Morning on cloud planet
Collaboration 2.0
MARCH 21, 2012
Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.
Collaboration 2.0
MARCH 21, 2012
Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.
Hunton Privacy
MARCH 23, 2012
On March 19, 2012, the European Commission hosted this year’s Safe Harbor Conference in Washington, D.C., to address the transfer of data from Europe to the United States. Although it appears the Safe Harbor framework will remain unchanged for the time being, it seems unlikely the United States will be considered adequate, or even interoperable, with the EU for purposes of cross-border data transfers.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Preservica
MARCH 21, 2012
You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.
CGI
MARCH 21, 2012
Automation beyond Robots. ravi.kumarv@cgi.com. Wed, 03/21/2012 - 08:00. Thinking about automation in business we picture robots in factories, right? But this is only a small part of the story and the opportunities for business to automate a wide range of activities are astonishing. Which makes me wonder why the level of business automation in Europe is still relatively low?
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Scary Beasts Security
MARCH 17, 2012
I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
John Battelle's Searchblog
MARCH 22, 2012
Next week I travel to Washington DC. While I am meeting with a wide swath of policymakers, thinkers, and lobbyists, I don’t have a well-defined goal – I’m not trying to convince anyone of my opinion on any particular issue (though certainly I’m sure I’ll have some robust debates), nor am I trying to pull pungent quotes from political figures for my book.
Hunton Privacy
MARCH 22, 2012
On March 20, 2012, the Senate of the Philippines unanimously approved the omnibus Data Privacy Act of 2011, also known as “An Act Protecting Individual Personal Information in Information and Communications Systems in the Government and the Private Sector, Creating for This Purpose a National Data Protection Commission, and for Other Purposes” (S.B. 2965).
Hunton Privacy
MARCH 21, 2012
On March 21, 2012, the U.S. Department of Commerce’s National Telecommunications and Information Administration announced a one-week extension to the deadline for responses to their March 2 request for public comments on the multistakeholder process to develop consumer data privacy codes of conduct. Comments are now due on Monday, April 2, 2012. The request for comments relates to both the topics and processes that will inform the creation of binding codes of conduct as discussed in the Obama Ad
Scary Beasts Security
MARCH 22, 2012
This year's Pwn2Own and Pwnium contests were interesting for many reasons. If you look at the results closely, there are many interesting observations and conclusions to be made. $60k is more than enough to encourage disclosure of full exploits As evidenced by the Pwnium results , $60k is certainly enough to motivate researchers into disclosing full exploits, including sandbox escapes or bypasses.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
John Battelle's Searchblog
MARCH 22, 2012
Next week I travel to Washington DC. While I am meeting with a wide swath of policymakers, thinkers, and lobbyists, I don’t have a well-defined goal – I’m not trying to convince anyone of my opinion on any particular issue (though certainly I’m sure I’ll have some robust debates), nor am I trying to pull pungent quotes from political figures for my book.
Let's personalize your content