ABBYY Releases Research: State of Process Mining and Robotic Process Automation

Document Imaging Report

Global survey results released today found that process knowledge is the primary success factor for robotic process automation (RPA) projects, yet only 31% of US organizations are currently using process mining tools to understand their processes. Process mining .

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

My current work is split between two projects: One has to do with data governance, the other political media. Big data, data breaches, data mining, data science…Today, we’re all about the data. And second… Governance. But Governance? Data Governance.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home, as well. His company supplies a co-managed SIEM service to mid-sized and large enterprises, including local government agencies. Security of local and state government agencies takes on a higher level of urgency as we get closer to the midterm elections.

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. federal government. Released in April, the playbook helps government organizations envision how blockchain technology can solve a myriad of government challenges. Future versions of the playbook will add details on implementation and integration of blockchain solutions within the government ecosystem. Importance of governance.

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

It will be possible to put more emphasis on the people, process and data governance which really make MDM live and breathe.”. A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals.

MDM 82

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I worked in several Telcos and latterly in the City for an international insurance company. Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. Kate Tickner, Reltio.

MDM 52

ABBYY Announces Its Agreement to Acquire TimelinePI to Deliver Digital Intelligence for Enterprise Processes

Document Imaging Report

TimelinePI’s vision of combining the most versatile process mining and operational monitoring with cutting-edge, process-centric AI and machine learning will serve as a critical cornerstone to ABBYY’s Digital IQ strategy.

ABBYY Acquires TimelinePI to Strengthen Leadership Role in Digital Transformation

Document Imaging Report

The acquisition of TimelinePI represents a significant milestone in establishing ABBYY’s leadership role in the digital transformation market as well as a global player in the emerging process mining market, which Gartner estimates will triple by 2023. MILPITAS, Calif.,

Machine Learning is Carving the Path toward Digital Transformation

InfoGoTo

Perhaps the most dramatic finding of the AIIM study is that 84% of respondents agreed or strongly agreed that machine learning will revolutionize their approach to information governance.

Interview with Gus Tugendhat of Tussell

Information Matters

I recently sat down with Gus Tugendhat, founder of UK-based government tenders and contracts data provider, Tussell. We want to make it as easy as possible for companies to do business with the government – in the UK and around the world. What we call B2G (Business to Government).

Sales 52

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

The new cyber intelligence report expects the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. State actors tend to zero in on government agencies or utilities and energy targets. They look to steal credit card numbers from financial services & insurance companies or install malware on the critical systems used by healthcare companies. State Attackers Moving from Stealing Data to Social Meddling.

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

These were companies spanning all sorts of different industries; big tech, general infosec, antivirus, hosting, finance, e-commerce, cyber insurance - I could go on.

IT 113

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

They could also capture the household recycling data, add data visualizations, and sell or share that to other companies, local governments or environmental agencies. All of this information has a value to city planners, but also would be of interest to law enforcement, hospitals, insurance companies, stores, restaurants and car manufacturers—and even energy suppliers planning where to locate vehicle charging stations.

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

Number 1 is "Mining, Resources & Energy" which had a local boom here but is now rapidly declining (down 14% on the previous year). Take mining out of the picture and the top industry ("Consulting & Strategy"), pays only 5% more than tech. Patience. Frugality. Sacrifice.

Looking Through the Cloudy PRISM

Data Loss DB

As you have no doubt heard, a lot of fuss has been made over the past couple days involving both NSA, Verizon, and Facebook, as well as several other companies and governments. On June 6, 2013, the Guardian published an article that suggested a classified order was issued on April 25, 2013 that allowed the United States government to collect data until July 19, 2013 and then hand it over to the NSA.