Skip to content
  • Home
  • About
  • Terms and Conditions
  • Cookies
  • Biography
Steve Deakin's Web Log

Author: Stephen Deakin

Steve Deakin has been working in Information Technology since 1988 starting as a software developer and advancing to become a technical authority, technology director and most recently holding various technology leadership roles as Chief Technology Officer. He currently provides technology consultancy in Cyber Security, Cloud Computing, Internet of Things, Mobile Development, Customer/Supplier Relationship Management, Big Data and Business Intelligence for public and private sector organisations.

Reversibility and Low Impact Change

17 May 2017 Stephen Deakin

Reversibility and Low Impact Change are the non-functional requirements for Agile Technology Change. I have attended and chaired many Change Review Boards for large organisations

Continue reading

GDPR and the Streetlight effect

12 May 2017 Stephen Deakin

There is a lot of heated debated about the GDPR (General Data Protection Regulation) – is it a Y2K damp squib or PPI/Libor/Forex all over

Continue reading

GDPR – Federated Search Technology Pattern

10 May 2017 Stephen Deakin

Data Lakes are a great way to provide a single view of the customer to comply with GDPR. However there are alternatives and I’ve created a video and an explanation of a Federated Query (also known as Federated Search).

Continue reading

General Data Protection Regulation – Right to be informed – Technology Strategy

19 Apr 2017 Stephen Deakin

The Right to be Informed (about processing) under the General Data Protection Regulations relates to information gathered either directly from the individual, through their interactions with

Continue reading

General Data Protection Regulation – Technology Strategy

19 Apr 2017 Stephen Deakin

The GDPR (General Data Protection Regulations) are part of the evolving legal landscape as digital transformation changes society’s interaction with organisations which come into force

Continue reading

Technology Security Lamination

10 Apr 2016 Stephen Deakin

The key theme for protecting IT systems from unauthorised access is to offer multiple layers of protection in terms of people, technology and physical environment.

Continue reading

Search

Advertisements
My Tweets

Recent Posts

  • Reversibility and Low Impact Change 17 May 2017
  • GDPR and the Streetlight effect 12 May 2017
  • GDPR – Federated Search Technology Pattern 10 May 2017
  • General Data Protection Regulation – Right to be informed – Technology Strategy 19 Apr 2017
  • General Data Protection Regulation – Technology Strategy 19 Apr 2017
My Tweets
March 2021
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« May