Sat.Mar 17, 2012 - Fri.Mar 23, 2012

article thumbnail

Morning on cloud planet

Collaboration 2.0

Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.

Cloud 76
article thumbnail

EU-U.S. Interoperability Not Ready for Prime Time

Hunton Privacy

On March 19, 2012, the European Commission hosted this year’s Safe Harbor Conference in Washington, D.C., to address the transfer of data from Europe to the United States. Although it appears the Safe Harbor framework will remain unchanged for the time being, it seems unlikely the United States will be considered adequate, or even interoperable, with the EU for purposes of cross-border data transfers.

Paper 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

So you want to implement a digital preservation management system?

Preservica

You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.

article thumbnail

Automation beyond Robots

CGI

Automation beyond Robots. ravi.kumarv@cgi.com. Wed, 03/21/2012 - 08:00. Thinking about automation in business we picture robots in factories, right? But this is only a small part of the story and the opportunities for business to automate a wide range of activities are astonishing. Which makes me wonder why the level of business automation in Europe is still relatively low?

Paper 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Some random observations on Linux ASLR

Scary Beasts Security

I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.

More Trending

article thumbnail

Will Transparency Trump Secrecy In The Digital Age?

John Battelle's Searchblog

Next week I travel to Washington DC. While I am meeting with a wide swath of policymakers, thinkers, and lobbyists, I don’t have a well-defined goal – I’m not trying to convince anyone of my opinion on any particular issue (though certainly I’m sure I’ll have some robust debates), nor am I trying to pull pungent quotes from political figures for my book.

article thumbnail

Philippines Passes Omnibus Data Protection Law

Hunton Privacy

On March 20, 2012, the Senate of the Philippines unanimously approved the omnibus Data Privacy Act of 2011, also known as “An Act Protecting Individual Personal Information in Information and Communications Systems in the Government and the Private Sector, Creating for This Purpose a National Data Protection Commission, and for Other Purposes” (S.B. 2965).

article thumbnail

NTIA Extends Deadline for Comments on Developing Consumer Data Privacy Codes of Conduct

Hunton Privacy

On March 21, 2012, the U.S. Department of Commerce’s National Telecommunications and Information Administration announced a one-week extension to the deadline for responses to their March 2 request for public comments on the multistakeholder process to develop consumer data privacy codes of conduct. Comments are now due on Monday, April 2, 2012. The request for comments relates to both the topics and processes that will inform the creation of binding codes of conduct as discussed in the Obama Ad

article thumbnail

On the failings of Pwn2Own 2012

Scary Beasts Security

This year's Pwn2Own and Pwnium contests were interesting for many reasons. If you look at the results closely, there are many interesting observations and conclusions to be made. $60k is more than enough to encourage disclosure of full exploits As evidenced by the Pwnium results , $60k is certainly enough to motivate researchers into disclosing full exploits, including sandbox escapes or bypasses.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Will Transparency Trump Secrecy In The Digital Age?

John Battelle's Searchblog

Next week I travel to Washington DC. While I am meeting with a wide swath of policymakers, thinkers, and lobbyists, I don’t have a well-defined goal – I’m not trying to convince anyone of my opinion on any particular issue (though certainly I’m sure I’ll have some robust debates), nor am I trying to pull pungent quotes from political figures for my book.