Sat.Jun 10, 2017 - Fri.Jun 16, 2017

article thumbnail

If It Ain’t Broke, Fix it Anyway

Weissman's World

When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. But when it comes to disaster recovery and, especially, continuity of operations, I vehemently disagree. These two disciplines exist specifically to ensure […].

IT 120
article thumbnail

What You Need to Know About Voice Hacking

Productivity Bytes

As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can … + Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Belgian DPA Issues Recommendation on DPO Appointment under GDPR

Hunton Privacy

Recently, the Belgian Privacy Commission (the “Belgian DPA”) released a Recommendation (in French and Dutch ) regarding the requirement to appoint a data protection officer (“DPO”) under the EU General Data Protection Regulation (“GDPR”). The Recommendation aims to provide guidance in response to the many questions that the Belgian DPA has received so far regarding the DPO function, in particular regarding the compatibility of the DPO function with other existing functions within a company ( e.g

GDPR 56
article thumbnail

Uber Does Not Equal The Valley

John Battelle's Searchblog

The post Uber Does Not Equal The Valley appeared first on John Battelle's Search Blog. Now that the other shoe has dropped, and Uber’s CEO has been (somewhat) restrained, it’s time for the schadenfreude. Given Uber’s remarkable string of screwups and controversies, it’s coming in thick , in particular from the East coast. And while I believe Uber deserves the scrutiny — there are certainly critical lessons to be learned — the hot takes from many media outlets are starting to get lazy.

IT 55
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Establish a Personal Brand

PerezBox

It’s only recently that I have grown a deeper appreciation for personal brands. Prior to 2010, the idea of establishing a personal brand was a foreign concept to me. In. Read More. The post Establish a Personal Brand appeared first on PerezBox.

Sales 53

More Trending

article thumbnail

South Korea Joins the APEC Cross-Border Privacy Rules System

Hunton Privacy

On Monday, June 12, 2017, South Korea’s Ministry of the Interior and the Korea Communications Commission announced that South Korea has secured approval to participate in the APEC Cross-Border Privacy Rules (“CBPR”) system. South Korea had submitted its intent to join the CBPR system back in January 2017. South Korea will become the fifth APEC economy to join the CBPR system.

Privacy 53
article thumbnail

Considerations for ERM Implementations

JKevinParker

On 5/17/2017 I presented to the Northern Virginia Chapter of ARMA on "Considerations for ERM Implementations". I created this talk with all the highlights I would make if I had only one shot to provide some lessons learned on ERM solution projects. Records Management is an essential component of every organization's Information Management capabilities.

article thumbnail

Relevancy – the killer app

Attensa

In his book The New Know: Innovation Powered by Analytics, Thornton May explores the consequences of living and and business in the era of information abundance. His perspective is summarized in pdf of of the first chapter. I have written and spoken about the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload.

article thumbnail

Challenging your organization: 11 cybersecurity questions CEOs need to ask

CGI

Challenging your organization: 11 cybersecurity questions CEOs need to ask. harini.kottees…. Wed, 06/14/2017 - 06:00. It is increasingly clear that cybersecurity is a key factor in a company’s performance, reputation and valuation. This point is brought home in The Cyber-Value Connection report published by CGI in the UK, which quantifies the connection between a severe cyber breach and damage to company value.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Digital Transformation Is So Hard

Information is Currency

Organizations aren’t falling behind well-established standards so much as “struggling to keep up with accelerating standards,” the PwC report said. It’s clear “most are not ready for what comes next – as technologies continue to combine and advance and new ways of doing business go from inception to disruption seemingly overnight,” it added.

article thumbnail

Understand the Problem To Build A Better Mousetrap

PerezBox

When I talk to organizations that are entering a new market I can quickly identify the ones that will succeed. I do so by looking for answers to two questions: Read More. The post Understand the Problem To Build A Better Mousetrap appeared first on PerezBox.

article thumbnail

OCR and Health Care Industry Cybersecurity Task Force Publish Cybersecurity Materials

Hunton Privacy

The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) and the Health Care Industry Cybersecurity Task Force (the “Task Force”) have published important materials addressing cybersecurity in the health care industry. The OCR checklist , entitled “My entity just experienced a cyber-attack! What do we do now?,” lists key steps that an organization must undertake in the event of a cyber attack.

article thumbnail

The drive to innovate among U.S. insurance carriers

CGI

Stimuler l’innovation du secteur de l’assurance aux États-Unis. harini.kottees…. Mon, 06/12/2017 - 02:00. Une nouvelle étude de Pierre Audoin Consultants (PAC) commanditée par CGI, intitulée Harnessing Innovation in European Insurance (Exploiter l’innovation dans le monde des assurances européennes), se penche sur la dynamique du marché actuel de l’assurance en Europe et sur la façon dont les assureurs européens mettent l’accent sur l’innovation pour stimuler leurs croissance et compétitivité fu

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.