Printervriendelijke versiePDF-versie

BSA TechPost

Abonneren op feed BSA TechPost BSA TechPost
BSA's official blog, a forum on important issues facing the software industry.
Bijgewerkt: 22 uur 57 min geleden

A Cybersecurity Agenda for the Connected Age: One Year Later

wo, 10/03/2018 - 20:03
One year ago today, BSA | The Software Alliance released a new policy agenda for cybersecurity. The continuing evolution of cyber threats underscores the necessity of cybersecurity in the global digital economy.
Categorieën: ICT

BSA Celebrates 30 Years and Honors 2018 Software Champions

do, 09/06/2018 - 19:40
Last night, we celebrated BSA’s 30th Anniversary by honoring Sens. Todd Young and Maria Cantwell and Reps. Doug Collins and Hakeem Jeffries as BSA’s 2018 Software Champions during a reception at the US Capitol. Each of these members has worked diligently for issues that matter to the software industry, including driving a constructive discussion about … Read More >>
Categorieën: ICT

Copyright Proposal Threatens to Undermine Europe’s AI Ambitions

wo, 09/05/2018 - 16:38
Next week, the European Parliament plenary will vote on one of its most controversial files to date – the Copyright Directive. The new legislation touches upon a number of thorny issues that have been the subject of intense debate, yet its Article 3 – aiming to regulate Text and Data Mining (TDM) – is often … Read More >>
Categorieën: ICT

As AI Grows, Privacy, Security, and Global Data Flows Are Key to Innovation, BSA Tells FTC

wo, 08/22/2018 - 21:47
The Federal Trade Commission’s (FTC) policy and enforcement priorities have a significant impact on the digital economy – and the development of cutting-edge software tools, such as artificial intelligence. The agency has a long track record of evaluating its policy and enforcement approaches, including its 1995 hearings on competition and consumer protection; its pre-centennial global … Read More >>
Categorieën: ICT

Tech and Law Enforcement Should Deepen Cooperation to Fight Crime

vr, 08/10/2018 - 22:03
Debate about law enforcement’s ability to access encrypted devices and communications remains a stalemate. Law enforcement leaders continue to insist on the need for extraordinary access to encryption in criminal investigations; technology experts note that such an approach would bring untenable risks to the security and privacy of individuals, businesses, and critical infrastructure. While this … Read More >>
Categorieën: ICT

Copyright © 2000 - 2018 AbitMORE bvba - All rights reserved.

Copyrights | Trademarks | Terms and Conditions | Privacy | RSS feeds

Design: In Petto | Hosting: AbitMORE | Powered by: Drupal