Remove tag
Remove Artificial Intelligence Remove Government Remove Presentation Remove Privacy
article thumbnail

My Experience at the Washington DC Masters Conference

eDiscovery Daily

The agenda featured a diverse range of topics, such as Modern Data, Link Files, eDiscovery Case Law, and Artificial Intelligence, making it an exceptional experience for attendees. Mable Tun weighed in with the need to have targeted collections or a step to cull out personal data from smartphone evidence due to privacy concerns.

article thumbnail

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

Facial recognition software (FRS) is a biometric tool that uses artificial intelligence (AI) and machine learning (ML) to scan human facial features to produce a code. Amazon Rekognition has been well regarded by government agencies and other secure users. However, there are a few noteworthy concerns. Amazon Rekognition.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSA Research Director Wants ‘Accelerated AI’ to Augment Human Analysis

Archives Blogs

The need to accelerate deployment of Artificial Intelligence (AI) by executive branch agencies also requires the development and retention of human expertise, according to Dr. Deborah Frincke, Director of Research at the National Security Agency (NSA).

article thumbnail

What Can We Learn About the IG Profession from the ARMA InfoCon 2020 Taxonomy

ARMA International

Now, many of the terms in our taxonomy represent common themes you’d expect to see at an ARMA conference, terms like “records management,” “information governance,” and “information management.” Information Governance Implementation Model: Our IG model was launched earlier this year; a few sessions are specifically adapted to the model.

ROT 65
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Introduction.