Enterprise Architecture and Business Strategies
402 views | +0 today
Enterprise Architecture and Business Strategies
The fast changing world of internet systems and the architecture that allows them to be efficient and effective.
Your new post is loading...
Your new post is loading...
Scooped by Anne-Marie Armstrong
Scoop.it!

Teaching about Technology An Introduction to the Philosophy of Technology for Non philosophers Conte

For Unlimited Access Please Registration on Here http://bit.ly/1Tc2md2.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Computer algorithm recreates Van Gogh painting in one hour

Computer algorithm recreates Van Gogh painting in one hour | Enterprise Architecture and Business Strategies | Scoop.it
German researchers find computers can use algorithm to copy famous painting styles, including Picasso’s
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Psychiatric Aspects of Reproductive Technology PDF

D0WNL0AD TH1S B00KS/eB00KS HERE: http://bit.ly/bags858 . Thanks You.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Most Creative People 2015

Most Creative People 2015 | Enterprise Architecture and Business Strategies | Scoop.it
Stories tagged with Most Creative People 2015.
Anne-Marie Armstrong's insight:

And how much has technology, good architecture and social media usage played a role for these businesses?  Of course, it also helps to have good ideas, planning and communication.

more...
No comment yet.
Rescooped by Anne-Marie Armstrong from Digital Storytelling
Scoop.it!

Storytelling with Data Visualization

Storytelling with Data Visualization | Enterprise Architecture and Business Strategies | Scoop.it
Does your data tell a story and can you visualize it? We look at the history and thought processes behind data visualization and successful infographics.

Via José Carlos
more...
Nikke Blout's curator insight, May 13, 2015 5:16 PM

Content Marketing: the magic of visualizations in helping data tell the story. #contentmarketing #marketing #bigdata #sales #agility

Dianita Páez's curator insight, May 14, 2015 1:23 PM

Infografías que cuenten historias. 

Scooped by Anne-Marie Armstrong
Scoop.it!

How Apple Is Building An Ecosystem For Your Body

How Apple Is Building An Ecosystem For Your Body | Enterprise Architecture and Business Strategies | Scoop.it
As it embarks on a mission to strap its products to your body, CEO Tim Cook says health could be the company's "biggest" frontier.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

How Flight Tracking Apps Work: Volunteers

How Flight Tracking Apps Work: Volunteers | Enterprise Architecture and Business Strategies | Scoop.it
Air disasters have brought new attention to apps for aviation geeks, which rely on some of those same aviation geeks for their data.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

The HTML Tags the New York Times, CNN Use During Tragedies

The HTML Tags the New York Times, CNN Use During Tragedies | Enterprise Architecture and Business Strategies | Scoop.it
When big news stories evolve into tragedies and people are flocking to read the latest online, website design becomes the backdrop for grave information. And as Electronic Frontier Foundation activist Parker Higgins points out, you can tell a lot about how different sites react to tragic stories by checking out...
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Welcome To Privacy Hell, Also Known As The Internet Of Things

Welcome To Privacy Hell, Also Known As The Internet Of Things | Enterprise Architecture and Business Strategies | Scoop.it
In the strange, new, data-leaking world of the IoT, hackers may be our best hope for keeping our identitiesand livesintact.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Business Strategy Development -

Business Strategy Development - | Enterprise Architecture and Business Strategies | Scoop.it
We hear the terms business strategies and business strategy development very often.
more...
No comment yet.
Rescooped by Anne-Marie Armstrong from rincóndeaula
Scoop.it!

Herramienta online gratuita para generar análisis y matriz DAFO - FODA - SWOT | Inghenia :: Blog

Herramienta online gratuita para generar análisis y matriz DAFO - FODA - SWOT | Inghenia :: Blog | Enterprise Architecture and Business Strategies | Scoop.it
Free Software SWOT analysis SWOT SWOT

Via jmanuelgarrido
Anne-Marie Armstrong's insight:

add your insight ...

more...
Ramiro Torres's curator insight, July 9, 2016 9:33 PM
Share your insight
Carlos Sanchez's curator insight, October 24, 2016 10:03 AM
Share your insight
Giovanni Escobar's curator insight, April 10, 2017 7:47 PM
Share your insight
Scooped by Anne-Marie Armstrong
Scoop.it!

Compuware CEO Sees Software Innovation -- On the Mainframe

Compuware CEO Sees Software Innovation -- On the Mainframe | Enterprise Architecture and Business Strategies | Scoop.it
Compuware CEO Chris O Malley is striving to optimize big data, mobile and social workloads on IBM mainframes. Here s a look at O Malley s journey so far.
Anne-Marie Armstrong's insight:

Constant flux.  EAs must be ready.

more...
No comment yet.
Rescooped by Anne-Marie Armstrong from HIPAA Compliance for Medical Practices
Scoop.it!

Obama Unveils Cyberthreat Info Sharing Plan

Obama Unveils Cyberthreat Info Sharing Plan | Enterprise Architecture and Business Strategies | Scoop.it

It looks like 2015 is beginning where 2014 left off regarding cyberthreat information-sharing legislation.

President Obama on Jan. 13 unveiled his legislative proposal to promote cybersecurity information sharing between business and government, a proposal Congress has debated for years, but has been unable to enact.

Obama's proposal, according to a summary released by the White House, would provide stronger privacy protections than did the Cyber Intelligence Sharing and Protection Act, the bill passed in the last Congress by the Republican-controlled House of Representatives and which the administration threatened to veto . Cyberthreat information-sharing legislation never came up for a vote in the then-Democratic-controlled Senate.

 

A senior administration official, speaking on background, says the White House's position on CISPA that led to the veto threat has not changed. The administration says its proposal would safeguard Americans' personal privacy by requiring businesses to comply with certain privacy restrictions, such as removing unnecessary personal information and taking measures to protect any personal information that must be shared, in order to qualify for liability protection. CISPA didn't do that, and that's one reason the White House threatened a veto. The White House also said CISPA provided too broad of liability protections for businesses. The new proposal offers targeted liability protection to businesses that share cyberthreat information.

Acting in Good Faith

That liability protection is important to businesses because they don't want to face lawsuits from disgruntled shareholders and others because the information they share might disclose vulnerabilities in their IT systems. "The president's proposal to grant targeted liability protections will foster greater industry participation, while helping to progress what has traditionally initiated the barriers to sound and meaningful threat-sharing policy," says Elizabeth Hyman, executive vice president of public advocacy at the high-tech industry group TechAmerica. "Organizations acting in good faith should be incentivized to partner with the federal government."

Obama's proposal also would require the Department of Homeland Security and the attorney general to develop guidelines governing the receipt, retention, use and disclosure of cyberthreat information received from businesses.

In addition, the administration plan would encourage businesses to share appropriate cyberthreat information with the National Cybersecurity and Communications Integration Center, the Homeland Security agency responsible for information sharing and analysis to protect the federal government and critical infrastructure. NCCIC (pronounced n-kick), as the center is known, would then share the information in as close to real time as practicable with relevant federal agencies and with private sector-developed and operated Information Sharing and Analysis Centers.

More ISACs

The White House proposal would encourage industries that do not have ISACs to form them. But to be most effective, the respective industries running the ISACs need to make sure they don't cede too much authority to the federal government, says Chris Blask, who chairs the Industrial Control System ISAC.

Too often, he says, ISACs are more about what the federal government wants rather than what industry needs. "This is not at all bad, but it does not intrinsically speak to the needs and interests of various private-sector demographics," Blask says.

Reaction to Obama's plan from business and privacy groups was generally cautious. The Financial Services Roundtable, in a statement, says it applauds Obama for raising "this important discussion on information sharing and looks forward to reviewing the details of the proposal."

Harley Greiger, senior counsel at the Center for Democracy and Technology, an online advocacy group, is taking a wait-and-see approach on the Obama plan. "The White House proposal relies heavily on privacy guidelines that are currently unwritten," he says. "What these guidelines say and when they are applied will be critical to protecting Internet users. Privacy protections and use restrictions must be in effect before information sharing occurs."

Partisan Rhetoric

In the Capitol, the partisan rhetoric of the 113th Congress reverberated in the new 114th Congress as some lawmakers responded to the president's plan with a bit of mockery. "While it took an attack on Hollywood for the president to re-engage Congress on cybersecurity, I welcome him to the conversation," says House Homeland Security Committee Chairman Mike McCaul, R-Texas, referring to the Sony Pictures Entertainment breach.

A more straightforward response came from Rep. David Nunes, the California Republican who's the new chairman of the House Intelligence Committee.

"I am glad to see President Obama putting forth his ideas to address this critical issue," he says. "They will receive close consideration as the House Intelligence Committee crafts a cyber-bill."

The senior administration official sounded more optimistic about prospects for passage of cyberthreat sharing legislation. "Everybody has indicated a willingness to talk and to move things forward and move beyond that straight-up piece of legislation," the official says. "The administration is serious about working on this issue and has clearly articulated its position going into those discussions with the Hill. And I look forward to some good, productive discussions with the folks up on various committees this spring."

Prosecuting Botnet Sales

Another legislative initiative proposed by Obama would strengthen law enforcement to combat cybercrime. If enacted, the legislation would:

Allow the prosecution of those who sell botnets;Expand federal law enforcement authority to deter the sale of spyware used to stalk or commit identity theft;Give courts the authority to shut down botnets engaged in distributed denial-of-service attacks and other criminal activity.

"Much like possession of robbery tools is a criminal offense for those who are arrested trying to break and enter into a house, this proposal focuses on the tools - botnets, spyware, etc. - that are used in furtherance of breaches, IP theft and identity theft," says Christopher Pierson, former president of the Phoenix chapter of InfraGard, an FBI-private sector partnership that shares threat information. "This is a step in the right direction, but, of course, the application depends on the ability to capture and prosecute the persons involved in the crime."

Obama's proposal also would apply to cybercriminals the Racketeering Influenced and Corrupt Organizations Act, the statute known as RICO that government lawyers use to prosecute those involved in organized crime. It also would clarify the penalties for computer crimes, and ensures these penalties are in line with other similar non-cybercrimes.

The cybercrime legislative proposal would criminalize the overseas sale of stolen U.S. financial information, such as credit card and bank account numbers. But some security experts question the effectiveness of such a law. "For it to be effective, we need to have cooperation of the law enforcement authorities in the countries where the data is being sold and purchased," says cybersecurity expert Gene Spafford of Purdue University. "We do not have authority to shut down sites or arrest people in other countries, even if what they are doing is illegal here. We need international cooperation."

 


Via Technical Dr. Inc.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

When job contracts prevent productivity gains from new technology

In his survey of soccer-ball producers in Pakistan, Columbia University's Eric Verhoogen describes less-obvious hurdles to adoption of more efficient ...
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Grow from Your Strengths

Grow from Your Strengths | Enterprise Architecture and Business Strategies | Scoop.it
The only sustainable way to capture new opportunities is to remain true to what your company does best.
more...
No comment yet.
Rescooped by Anne-Marie Armstrong from HIPAA Compliance for Medical Practices
Scoop.it!

Office for Civil Rights Launches Phase 2 HIPAA Audit Program with Pre-Audit Screening Surveys

Office for Civil Rights  Launches Phase 2 HIPAA Audit Program with Pre-Audit Screening Surveys | Enterprise Architecture and Business Strategies | Scoop.it

Health Insurance Portability and Accountability Act of 1996 (HIPAA) covered entities have reported that the U.S. Department of Health and Human Services Office for Civil Rights (OCR) recently sent pre-audit screening surveys to a pool of covered entities that may be selected for a second phase of audits (Phase 2 Audits) of compliance with the HIPAA Privacy, Security and Breach Notification Standards, as required by the Health Information Technology for Economic and Clinical Health Act (HITECH Act). OCR had originally planned to issue these screening surveys in the summer of 2014.

 

Unlike the pilot audits conducted in 2011 and 2012 (Phase 1 Audits), which focused on covered entities, OCR is conducting Phase 2 Audits of both covered entities and business associates. The Phase 2 Audit program will focus on areas of greater risk to the security of protected health information (PHI) and on pervasive non-compliance based on OCR’s Phase I Audit findings and observations, rather than a comprehensive review of all of the HIPAA Standards. OCR also intends for the Phase 2 Audits to identify best practices and uncover risks and vulnerabilities that OCR has not identified through other enforcement activities. OCR has stated that it will use the Phase 2 Audit findings to identify technical assistance that it should develop for covered entities and business associates. In circumstances where an audit reveals a serious compliance concern, OCR may initiate a compliance review of the audited organization that could lead to civil money penalties.

The following sections describe the Phase 2 Audit program and identify steps that covered entities and business associates should take to prepare for Phase 2 Audits.

 

Selection of Phase 2 Audit Recipients


Based on prior statements from OCR about the Phase 2 Audits, the surveys recently issued to covered entities appear to indicate that OCR has randomly selected a pool of 550 to 800 covered entities through the National Provider Identifier database and America’s Health Insurance Plans’ databases of health plans and health care clearinghouses. The survey requests organization and contact information.  

 

OCR has said that based on the survey responses, it will select approximately 350 covered entities, including 232 health care providers, 109 health plans and 9 health care clearinghouses, for Phase 2 Audits. OCR will then notify and send data requests to the 350 selected covered entities. The data requests will ask the covered entities to identify and provide contact information for their business associates. OCR will select the business associates that will participate in the Phase 2 Audits from this pool. OCR had previously indicated that compliance audits of business associates would begin in 2015 and continue into 2016, but this timeframe will likely be pushed back based on the delay in the Phase II Audits of covered entities.

 

Audit Process


OCR will audit approximately 150 of the 350 selected covered entities and 50 of the selected business associates for compliance with the Security Standards, 100 covered entities for compliance with the Privacy Standards, and 100 covered entities for compliance with the Breach Notification Standards. 

 

Covered entities and business associates will have two weeks to respond to OCR’s audit request. The data requests will specify content and file organization, file names and any other document submission requirements. OCR will only consider current documentation that is submitted on time. OCR has indicated that auditors will not have an opportunity to contact the entity for clarifications or to request additional information, so it is critical that the documents accurately reflect the program. Failure to respond to a request could lead to a referral to the applicable OCR Regional Office for a compliance review. The Phase 2 Audits are expected to take place over three years.

OCR previously stated that the Phase 2 HIPAA Audits would be conducted as “desk audits” rather than onsite visits. In more recent statements, however, OCR has indicated that while most Phase 2 Audits will be desk audits, OCR will also conduct some onsite, comprehensive audits. OCR has said that it will make the Phase 2 Audit protocol available on its website so that organizations may use it for internal compliance assessments.

 

The Phase 2 Audits will target HIPAA Standards that were frequent sources of non-compliance in the Phase 1 Audits, including risk analysis and risk management, content and timeliness of breach notifications, notice of privacy practices, individual access, the Privacy Standards’ reasonable safeguards requirement, workforce member training, device and media controls, and transmission security. OCR projects that later Phase 2 Audits will focus on the Security Standards’ encryption and decryption requirements, facility access control, breach reports and complaints, and other areas identified by earlier Phase 2 Audits. Phase 2 Audits of business associates will focus on risk analysis, risk management and breach reporting to covered entities.

OCR will present the organization with a draft audit report to allow management to comment before the report is finalized. OCR will then take into account management’s response and issue a final report.

 

What Should You Do to Prepare for the Phase 2 Audits?


Covered entities and business associates should take the following steps to ensure that they are prepared for a potential Phase 2 Audit:

Confirm that the organization has recently completed a comprehensive assessment of potential security risks and vulnerabilities to the organization (Risk Assessment)

Confirm that all action items identified in the Risk Assessment have been completed or are on a reasonable timeline to completion

Ensure that the organization has a complete inventory of business associates and their contact information for purposes of the Phase 2 Audit data requests

If the organization has not implemented any of the Security Standards’ addressable implementation standards for any of its information systems, confirm that the organization has documented (1) why any such addressable implementation standard was not reasonable and appropriate, and (2) all alternative security measures that were implemented

Ensure that the organization has implemented a breach notification policy that accurately reflects the content and deadline requirements for breach notification under the Breach Notification Standards

For health care provider and health plan covered entities, ensure that the organization has a compliant Notice of Privacy Practices and not only a website privacy notice

Ensure that the organization has reasonable and appropriate safeguards in place for PHI that exists in any form, including paper and verbal PHI

Confirm that workforce members have received training on the HIPAA Standards that are necessary or appropriate for workforce members to perform their job duties

Confirm that the organization maintains an inventory of information system assets, including mobile devices (even in a bring-your-own-device environment)

Confirm that all systems and software that transmit electronic PHI employ encryption technology, or that the organization has a documented risk analysis supporting the decision not to employ encryption

Confirm that the organization has adopted a facility security plan for each physical location that stores or otherwise has access to PHI, in addition to a security policy that requires a physical security plan

Review the organization’s HIPAA security policies to identify any actions that have not been completed as required (physical security plan, disaster recovery plan, emergency access procedures, etc.)

 


Via Technical Dr. Inc.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

With Elder-Support Service, Apple Moves Deeper Into The Health Care Space

With Elder-Support Service, Apple Moves Deeper Into The Health Care Space | Enterprise Architecture and Business Strategies | Scoop.it
A partnership between Apple, IBM, and Japan Post brings iPads loaded with "quality of life" apps to elderly customers in Japan.
more...
No comment yet.
Rescooped by Anne-Marie Armstrong from Digital Storytelling
Scoop.it!

The Power of Storytelling in Social Media Marketing

The Power of Storytelling in Social Media Marketing | Enterprise Architecture and Business Strategies | Scoop.it
What keeps you coming back to your favorite books, TV series or movies? A good story. Publishers and producers know this and have become masters at using the power of story to draw big audiences.

T

Via José Carlos
more...
Camille Jaeger's curator insight, April 9, 2015 4:58 AM

Les médias sociaux au service des marques pour un meilleur storytelling !

Scooped by Anne-Marie Armstrong
Scoop.it!

Amazon to Sell Predictions in Cloud Race Against Google and Microsoft

Amazon to Sell Predictions in Cloud Race Against Google and Microsoft | Enterprise Architecture and Business Strategies | Scoop.it
Amazon Web Services, the world’s biggest cloud company, is now selling cheap data analysis and prediction. It’s likely to get baked into all kinds of applications, bringing pain to the old guard.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

MIT Student Develops A Facebook For Depression

MIT Student Develops A Facebook For Depression | Enterprise Architecture and Business Strategies | Scoop.it
Koko is an upcoming iPhone app that aims to help people fix the bugs in their thinking by crowdsourcing cognitive behavioral techniques.
more...
No comment yet.
Rescooped by Anne-Marie Armstrong from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Are You An Analog or Digital Leader?

Are You An Analog or Digital Leader? | Enterprise Architecture and Business Strategies | Scoop.it
By Abhijit Bhaduri and Bill Fischer Changing mindsets begins with you! The only mind you can be sure of changing is your own, and the only way that you can demonstrate this mindset change is through your behaviors. If you aspire for your organization to be faster, more innovative, less afraid [...]

Via Tom D'Amico (@TDOttawa)
more...
Sonia Santoveña's curator insight, March 23, 2015 5:09 AM

añada su visión ...

Willem Kuypers's curator insight, March 29, 2015 3:28 PM

Le digital a certainement changé notre façon d'être. Ici l'auteur fait une extrapolation vers le leadership du 21st siècle. Évidemment les choses ne sont pas aussi noir/blanc. Il faut des styles de management différents selon les situations.

Sarah johnstone's curator insight, May 19, 2015 4:59 AM

Digital - DIGItal - DIGITAL All The Way For Me!! ��

Scooped by Anne-Marie Armstrong
Scoop.it!

11 Things CMOs Need To Know About Mobile Marketing Strategy And App Development

11 Things CMOs Need To Know About Mobile Marketing Strategy And App Development | Enterprise Architecture and Business Strategies | Scoop.it
I honestly cannot believe I actually have to write this but this just in, pretty much entire world is on a mobile device on pretty much the whole time they are awake.
more...
No comment yet.
Rescooped by Anne-Marie Armstrong from rincóndeaula
Scoop.it!

Cómic sobre Malala Yousafzai en castellano.

Cómic sobre Malala Yousafzai en castellano. | Enterprise Architecture and Business Strategies | Scoop.it

Click here to edit the content


Via jmanuelgarrido
Anne-Marie Armstrong's insight:

add your insight ...

more...
COURS PARTICULIERS's curator insight, February 26, 2015 1:35 AM

Cómic sobre Malala Yousafzai en #español

Jimena Acebes Sevilla's curator insight, August 21, 2015 7:45 PM
Precioso cómic sobre Malala,
Scooped by Anne-Marie Armstrong
Scoop.it!

Inside a Big Data Headquarters

Inside a Big Data Headquarters | Enterprise Architecture and Business Strategies | Scoop.it
Take a peek inside Blue Yonder s headquarters in Karlsruhe, Germany which combines people, process, and data center horsepower.
more...
No comment yet.
Scooped by Anne-Marie Armstrong
Scoop.it!

Red Hat CEO: Today's IT department is in a fight for its life

Red Hat CEO: Today's IT department is in a fight for its life | Enterprise Architecture and Business Strategies | Scoop.it
There's a new trend called "devops" that is sweeping the enterprise IT world.
more...
No comment yet.