2015

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me.

Uber, The Rashomon.

John Battelle's Searchblog

The post Uber, The Rashomon. appeared first on John Battelle's Search Blog. Our industry loves a rashomon, and in the past year or two, our collective subject of debate has been Uber.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Community Channel’s Natalie Tran on Password Policy

Roger's Information Security

The post Community Channel’s Natalie Tran on Password Policy appeared first on Roger's Information Security Blog. General Passwords

Living and learning with a Yuneec Typhoon Q500 4k drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k

83

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Snapshot: College and University Retention Schedules

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.).

More Trending

What We Can Learn From the Hacking Team Hack

Productivity Bytes

There is one word that strikes fear into the heart of government agencies and firms engaged in dealings of a secretive and questionable nature.

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

The single most important industry event I have yet attended; densely packed with immediately useable approaches, methodologies and best practices; staffed by passionate and supremely experienced SMEs – both within and extraneous to the discipline – providing a 360-degree view of the imminent CIGO revolution; overall a grand slam.

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events.

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did!

ECM 72

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck."

In praise of David Smith

Data Protector

As Deputy Commissioner David Smith completes his last lap of the data protection conference circuit, various speakers are extending their hastily-prepared remarks to include a short homily on his contribution to data protection over the decades. Yes, he really has been at the ICO for decades.

IT 156

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing.

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Living and learning with a Yuneec Typhoon Q500 drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k. Reviews

83

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents.

Do CISOs Dream of Electric Boardrooms?

ShackF00

This, believe it or not, is a “year end” post above all, with food for thought going into 2016. So here goes. CISOs are an in-demand bunch. Well, that’s what the media tells us, anyway.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ?

Sales 52

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences.

“Honing in on the Relevant Stuff” | Jinfo (formerly FreePint) Reviews Attensa

Attensa

Dale Moore is a UK-based content specialist and contributing author at Jinfo. Jinfo research is at the heart of the business information industry. Every day they work with information pros who are reimagining information services. Their focus is on aligning information services with corporate strategy and initiatives. The following is a summary of Dale’s comprehensive review of Attensa.

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose.

IT 70

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Not a lot of news from Big Brother Watch today

Data Protector

What are we to make of today’s Big Brother Watch report which claims that local authorities commit 4 data breaches every day? In the words of TV magician Paul Daniels: “Not a lot.” At first glance, it looks impressive. It’s almost 200 pages long.

Remember the Internet When Considering The Things

John Battelle's Searchblog

The post Remember the Internet When Considering The Things appeared first on John Battelle's Search Blog. Last month I sat down with my old pal Jay Adelson (Digg, Revision 3, Equinix, SimpleGeo) who together with his partner Andy Smith is raising a new fund focused on the Internet of Things.

IT 114

Information Governance in 2020

Positively RIM

Gentle readers: My thoughts on this subject were just published in the Fall issue of The Ethical Boardroom. Here is a link: [link] As always, your feedback, kudos, and brickbats are welcome. Thanks for your interest, Gordy

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key. Enterprise Software

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

FOIA 44

Brazil Releases Revised Draft Privacy Bill

Hunton Privacy

In late October, the Brazilian Ministry of Justice (the “Ministry”) issued its revised Draft Bill for the Protection of Personal Data (“Draft Bill”). The Ministry released its preliminary draft in January 2015, and the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”) filed public comments to the draft on May 5, 2015.

Improving road inspections and maintenance through mobile technology

CGI

Improving road inspections and maintenance through mobile technology. shobana.lv@cgi.com. Wed, 06/24/2015 - 08:00. Maintaining road infrastructures is highly complex, but also essential for the safety of travelers and economic progress.

Paper 55