Sat.Feb 28, 2015 - Fri.Mar 06, 2015

article thumbnail

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 101
article thumbnail

$1.1 Million Penalty Issued Under Canada’s Anti-Spam Law

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) announced today that it has issued a Notice of Violation to Quebec-based business Compu-Finder […].

IT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CGI Top 5 UK Employer Award

CGI

CGI Top 5 UK Employer Award. p.butler@cgi.com. Fri, 03/06/2015 - 02:00. Well here goes, my first blog, I hope you enjoy it. I plan to use this channel on a regular basis to share my thoughts on a variety of topics. CGI is a people business. Ensuring that we are providing the best possible environment and culture for our people to build their careers and develop their skills is critical to our success.

IT 40
article thumbnail

NTIA Announces New Multistakeholder Process on Drone Privacy

Hunton Privacy

On March 4, 2015, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process seeking comments on best practices concerning privacy, transparency and accountability issues related to the use of commercial and private unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Digital washing can wreck your strategic business planning

Collaboration 2.0

'Like France''s 1930''s Maginot Line, ''digital washing'' of old ideas and lack of forward thinking has the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

More Trending

article thumbnail

IoT – it’s all about insights

CGI

IoT – it’s all about insights. ravi.kumarv@cgi.com. Thu, 03/05/2015 - 04:11. The Internet of things (IoT) is set to generate vast amounts of new data, with some predictions at over 100Billion ‘things’ sending out data on the Internet by 2020. Without new analysis methods, the sheer volume, at best risks the value of data being lost, and at worst, may overwhelm a business completely.

IoT 40
article thumbnail

Department of Education Releases Guidance for Schools Regarding Terms of Service Offered by Providers of Online Educational Services

Hunton Privacy

On February 26, 2015, the Department of Education’s Privacy Technical Assistance Center (“PTAC”) issued guidance to assist schools, school districts and vendors with understanding the primary laws regulating student privacy and how compliance with those laws may be affected by Terms of Service (“TOS”) offered by providers of online educational services and mobile applications.

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools.

article thumbnail

Feature Differences in Office 365 Plans

JKevinParker

I wanted to compare exactly which features are available for these Office 365 plans: Office 365 Business Premium. Office 365 Enterprise E1. Office 365 Enterprise E3. The Office 365 plan comparison page did not give me enough detail. So I checked out the latest Office 365 service comparison page on TechNet (updated 1/28/2015 at the time of this post).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.

article thumbnail

Third Circuit Hears Oral Arguments in FTC v. Wyndham

Hunton Privacy

On March 3, 2015, the Third Circuit heard oral arguments in FTC v. Wyndham Worldwide Corp. (“Wyndham”) on whether the FTC has the authority to regulate private companies’ data security under Section 5 of the FTC Act. As we previously reported , on June 26, 2012, the FTC announced that it had filed suit against Wyndham and three of its subsidiaries alleging that the company posted misleading representations on Wyndham websites regarding how the company safeguarded customer information.

article thumbnail

Sotto Featured on Penn Law’s “Great Minds on Law and Life” Podcast on New Threats to Digital Privacy and Cybersecurity

Hunton Privacy

On March 3, 2015, Steven Barnes, the host of the new Penn Law podcast series, Case in Point: Great Minds on Law and Life, interviewed Lisa Sotto , partner and chair of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, and Anita Allen, professor of law and philosophy at the University of Pennsylvania Law School and vice provost for faculty on trends in privacy and cybersecurity, discussing what we mean when we talk about our right to privacy.

Privacy 40
article thumbnail

Sotto Speaks Out on Potential for “Armageddon-Type Cyber Event”

Hunton Privacy

On March 2, 2015, HuffPost Live interviewed four cybersecurity experts in response to a top financial regulator’s warning of an “Armageddon-type cyber event” that could eventually affect the U.S. economy. Lisa Sotto , partner and chair of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was featured, describing the threat as legitimate and stressing that hackers are becoming more creative, sophisticated and motivated.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

White House Releases Discussion Draft for a Consumer Privacy Bill of Rights

Hunton Privacy

On February 27, 2015, the White House released a highly-anticipated draft of the Consumer Privacy Bill of Rights Act of 2015 (the “Act”) that seeks to establish baseline protections for individual privacy in the commercial context and to facilitate the implementation of these protections through enforceable codes of conduct. The Federal Trade Commission is tasked with the primary responsibility for promulgating regulations and enforcing the rights and obligations set forth in the Act.

Privacy 40
article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.

article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.