Senate Bill 1386 Reports

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Computer Weekly – 21 March 2023: The risks of an imbalance in AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.
Posted: 17 Mar 2023 | Published: 21 Mar 2023

TechTarget ComputerWeekly.com

Computer Weekly – 9 January 2018: Countdown to GDPR
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Jan 2018

TechTarget ComputerWeekly.com

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

Using Case Management to Empower Employees and transform Customer Service
sponsored by Kofax, Inc.
WHITE PAPER: This white paper demonstrates how empowering your employees can lead to significantly improved customer service. Learn how dynamic case management applications can assist in delivering employee empowerment and transform the customer experience.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Kofax, Inc.

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 01 Jul 2021 | Published: 01 Jul 2021

TechTarget ComputerWeekly.com