1) Netapp discussed technologies like Data Fabric and Netapp Private Storage for cloud that address issues around data protection and vendor lock-in in smart cities.
2) Building smart cities requires more than just technology and involves partnerships and policies.
3) For smart cities to work, they need large amounts of data but this raises privacy concerns around personal data collection, usage, and security. Due diligence around these issues is important.
Security First: What it is and What it Means for Your BusinessGeorgian
Software companies, and data-rich SaaS companies in particular, will go through a paradigm shift over the next few years in which security becomes a company-wide priority. Rather than an after-the-fact compliance activity the best companies will treat security and privacy as a strategic imperative, incorporating security thinking into all aspects of their business. This slideshare introduces the concept of Security First, why it is important and what it will mean for your organization.
Bitcoin, The New Great Opportunity for Entrepreneurs on the InternetAlejandro Sewrjugin
Bitcoin unleash a New Era. Similar as the PC breakthrough in 1975 or the Internet in 1993 -as Marc Andreesen stated-, Entrepreneurs have again great opportunities ahead to build a new internet.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. MIT Startup Exchange
"Cybersecurity investment trends" Chris Lynch, Partner, Atlas Ventures. Cybersecurity Innovation (5/28), MIT Startup Exchange (STEX), Thursday May 28, 2015, 8:30 AM to 11:30 AM, at One Main Street, Cambridge, MA.
Security First: What it is and What it Means for Your BusinessGeorgian
Software companies, and data-rich SaaS companies in particular, will go through a paradigm shift over the next few years in which security becomes a company-wide priority. Rather than an after-the-fact compliance activity the best companies will treat security and privacy as a strategic imperative, incorporating security thinking into all aspects of their business. This slideshare introduces the concept of Security First, why it is important and what it will mean for your organization.
Bitcoin, The New Great Opportunity for Entrepreneurs on the InternetAlejandro Sewrjugin
Bitcoin unleash a New Era. Similar as the PC breakthrough in 1975 or the Internet in 1993 -as Marc Andreesen stated-, Entrepreneurs have again great opportunities ahead to build a new internet.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. MIT Startup Exchange
"Cybersecurity investment trends" Chris Lynch, Partner, Atlas Ventures. Cybersecurity Innovation (5/28), MIT Startup Exchange (STEX), Thursday May 28, 2015, 8:30 AM to 11:30 AM, at One Main Street, Cambridge, MA.
Why do smart cities goes lean?
This presentation shares the basics and opportunities for any public sector agency and those in pubic appointed positions.
Data is the oil of the new millennia…considered a company’s most important asset by many. At the same time, in this age of digitalization, companies are more and more exposing their most important assets to cybercrime – the theft and misuse of data. In this session, you’ll learn the 7 major trends putting businesses at risk, the one big mistake most are making and how you can accurately measure risk and begin taking action, without breaking the bank.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
The Fourth Industrial Revolution?
Blockchain Components
Blockchain Platforms: Ethereum
Blockchain Platforms: Hyperledger
Big Data Use Cases
Big Data Analysis Flow
Artificial Intelligence Revolution
Deep Learning Introduction
Future of AI
Blockchain Innovation Checkpoint
AI Innovation Checkpoint
AI Innovation Frontline: Emotion AI
AI Innovation Frontline: AI Chatbot
AI Innovation Frontline: 3D Recognition
Block Innovation Frontline: DeFi
Block Innovation Frontline: Issues with Public Chain
Blockchain + AI: Blockchain for AI Business Cases
Blockchain + AI: AI for Blockchain Business Cases
Example of Blockchain + AI + Big Data Integration System
Business Model Canvas
Blockchain Business Model Canvas
Five Big Bets in a Blockchain World (June 2018)Mike Wons
Five Big Bets review of Blockchain from a legal and compliance perspective. Discussion focused around practical use cases as Blockchain continues its fast trek to becoming enterprise ready. June 2018 session with the Illinois Institute for Continuing Legal Education (iicle).
The conference will contextualise the changing regulatory landscape, considering the business impact of the GDPR and DPA (2018) and how it is changing policy and process in practice.
When GDPR came into force in May 2018 it significantly raised the bar of obligation and accountability, ensuring that all organisations who handle personal data adhere to strict regulations around privacy, security and consent. 18 months on from implementation, the conference will consider how data protection procedure has moved on, with insight from frontline practitioners reflecting on how practices within their organisation have changed.
The event will also provide an update from the regulator; exploring regulatory action policy, decision making for fines and penalties, and clarifying some of the most prominent areas of misconception and non-compliance.
Core conference topics include:
• Key legal issues and obligations
• Data security and encryption
• Privacy Impact Assessments
• Databases, data mapping and classification
• Privacy by design
• Practical strategy implementation
I. Cryptocurrency Payment System for E-Commerce Applications
Secure Multi Coin Decentralized Wallet Live Demo
Emotion AI Chatbot Live Demo
E-Commerce Integration Live Demo
AI Chatbot Sentiment Analysis + Big Data Analytics
AI Chatbot Sentiment Analysis + Big Data Analytics Demo
Hyperledger Fabric Token Wallet Implementation
Hyperledger Fabric Token Wallet Implementation Demo
High Throughput Token Wallet Implementation Performance
II. Xanadu Based Healthcare Information Retrieval & Sharing System
Xanadu Based Big Data Archive
Xanadu based Medical CBIR System Live Demo for Diabetic Retinopathy Diagnosis
Blockchain-Xanadu Database Integration Live Demo
Intellectual Property Development
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Mitigating Security Risks in Vendor Agreements
Providers of software, software-as-a-service, managed services, and professional services have varying degrees of sophistication in addressing security in their form contracts. Learn from an experienced technology attorney how to understand key clauses, or discover when they are missing, to ensure that the company's vendors are compliant with the appropriate security measures before signing the deal.
Brian Kirkpatrick is the founding shareholder of Kirkpatrick Law PC and a business attorney with a technology focus. He also serves as Of Counsel to Mullin Law PC for matters involving technology and information security.
His practice revolves around clients needing assistance in technology transactions, data privacy, cyber security, software compliance and audits, and general counsel related to business matters. Brian was voted 2015 Top Technology Attorney in Tarrant County by his peers as published in Fort Worth Texas Magazine.
Brian has published numerous articles and lectured nationally on legal topics such as software as a service, software licensing, contract negotiation, cyber security and legal considerations when starting a business. He is also featured in radio news interviews, as a conference panelist, a featured speaker, and is featured in an instructional video series about conducting negotiations. Before entering the legal profession, Brian was a Vice President commercial banker.
Brian is a graduate of Texas A&M University School of Law where he was inducted into the National Order of Barristers. He also has a Masters of Arts in Applied Economics from Southern Methodist University and a Bachelors of Science in Economics from Texas A&M University - Commerce where he was inducted into the Omicron Delta Epsilon International Economics Honor Society.
Why do smart cities goes lean?
This presentation shares the basics and opportunities for any public sector agency and those in pubic appointed positions.
Data is the oil of the new millennia…considered a company’s most important asset by many. At the same time, in this age of digitalization, companies are more and more exposing their most important assets to cybercrime – the theft and misuse of data. In this session, you’ll learn the 7 major trends putting businesses at risk, the one big mistake most are making and how you can accurately measure risk and begin taking action, without breaking the bank.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
The Fourth Industrial Revolution?
Blockchain Components
Blockchain Platforms: Ethereum
Blockchain Platforms: Hyperledger
Big Data Use Cases
Big Data Analysis Flow
Artificial Intelligence Revolution
Deep Learning Introduction
Future of AI
Blockchain Innovation Checkpoint
AI Innovation Checkpoint
AI Innovation Frontline: Emotion AI
AI Innovation Frontline: AI Chatbot
AI Innovation Frontline: 3D Recognition
Block Innovation Frontline: DeFi
Block Innovation Frontline: Issues with Public Chain
Blockchain + AI: Blockchain for AI Business Cases
Blockchain + AI: AI for Blockchain Business Cases
Example of Blockchain + AI + Big Data Integration System
Business Model Canvas
Blockchain Business Model Canvas
Five Big Bets in a Blockchain World (June 2018)Mike Wons
Five Big Bets review of Blockchain from a legal and compliance perspective. Discussion focused around practical use cases as Blockchain continues its fast trek to becoming enterprise ready. June 2018 session with the Illinois Institute for Continuing Legal Education (iicle).
The conference will contextualise the changing regulatory landscape, considering the business impact of the GDPR and DPA (2018) and how it is changing policy and process in practice.
When GDPR came into force in May 2018 it significantly raised the bar of obligation and accountability, ensuring that all organisations who handle personal data adhere to strict regulations around privacy, security and consent. 18 months on from implementation, the conference will consider how data protection procedure has moved on, with insight from frontline practitioners reflecting on how practices within their organisation have changed.
The event will also provide an update from the regulator; exploring regulatory action policy, decision making for fines and penalties, and clarifying some of the most prominent areas of misconception and non-compliance.
Core conference topics include:
• Key legal issues and obligations
• Data security and encryption
• Privacy Impact Assessments
• Databases, data mapping and classification
• Privacy by design
• Practical strategy implementation
I. Cryptocurrency Payment System for E-Commerce Applications
Secure Multi Coin Decentralized Wallet Live Demo
Emotion AI Chatbot Live Demo
E-Commerce Integration Live Demo
AI Chatbot Sentiment Analysis + Big Data Analytics
AI Chatbot Sentiment Analysis + Big Data Analytics Demo
Hyperledger Fabric Token Wallet Implementation
Hyperledger Fabric Token Wallet Implementation Demo
High Throughput Token Wallet Implementation Performance
II. Xanadu Based Healthcare Information Retrieval & Sharing System
Xanadu Based Big Data Archive
Xanadu based Medical CBIR System Live Demo for Diabetic Retinopathy Diagnosis
Blockchain-Xanadu Database Integration Live Demo
Intellectual Property Development
Privacy and Security by Design Spotlight Presentation at HIMMS Privacy and Security Forum, December 5th 2016. Presented by Jeff R. Livingstone, PhD, Vice President and Global Lead, Life Sciences & Healthcare, Unisys Corporation.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Mitigating Security Risks in Vendor Agreements
Providers of software, software-as-a-service, managed services, and professional services have varying degrees of sophistication in addressing security in their form contracts. Learn from an experienced technology attorney how to understand key clauses, or discover when they are missing, to ensure that the company's vendors are compliant with the appropriate security measures before signing the deal.
Brian Kirkpatrick is the founding shareholder of Kirkpatrick Law PC and a business attorney with a technology focus. He also serves as Of Counsel to Mullin Law PC for matters involving technology and information security.
His practice revolves around clients needing assistance in technology transactions, data privacy, cyber security, software compliance and audits, and general counsel related to business matters. Brian was voted 2015 Top Technology Attorney in Tarrant County by his peers as published in Fort Worth Texas Magazine.
Brian has published numerous articles and lectured nationally on legal topics such as software as a service, software licensing, contract negotiation, cyber security and legal considerations when starting a business. He is also featured in radio news interviews, as a conference panelist, a featured speaker, and is featured in an instructional video series about conducting negotiations. Before entering the legal profession, Brian was a Vice President commercial banker.
Brian is a graduate of Texas A&M University School of Law where he was inducted into the National Order of Barristers. He also has a Masters of Arts in Applied Economics from Southern Methodist University and a Bachelors of Science in Economics from Texas A&M University - Commerce where he was inducted into the Omicron Delta Epsilon International Economics Honor Society.
World’s 10 Best Data Integration Solution Providers 2022.pdfInsightsSuccess4
This edition features a handful of World’s 10 Best Data Integration sectors that are at the forefront of leading us into a digital future.
Read More: https://insightssuccess.com/worlds-10-best-data-integration-solution-providers-2022-june2022/
Appinions Information Technology Influence Study_August 2013Appinions
This report explores the companies and executives who are shaping influential conversations in enterprise software.
The study is based on 60 days of data taken between June 4 and August 2, 2013. The scope of this report is based on the most compelling issues around IT, exploring the most influential topics as defined by the upcoming Interop New York conference: Cloud Computing, Big Data, SaaS, Network Infrastructure, Information Security and BYOD.
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
This is the presentation that I delivered at InfoSec Netherlands. In the era of Digital Transformation, organisations are finding efficiencies with deploying systems and devices that are always connected - dubbed as the Internet of Things (IoT). If these 'things' are not carefully configured and maintained then they are a threat to your business. I discussed the common weaknesses that attackers exploit on IoT systems and the cybersecurity skills that you need to mitigate against them. The session also included a live attack to demonstrate how a device can become compromised.
Internet of Things With Privacy in MindGosia Fraser
Short presentation on privacy and data protection issues related to rapid development of Internet of Things, prepared for Privacy Lab hosted by Mozilla London
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
Let's take a look at implementations of AI or machine learning in the cybersecurity world. To know more: https://www.softwarefirms.co/blog/ai-and-machine-learning-in-cybersecurity-a-saviour-or-enemy?utm_source=Social+media&utm_medium=Traffic&utm_campaign=SR
Big Data & Analytics continues to redefine business. Data has transitioned from an underused asset to the lifeblood of the organisation, and a critical component of business intelligence, insight and strategy.
Big Data Scotland is the largest annual data analytics conference held in Scotland: it is supported by ScotlandIS and The Data Lab and free for delegates to attend. The conference is geared towards senior technologists and business leaders and aims to provide a unique forum for knowledge exchange, discussion and cross-pollination.
The programme will explore the evolution of data analytics; looking at key tools and techniques and how these can be applied to deliver practical insight and value. Presentations will span a wide array of topics from Data Wrangling and Visualisation to AI, Chatbots and Industry 4.0.
Key Topics
• Tools and techniques
• Corporate data culture, business processes, digital transformation
• Business intelligence, trends, decision making
• AI, Real-time Analytics, IoT, Industry 4.0, Robotics
• Security, regulation, privacy, consent, anonymization
• Data visualisation, interpretation and communication
• CRM and Personalisation
How Big Data Will Change Businesses In 2018Tyrone Systems
In 2018 Big Data will include formerly dark data and virtually every other data platform used by corporations to deliver personalization.
In the world of analytics and computational data, two core concepts divide the medium — structured and unstructured data.Structured data is quickly and easily organized and searchable using basic algorithms and tools. Unstructured data, on the other hand, is more akin to human language. It doesn’t cram neatly into relational databases, nor is it necessarily compatible with algorithmic tools and search functions.
The National Security Agency's (NSA) surveillance system known as “PRISM” is not a surprise to most Information Technology Experts. In fact, many experts such as the companies (AOL Inc., Apple Inc., Facebook Inc., Google Inc., Microsoft Corp., Yahoo Inc., Skype, YouTube and Paltalk) who shared the information with NSA are trying very hard to mitigate the risks in securing this technology;
"In this issue of “The 10 Most Trusted Companies in
Enterprise Security” Insights Success has shortlisted
those enterprise security providers which are providing
solutions that are systematically profile and
contextualize security threats with a level of detail and
granularity that has never been achieved before."
An overview of artificial intelligence from the perspective of a potential venture capital investment: what it is, its history, how it can be used, and what it could mean for the future of various industries and humanity.
2. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartlysecuresecurelysmart/ 2/6
Speaking at the sidelines of Netapp’s Secure Cities Dialogue event in Singapore, Netapp’s East Asia Managing Director
and VP, Krishna Arani said, “(Storage) always has to think of data even when not being used ….ensure that data is
controlled and moved to where it needs to be.”
Data Fabric is one technology that addresses key issues in newer data protection issues, like vendor lock-in. Then there
is also Netapp Private Storage for cloud (NPS) that enables companies to take advantage of data that is not in the cloud.
Service providers like Korea Telekom can host an Amazon data centre alongside the NPS cloud for example, with the
NPS having all the bene ts of private, dedicated storage.
But, building a smart city requires more than just technology to maintain data integrity and privacy.
More than tech
Netapp’s APAC President Rick Scur eld said, “Smart cities is about partnerships and policies, it’s not just a tech question
or tech solution.”
Case in point is the hundreds of millions of dollars the Canadian government wasted when they built a big data centre
for their federal IT organisation. It violated sovereignty compliance because Canadian citizens’ data were being routed
through data centres outside of the country.
Netapp’s Chief Privacy Of cer, Sheila FitzPatrick pointed out that Netapp is a tech company that also complies with
privacy law. “We don’t think of privacy as an afterthought. Data can be your greatest asset and detriment. If you only
think of a tech solution (to data privacy), it doesn’t do you good to encrypt data you shouldn’t be collecting in the rst
place.”
Smart city conundrum
Smart cities come with a unique set of problems. For it to work, it needs data and lots of it.
Basically, it could lead to collection of personal data at greater rate, unknown usage of personal data by unknown
parties, cybersecurity attacks, increasing data privacy laws and risk of non-compliance, new technology driving need for
greater attention to potential risks and lack of transparency.
If there was a cyberattack, to what extent is a company allowed to report it, if at all? What is the data that can or can’t
be collected, and many more concerns.
Due diligence
FitzPatrick shares best practices that can help mitigate the risks in a smart city environment. For example:
1. Governance, risk and compliance
2. Practicing proactive data privacy
3. Doing an impact assessment
4. Classifying data and managing access to data
5. De ning the data ownership controller-processor roles and ensuring there is shared joint liability.
6. Transparency
7. Vet partner providers
8. Doing a security assessment
3. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartlysecuresecurelysmart/ 3/6
CATEGORIES BIZ PERFORMANCE
TAGGED CLOUD DATA PROTECTION KRISHNA ARANI PRIVACY PRIVATE CLOUD PUBLIC CLOUD
RICK SCURFIELD SHEILA FITZPATRICK
Notify of new follow-up comments ›
CAT YONG
Cat Yong is Editor-in-Chief of Enterprise IT News.
WEBSITE
LEAVE A REPLY
Be the First to Comment!
You must be logged in to post a comment.
0
PREVIOUS ARTICLE
SAP MALAYSIA TO INTRODUCE DIGITAL BOARDROOM SOLUTION
NEXT ARTICLE
VIRTUAL NETWORKING AND (FINALLY?) TRUE WORKLOAD
MOBILITY ACROSS CLOUDS
Email
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers
4. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartlysecuresecurelysmart/ 4/6
LATEST
COMMENTS
HAPPY on 29 Oct
Happy [...]Here are some of
Search...
LATEST POSTS
SYSTEM & APPS 18 NOV
COMPUTE AT THE EDGE: SCHNEIDER
WILL SEE YOU THERE
PIKOM LAUNCHES PC ...
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers
5. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartlysecuresecurelysmart/ 5/6
Happy [...]Here are some of
the web-sites we advise for
our visitors[...]
HAPPY on 29 Oct
Happy [...]Here are a
number of the internet sites
we suggest for our
visitors[...]
THE WAY TO
HAPPINESS on 29 Oct
The Way To Happiness
[...]we like to honor a lot of
other world-wide-web web
pages on the net, even if
they arent linked to us, by
GOOGLE on 27 Oct
Google Sites of interest we
have a link to.
THE PROMISE OF
CLOUD: ASEAN IT
SCEPTICS GET A
TASTE WITH
RAVELLO |
ENTERPRISE IT NEWS
HTTP://WWW.ENTE
RPRISEITNEWS.COM.
MY/THEPROMISE
OFCLOUDASEANIT
SCEPTICSGETA
TASTEWITH
RAVELLO/ … NEWS
on 27 Oct
[…] The promise of cloud:
ASEAN IT sceptics get a
ABOUT
SAP GAINS TOP GART...
SAP GAINS TOP GART...
THE PROMISE OF CLO...
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers