Fri.Mar 22, 2024

article thumbnail

Americans Need to Know How the Government Will Use AI

The Rand Blog

Americans have been concerned about tech-enabled government surveillance for as long as they have known about it. With the recent Department of Homeland Security announcement that it is embracing artificial intelligence, that concern isn't going away anytime soon. How could federal agencies mitigate some of that fear?

article thumbnail

Storage and Data Protection News for the Week of March 22; Updates from Cohesity, Quantum, Veritas & More

Solutions Review

Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of March 22, 2024. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week, in this space.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don't Abandon Europe in the Name of 'Asia First'

The Rand Blog

Allies are key to U.S. great power competition. They are the only asset its adversaries do not also share. Instead of a strategic calculation, isolating European partners' vital interests because they are “less important” than Asia can only harm the United States' relationship with its Asian partners as well.

article thumbnail

How to leverage IT to deliver tailored shopping experiences

Online Computers

In Minority Report, the Steven Spielberg-directed blockbuster set in 2054, there’s a scene wherein Tom Cruise’s character walks down a hallway lined with hologram ads and facial recognition security cameras. When the cameras detect his presence, the ads start addressing him by name. In another scene, his character enters a Gap store, and the virtual greeter addresses him accordingly.

Retail 52
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

What Sweden's Accession Means for NATO

The Rand Blog

Russia's failed invasion of Ukraine pushed neutral Sweden to embrace a role in Europe and NATO's collective defence and security. With the addition of its 32nd Member, NATO's toolkit gains Sweden's ground and air combat, nearshore and undersea warfare capabilities, as well as the country's expertise in niche areas such as cold weather operations.

More Trending

article thumbnail

What is Operational Resilience?

Resilience Association

Operational resilience is the ability of an organization to continue to operate and deliver its essential services in the event of an operational disruption. This can be caused by a variety of factors, such as natural di.

article thumbnail

How to leverage IT to deliver tailored shopping experiences

Online Computers

In Minority Report, the Steven Spielberg-directed blockbuster set in 2054, there’s a scene wherein Tom Cruise’s character walks down a hallway lined with hologram ads and facial recognition security cameras. When the cameras detect his presence, the ads start addressing him by name. In another scene, his character enters a Gap store, and the virtual greeter addresses him accordingly.

Retail 40
article thumbnail

Notes from The Gloucester City Council Managing a Cyber Attack – Case Study

Plan B Consulting

In this week’s bulletin, Charlie gives an insight into Gloucester City Council’s cyber attack that took place late last year and discusses what we can learn from the incident. The above report was published in December 2023, and I have just got around to reading it. I thought that, after looking at the British Library’s cyber attack report last week, it might be good to continue the same theme and see what we can learn from this report.