Sat.Apr 01, 2017 - Fri.Apr 07, 2017

article thumbnail

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are! What aren’t everlasting though, are the so-called information governance “technologies” we use to bring these matters to heel. In recent decades, we have cycled through imaging, document […].

article thumbnail

DXC Technology: Relevant partner or the Sears of IT services?

Collaboration 2.0

A huge opportunity to provide large-scale business innovation with smart strategies and effective execution is tempered by strong competition, legacy perceptions, and a ticking clock to successfully demonstrate relevance and effectiveness.

IT 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Virginia Adds State Income Tax Provision to Data Breach Notification Law

Hunton Privacy

Recently, Virginia passed an amendment to its data breach notification law that adds state income tax information to the types of data that require notification to the Virginia Office of the Attorney General in the event of unauthorized access and acquisition of such data. Under the amended law, an employer or payroll service provider must notify the Virginia Office of the Attorney General after the discovery or notification of unauthorized access and acquisition of unencrypted and unredacted c

article thumbnail

The true value of customer-centric default management

CGI

The true value of customer-centric default management. harini.kottees…. Fri, 04/07/2017 - 05:20. Bill collecting is as old as business itself. Debtor prisons are gone, thankfully, but sometimes it seems like the basic dynamics of debt collection have not changed much since Victorian times. To the customer, repayment demands are often adversarial and off-putting.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Pick Up the Phone and Call.

John Battelle's Searchblog

The post Pick Up the Phone and Call. appeared first on John Battelle's Search Blog. (cross posted from NewCo Shift ). People in business who like to Get S**t Done fall in love with each version of The New. When I was a kid, new was the the Apple II. Then the IBM PC, digital phones and voice mail, the Mac — oh God, the Mac! — word processing, email, the cell phone, the Internet — mmmmm, the Internet!

More Trending

article thumbnail

Hunton Discusses Critical Cyber Coverage Selection Issues

Hunton Privacy

In March 2017, Syed Ahmad, a partner with Hunton & Williams LLP’s insurance practice, and Eileen Garczynski, partner at insurance brokerage Ames & Gough, co-authored an article, Protecting Company Assets with Cyber Liability Insurance , in Mealey’s Data Privacy Law Report. The article describes why cyber liability insurance is necessary for companies and provides tips on how it can make a big difference.

article thumbnail

Organizational changes to consider in pursuing digital transformation

CGI

Organizational changes to consider in pursuing digital transformation. harini.kottees…. Tue, 04/04/2017 - 08:00. As digitalization continues to drive significant change across industries, more and more companies recognize the need to transform for the future. In my previous blog , we discussed the three key areas that a digital transformation strategy should cover—organization, business model and technology.

article thumbnail

Bad Policy Makes Us Sick. Business Must Lead Us Back.

John Battelle's Searchblog

The post Bad Policy Makes Us Sick. Business Must Lead Us Back. appeared first on John Battelle's Search Blog. (Cross posted from NewCo Shift ). Walking around Disneyland with my daughter the other night, I found myself face to face with one of our country’s most intractable taboos. (Disneyland is still awesome for me, as a kid from 1970s LA. Truly magical.).

article thumbnail

Israel Passes Comprehensive Data Security and Breach Notification Regulations

Hunton Privacy

Haim Ravia and Dotan Hammer of Pearl Cohen Zedek Latzer Baratz recently published an article outlining Israel’s new Protection of Privacy Regulations (“Regulations”), passed by the Knesset on March 21, 2017. The Regulations will impose mandatory comprehensive data security and breach notification requirements on anyone who owns, manages or maintains a database containing personal data in Israel.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

President Trump Nullifies FCC Broadband Consumer Privacy Rules

Hunton Privacy

On April 3, 2017, President Trump signed a bill which nullifies the Broadband Consumer Privacy Rules (the “Rules”) promulgated by the FCC in October 2016. The Rules largely had not yet taken effect. In a statement, FCC Chairman Ajit Pai praised the elimination of the Rules, noting that, “in order to deliver that consistent and comprehensive protection, the Federal Communications Commission will be working with the Federal Trade Commission to restore the FTC’s authority to police Int

Privacy 45