Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
A significant wave of economic and regulatory transformation looms over the business sector as the European Union implements the Corporate Sustainability Reporting Directive (CSRD), marking a fundamental shift in corporate...more
The Bureau of Industry and Security (BIS) has published its spring 2024 regulatory agenda along with the rest of the Commerce Department. Of note is the continued focus on access to emerging technology, particularly relating...more
A bipartisan bill introduced in the US Senate would mandate updates to federal procurement regulations and procedures for the acquisition of technology. S.4066, the Federal Improvement in Technology Procurement Act (FIT...more
With significant progress on hardware and optimism about future applications, interest in quantum computing is growing steadily. As the technology promises solutions to complex problems that are currently daunting (or even...more
By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more
The move from on-premise to cloud-based eDiscovery software use is not a new trend. In fact, according to Complex Discovery, close to 55% of global eDiscovery software spending went to cloud-based software in 2022, with the...more
Although there is a recent trend of employees returning to the office on a more regular basis, continued reliance on and demand for data centers that help support remote and hybrid work only appear to be increasing. For...more
One might wonder, why is this the trend? In our work lives, many seek simple solutions to complex work tasks. Tech leaders require direct, straightforward solutions and answers to their problems. It’s all about...more
IT service provider performance has long been measured by service level agreements (SLAs) that set quantifiable standards for many aspects of a sourcing arrangement. These standards range from how quickly customer support is...more
Legacy identity and access management (IAM) is often considered a cumbersome, complex, and archaic monolith. In particular, legacy IAM often requires lengthy development time for updates and onboarding new applications,...more
During the last year, we have seen a significant shift to “as a service” models and cloud solutions, as well as heightened attention on outsourcing as a strategic business tool to enable scalability, improved service, and...more
2020 marked a monumental shift in consumer behavior, with the retail industry particularly affected by the global spread of COVID-19. Between nationwide quarantines and the looming threat of disease, retailers had to adapt...more
The good news is that, for the most part, State resisted the temptation to do something just a little different in the ITAR regulation, so the joint Commerce-State solution works. The chart below provides a quick side-by-side...more
What kinds of cloud computing transactions take place in your jurisdiction? As a G7 economy with mature IT and related services markets, the UK is one of the most important global markets for cloud computing. According to...more
In late June 2019, first-time patent plaintiff Trupanion sued first-time patent defendant Embrace Pet Insurance – two competitors in the fast-growing pet insurance industry – in the Northern District of Ohio over patents...more
The transition from traditional manufacturing techniques and technologies to techniques leveraging automation and data exchange technologies, cyber-physical systems, the Internet of things, cloud computing and cognitive...more
ICT standardization is a key part of the European Union’s package of measures designed to improve Europe’s competitiveness and productivity. As part of the EU’s Digital Single Market (DSM) initiative, the European Commission...more
The client-lawyer relationship is an important one. With competent representation, clients receive legal services promised to them through the judiciary system. The American Bar Association Center for Professional...more
Over the years USAA has aggressively asserted its patent portfolio related to check depositing. Specifically, USAA holds itself out as an innovator in the research and development of allowing banking customers to deposit...more
This posting is not a “pie in the sky” outline of compliance in the future, when technology works seamlessly with compliance functions. My focus today is on what is happening now in the compliance world when it comes to...more
Cloudflare, Inc., a provider of performance and security solutions for websites, recently disclosed that a software bug caused it to leak customer data that was then cached by search engines. Uber, Fitbit, and OkCupid sites...more
Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more
The cloud-based file-sharing and collaboration business continues to grow, inspiring competition between two heavy weights: Microsoft and Box. Last week, Box announced over $100 million in third quarter revenue growth...more
How Did This Attack Happen? While the attack is still under investigation, initial reports indicate that it was part of a genre of DDoS that infects Internet of Things (IoT) devices, such as webcams, DVRs, routers, smart TVs,...more
A recent Gartner report has identified what it believes to be the Top 10 Cyber Security Technologies for the future to assist businesses with combating cyber crime....more