article thumbnail

Business process reengineering (BPR) examples

IBM Big Data Hub

BPR examples are not one-time projects, but rather examples of a continuous journey of innovation and change focused on optimizing end-to-end processes and eliminating redundancies. This blog outlines some BPR examples that benefit from a BPM methodology. This can enable significant cost savings and improve profitability.

article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

For example, the mid-eighteenth-century democracies were designed under the assumption that both travel and communications were hard. Indeed, as a technologist who studies complex systems and their security , I believe the very idea of representative government is a hack to get around the technological limitations of the past.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Release Staff Recap of Informational Injury Workshop

HL Chronicle of Data Protection

The Federal Trade Commission (FTC) recently published a paper recapping its December 2017 Informational Injury Workshop. The paper noted that several important points emerged from the workshop: Informational Injuries: Examples and Harms. They argued that this can lead to more serious issues for treatment and patient safety.

Privacy 40
article thumbnail

Empirical Evaluation of Secure Development Processes

Adam Shostack

Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I’m also pleased to say that the workshop report is now available at [link].

article thumbnail

CIPL Hosts Workshop on Transparency and Risk Assessment

Hunton Privacy

The workshop was led by Bojana Bellamy, CIPL’s President, and featured contributions from many leaders in the field, including the UK ICO, Belgium and Hong Kong’s Privacy Commissioners, and counsel and privacy officers from several multinational companies. How do we get beyond legal transparency?

Risk 45
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. But there are also some quick wins, especially in the realm of "using your common sense". Let's dive into it.

IoT 143
article thumbnail

IBM researchers to publish FHE challenges on the FHERMA platform

IBM Big Data Hub

Winners will also be offered the opportunity to present their solutions in a special workshop currently being planned.