About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
GDPR
Top 5 Unexpected Consequences of GDPR
The European Union’s General Data Protection Regulation (GDPR) is finally here, promising to put individuals back in control of their personal data and harmonize data protection and privacy laws across Europe. But with the May 25 grace period deadline behind us, it’s becoming clear that the regulation will have far greater impact on business and […]
GDPR’s Missing Link: A Single Subject Search Index
Organizations implementing GDPR are going to discover, sooner or later, that finding someone’s data following a subject access request is much easier said than done. Most organizations think they can individually search every system, either manually or via a federated crawler that automatically queries each system. In fact, neither of these approaches works well. There […]
Recent Comments
- jintu on Embracing Hybrid Cloud, AI for the Modern App Revolution
- Peter Fay on Accessibility: The Intersection of Innovation and Inclusion
- Diane Margaretos on Accessibility: The Intersection of Innovation and Inclusion
- SAURABH JAIN on Refining the Expanding Role of Hybrid Cloud
- Rohtash Kumar on Refining the Expanding Role of Hybrid Cloud
Archives
- November 2020
- October 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
Categories
- 5G
- Accessibility
- Agile Methods
- AI
- Analytics
- Apollo
- Artificial Intelligence
- Augmented Reality
- Auto Industry
- Automation
- Banking
- Benefits
- Big Data
- Blockchain
- Branding
- business analytics
- Call for Code
- Chief Data Officers
- Citizen IBM
- Cloud Computing
- Cloud Computing
- Cognitive Banking
- Cognitive Commerce
- Cognitive Computing
- Cognitive Computing
- Cognitive Enterprise
- Cognitive Retail
- Cognitive Utilities
- Collaboration
- Commerce
- Consumer Behavior
- Corporate Citizenship
- COVID-19
- Customer Analytics
- Cyber Security
- Cybersecurity
- Data Analytics
- Data Governance
- Data Responsibility
- Data Science
- Data Visualization
- Databases
- DataOps
- Deep Learning
- Design Thinking
- Development
- Diversity & Inclusion
- Earth Day
- eCommerce & Merchandising
- Education
- Electronics
- Enterprise Strong
- ERP
- Events
- Exponential Learning
- Financial Services
- FinTech
- Flash Storage
- GDPR
- Health & Wellness
- High Performance Computing
- Hybrid Cloud
- Hybrid Multicloud
- IBM Cloud
- IBM Cloud Private
- IBM Cloud Video
- IBM Global Services
- IBM Policy
- IBM Power
- IBM Research
- IBM Security
- IBM Watson
- IBM Watson
- In Memoriam
- Industries: Automotive
- Innovation
- Internet of Things
- Internet of Things (IoT)
- IoT
- Leadership
- Machine Learning
- Marketing
- Media & Entertainment
- Mobile Computing
- Multi-Cloud
- New Collar Jobs
- NLP
- Oil & Gas
- Open Source Software
- OpenPOWER
- P-TECH
- Partnerships
- Patents
- Payments
- Perspectives
- Power
- Public Statement
- Quantum Computing
- Red Hat
- Resiliency
- Retail
- security
- Skills
- Smart banking
- Smart Grid
- Smarter Financial Services
- Smarter Industries
- Smarter Planet
- Smarter Security
- Social Business
- Social Good
- Space Exploration
- Sports Innovation
- STEM
- Supercomputing
- Supply Chain
- Systems
- Tech For Good
- Technology Services
- Telecom
- The Weather Company
- THINK
- Think 2018
- This Is Watson
- Transportation
- Uncategorized
- Veterans
- Water
- Watson Financial Services
- Watson Health
- Watson IOT
- Weather
- Wellness
- Women in Tech
- World Community Grid
- World Oceans Day
- Z
GDPR & Protecting Data Privacy with Cryptographic Pseudonyms
Within two years, most of today’s cybersecurity technologies will be obsolete. Since the beginning of 2016, hackers have stolen more than 8 billion records – more than double the two previous years combined – and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for […]
Unifying Data Governance for the Future
Mastering fast-growing data volumes across the enterprise is one of the first and most critical steps in establishing a cognitive business. To do it requires adopting advanced analytics that enable an organization to better understand and control its data, but also to gain insights that set the stage for driving new business models. But for […]