeling of a color? Warm? Cold? Slippery? Coarse? Sticky? Would you be able to distinguish between colored objects without looking at them? This 1960s episode of Science and Engineering reported that several young women in the Soviet Union were able to correctly identify colors based on touch alone, a phenomenon called “ dermo-optical perception.”.

article thumbnail

Eighth Circuit Finds Article III Standing Yet Affirms Dismissal of Scottrade Breach Case

Hunton Privacy

On August 21, 2017, the United States Court of Appeals for the Eighth Circuit affirmed the dismissal of a putative class action arising from the Scottrade data breach. Notably, however, the Eighth Circuit did not agree with the trial court’s ruling that the plaintiff lacked Article III standing, instead dismissing the case with prejudice for failure to state a claim. .

article thumbnail

ASC 606 & IFRS 15: A new accounting standard

IBM Big Data Hub

A new accounting standard that's changing how sales and finance leaders report incentive compensation expenses.

Sales 69
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Weekly Independent: August 28, 2017

eSecurity Planet

News and notes for independent professionals and their clients. This is the August 28, 2017 edition.

40
article thumbnail

Draft National Archives Strategic Plan

Archives Blogs

The National Archives, like all other Federal agencies, is required to produce a new Strategic Plan every four years. Our Strategic Plan establishes our Mission, Strategic Goals, and Objectives, and describes how NARA will meet our ambitious vision. We have posted a new, draft Strategic Plan and invite feedback from public and government customers, stakeholders, and colleagues in the archival, historical, and records management communities.

article thumbnail

How to trace ransomware payments end-to-end

Elie

Over the last two years, ransomware has been all over the news. Hardly a week goes by without a report of a large ransomware outbreak or the emergence of a new ransomware family. Despite all this attention, very little is known about how profitable ransomware is and who the criminals are that benefit from it. To answer these questions and expose the inner workings of the ransomware economy, our research team at Google, in partnership with.

article thumbnail

Introducing Behavioral Information Security

The Falcon's View

I recently had the privilege of attending BJ Fogg's Behavior Design Boot Camp. For those unfamiliar with Fogg's work, he started out doing research on Persuasive Technology back in the 90s, which has become the basis for most modern uses of technology to influence people (for example, use of Facebook user data to influence the 2016 US Presidential Election).

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Your desk is a guide to the future of work

MIKE 2.0

The future of work is the topic on everyone’s lips. The talk of automation and artificial intelligence can seem really abstract and alien, making the future seem scarier than really needs to be the case. A good way for white collar workers to think about what lies ahead is by looking at their office surroundings and how those might change in the coming years.

article thumbnail

Labor Day

Archives Blogs

Happy Labor Day, or the unofficial end of summer in the US. Here in the South, students have been back to school since mid-August in some cases but we have had a few pleasant mornings so maybe a north Florida fall is coming earlier than usual? We can only hope! In celebration of Labor Day, Special Collections & Archives is closed Monday, September 4th.

article thumbnail

FTC Posts Sixth Blog in Its “Stick with Security” Series

Hunton Privacy

On August 25, 2017, the FTC published the sixth blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Segment your network and monitor who’s trying to get in and out , illustrates the benefits of segmenting networks and monitoring the size and frequency of data transf

IT 40