|
IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in [See the full post…] |
Watch/download video
|
|
Categories: Big Data, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Video Podcast Tags: Big Data, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, pbd, personal information, PII, privacy, privacy by design, privacy principles, Security
|
IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, Corporate, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, principles, privacy, Security, Stuart Tyler
|
IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…] |
Watch/download video
|
|
Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, privacy, privacy principles, protect to enable, Security
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, Big Data, Chief Privacy Officer, Chief Security Officer, Corporate, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins, privacy, Security, velocity
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, governance, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: Allyson Klein, Ben Kepes, Chip Chat, Cloud Computing, Diversity Limited, IDF, Intel, Internet of Things, podcast, privacy, Reuven Cohen, Wearables
|
IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs [See the full post…] |
Watch/download video
|
|
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: information technology, Intel, Intel Corporate Privacy Rules, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, pbd, personal information, PII, privacy, privacy by design, privacy principles, protect to enable, Security
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: children, IP, privacy, Security, Shubhada Sahasrabudhe, silicon, Technology
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Chief Information Security Officer, CISO, Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
Categories: HD Video, Intel, The Tomorrow Project Tags: Brian David Johnson, Computer Science, Cory Doctorow, encryption, Futurist, privacy, rainbow table, Science, science fiction, science fiction writer, Security, Society, Technology, technology activist, wireless networks
|
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
|
A seamless and ubiquitous computing experience on the Internet also requires the user to take on a certain amount of risk that personal information would get into the wrong hands. Computer scientists are developing tools that protect a user’s privacy. [See the full post…] |
Listen/download audio
|
|
Categories: Future Lab Radio, Intel, Intel Free Press, Intel Labs, Research@Intel Tags: Future Lab, Institute for the Future, Intel, Intel Free Press, Intel Labs, IntelFreePress, Jaeyeon Jung, Mike Liebhold, Miro Enev, privacy, Private Information, Research, Research@Intel, Sophia Wang, Sunny Consolvo, University of Washington
|
Join BearingPoint managing director Warren Zafrin to explore how the Internet’s ability to allow information to flow freely between countries has become the electronic border that will expand or contract depending on the privacy borders.
In 1995, Europe established a [See the full post…] |
Listen/download audio
|
|
Categories: BearingPoint, Connected Social Media, Corporate Tags: BearingPoint, privacy, Warren Zafrin
|
Nicole Wong, Google’s deputy general counsel in charge of compliance, is the point person for growing criticism of Google’s privacy practices. More than two dozen European privacy regulators have launched an inquiry into Google’s data protection practices. In the United [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Enterprise 2.0, Inside Silicon Valley Tags: compliance, DoubleClick, Google, Mercury News, Nicole Wong, privacy
|
Biz Stone, Co-Founder of Twitter talks about the social networking and micro-blogging service’s runaway success, and how marketers can leverage this new tool. Speaking to Jennifer Jones, Biz describes how people are using Twitter, and answers Marketing Voices viewers’ questions [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Marketing Voices, social media Tags: Biz Stone, Jennifer Jones, privacy