@@jeffcrumeHi I am recent graduate of the University of the West Indies. I am building a website to teach small and medium business all of these things as well as provide services. Can I please use this video for my home page. Thank you kindly. My Name is Odessa Singh.
Data security is very crucial in important point to ponder. And I found this gem Irys which is providing strong data provenance and traceability to origin of data. What are your views on this?
I have a box with some wires, a monitor and a router. I don't speak IT. Not a word of it. This video made absolutely no sense to me. I don't know what "Govern" means in terms of my computer, nor "discover." I have a vague idea of what "protect" means, but not what "encript," "key mgmt," "comply," "detect," or "respond" mean in terms of "critical data," whatever than means. Speaking above the heds of the average viewer is not likley to garner you many viewers.
An excellent high-level understanding of data security. You'll simply know where to go and in what order to dig deeper. Thanks!
Thanks so much for all the encouraging words, Elias!
@@jeffcrumeHi I am recent graduate of the University of the West Indies. I am building a website to teach small and medium business all of these things as well as provide services. Can I please use this video for my home page. Thank you kindly. My Name is Odessa Singh.
Another great video by Jeff and the IBM team !
Excellent explanation ❤
Excellent as usual!!!!!!
amazing video!
Hello #IBM what mean for Dynamic System? Which is included in it?
Quality content.👏
Data security is very crucial in important point to ponder. And I found this gem Irys which is providing strong data provenance and traceability to origin of data. What are your views on this?
Wonderful content! ♥♥
Thanks!
well explained there!!!
It's very interesting 🤔❤️
thanks
hI i WOULD LIKE TO GET PERMISSION TO USE THIS VIDEO ON A WEBSITE PLEASE
Does anybody know how you make a Video like this, where is seems like one is writing on an invisible screen ? :)
I’m working on a behind the scenes video that explains the process so stay tuned …
@@jeffcrume Hi Jeff, please i need to send you a message,how do i go about it?
Where Does DLP fall in here ?
Good question. That was an error on my part to leave it out. You could put it either under Detect or Protect since it has aspects of both
@@jeffcrume thanks for your reply.
protect
It would fall under detect
I have a box with some wires, a monitor and a router. I don't speak IT. Not a word of it. This video made absolutely no sense to me. I don't know what "Govern" means in terms of my computer, nor "discover." I have a vague idea of what "protect" means, but not what "encript," "key mgmt," "comply," "detect," or "respond" mean in terms of "critical data," whatever than means. Speaking above the heds of the average viewer is not likley to garner you many viewers.
Then you’re in the wrong channel my friend
LoL... They're not talking to you!
audio bad on this one too
wyhat.