April, 2015

article thumbnail

Integrations (and Metaservices) For The Win

John Battelle's Searchblog

'The post Integrations (and Metaservices) For The Win appeared first on John Battelle's Search Blog. A GeckoBoard sample dashboard, integrating half a dozen separate data services. What makes for a truly NewCo business? I’ve been giving this question a lot of thought the past six or so months, leading to posts like Maybe The Best Way To Change the World Is To Start a Company , Living Systems and The Information First Company , What Makes a NewCo , and posts on NewCos like MetroMile

article thumbnail

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose. The misunderstanding of which I speak: some people are under the impression that dynamic SQL statements issued by DDF-connected applications are zIIP-eligible whe

Access 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Security Act Introduced in New York State Assembly

Hunton Privacy

On April 8, 2015, a New York Assemblyman introduced the Data Security Act in the New York State Assembly that would require New York businesses to implement and maintain information security safeguards. The requirements would apply to “private information,” which is defined as either: personal information consisting of any information in combination with one or more of the following data elements, when either the personal information or the data element is not encrypted: Social Security number;

article thumbnail

It's the data plan, stupid: The dark side of digital transformation

Collaboration 2.0

'Data costs are now central to the economics of both individuals and the companies they buy things from. Digital strategy has to understand customer mobile data costs and associated mobile back-end development goals and budgeting.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hearthstone 3d card viewer in pure javascript/css3

Elie

To celebrate the new Hearthstone extension, Blackrock Mountain, I’m releasing a Hearthstone 3D card viewer written in pure Javascript. I feel Blackrock Mountain’s release is the perfect opportunity to showcase HTML5’s top notch performance and inspire more people to do cool visualizations on the web. With well over 500 cards, it’s high time to create a tool with powerful filtering and attractive visualization to explore the cards in an interesting fashion that works both on desktops and tablets.

48

More Trending

article thumbnail

My Schedule For NewCo New York 2015

John Battelle's Searchblog

'The post My Schedule For NewCo New York 2015 appeared first on John Battelle's Search Blog. Have you ever been to a music festival, and found yourself overwhelmed by too many great choices? Look at Coachella , for example. There are six stages to chose from. On Friday, how are you supposed to pick between Alabama Shakes and Lykke Li? I love ‘em both.

article thumbnail

A DB2 11 for z/OS Temporal Data Enhancement You Might Have Missed

Robert's Db2

When DB2 10 for z/OS introduced temporal data functionality about five years ago, one of the first use cases that jumped to mind for many people was data-change auditing: a table could be created with (or an existing table altered to add) the "system time" characteristic, and thereafter one would have, in the history table associated with the base table, a record of row changes resulting from UPDATE and DELETE statements targeting the base table.

IT 48
article thumbnail

The International Conference of Data Protection and Privacy Commissioners Announces Its First Permanent Website

Hunton Privacy

The International Conference of Data Protection and Privacy Commissioners (the “Conference”) has launched a new permanent website. The new website fulfills the agreement made between Commissioners “to create a permanent website in particular as a common base for information and resources management” in the Montreux Declaration adopted in 2005. The Executive Committee Secretariat called the website a “one-stop-shop for permanent Conference documentation,” and will be a resource for members and th

Privacy 58
article thumbnail

It's the data plan, stupid: The dark side of digital transformation

Collaboration 2.0

Data costs are now central to the economics of both individuals and the companies they buy things from. Digital strategy has to understand customer mobile data costs and associated mobile back-end development goals and budgeting.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Privacy Group Requests D.C. Circuit Review Regarding Lack of Privacy Rules in the FAA’s Proposed Drone Regulations

Hunton Privacy

On March 31, 2015, the Electronic Privacy Information Center (“EPIC”) filed a petition (the “Petition”) with the U.S. Court of Appeals for the District of Columbia Circuit accusing the Department of Transportation’s Federal Aviation Administration (“FAA”) of unlawfully failing to include privacy rules in the FAA’s proposed framework of regulations for unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 49
article thumbnail

Washington State Senate Approves Amendment to Data Breach Notification Law

Hunton Privacy

On April 13, 2015, the Senate of Washington State unanimously passed legislation strengthening the state’s data breach law. The bill (HB 1078) passed the Senate by a 47-0 vote, and as we previously reported , passed the House by a 97-0 vote. The bill includes the following amendments to Washington’s existing data breach notification law: Requires notification to the state attorney general in the event of a breach; imposes a 45-day deadline for notification to affected residents and the state att

article thumbnail

Canada Joins the APEC Cross-Border Privacy Rules System

Hunton Privacy

On April 15, 2015, the Asia-Pacific Economic Cooperation (“APEC”) Electronic Commerce Steering Group issued a press release announcing Canada’s participation in the APEC Cross-Border Privacy Rules (“CBPR”) System. The U.S. Department of Commerce’s International Trade Administration also released an official press statement. The Findings Report of the Joint Oversight Panel for the APEC CBPR system, which confirmed that Canada had met the conditions for participation, was released earlier on April

Privacy 45
article thumbnail

UK Court Ruling Allows Claims Against Google for Misuse of Private Information

Hunton Privacy

On March 27, 2015, the England and Wales Court of Appeal issued its judgment in Google Inc. v Vidal-Hall and Others. Google Inc. (“Google”) appealed an earlier decision by Tugendhat J. in the High Court in January 2014. The claimants were users of Apple’s Safari browser who argued that during certain months in 2011 and 2012, Google collected information about their browsing habits via cookies placed on their devices without their consent and in breach of Google’s privacy policy.

Privacy 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Sotto Named Among National Law Journal’s “Outstanding Women Lawyers”

Hunton Privacy

Hunton & Williams LLP announces Lisa J. Sotto , head of the firm’s Global Privacy and Cybersecurity practice and managing partner of the New York office, has been named to The National Law Journal’s “Outstanding Women Lawyers” list. The listing, composed of 75 of the most accomplished female lawyers today, includes women who have surpassed their peers based on their excellence in professional practice, development of new areas of law, leadership roles and influence.

Privacy 40
article thumbnail

HHS Reaches Settlement with Pharmacy Over Disposal Issues

Hunton Privacy

The Department of Health and Human Services (“HHS”) recently announced a resolution agreement and $125,000 settlement with Cornell Prescription Pharmacy (“Cornell”) in connection with the disposal of prescription records in an unsecured dumpster on Cornell’s premises. After receiving a report from a Denver television station regarding Cornell’s disposal practices, the HHS’ Office for Civil Rights (“OCR”) investigated Cornell and found several HIPAA Privacy Rule violations, including that Cornell

Privacy 40
article thumbnail

ICO Publishes Summary of Responses to its Big Data Report

Hunton Privacy

On April 10, 2015, the UK Information Commissioner’s Office (“ICO”) published a summary of the feedback received from its July 28, 2014 report on Big Data and Data Protection (the “Report”). The ICO plans to revise its Report in light of the feedback received on three key questions and re-issue the Report in the summer of 2015. Below are key highlights set forth in the summary, entitled Summary of feedback on Big Data and data protection and ICO response (“Summary of Feedback”).

article thumbnail

FCC Joins Asia Pacific Privacy Forum

Hunton Privacy

On April 15, 2015, the Federal Communications Commission (“FCC”) announced that it has joined the Asia Pacific Privacy Authorities (“APPA”), the principal forum for privacy authorities in the Asia-Pacific Region. APPA members meet twice a year to discuss recent developments, issues of common interest and cooperation. The FCC now joins the Federal Trade Commission as the U.S. representatives to APPA.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Streamlining onboard sales through a single, back-office solution

CGI

Streamlining onboard sales through a single, back-office solution. shobana.lv@cgi.com. Tue, 04/21/2015 - 06:30. In today’s highly competitive and fast changing travel industry, driving efficiencies and cost-effectiveness are critical to long-term survival. Retail is a prime area for achieving both objectives, and travel operators are seeking to invest in retail systems that streamline and improve processes while offering a shorter payback period and generating more revenue.

Sales 40
article thumbnail

French Data Protection Authority Unveils 2014 Annual Activity Report

Hunton Privacy

On April 16, 2015, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2014 (the “Report”) highlighting its main accomplishments in 2014 and outlining some of the topics it will consider further in 2015. The Report presents the results of the inspections conducted by the CNIL to assess compliance with its cookie law guidance issued in December 2013.

article thumbnail

American Chamber of Commerce in China Publishes Policy Spotlight Report on Protecting Data Flows between China and the U.S.

Hunton Privacy

On April 14, 2015, the American Chamber of Commerce in China (“AmCham”) published a report, entitled Protecting Data Flows in the US-China Bilateral Investment Treaty (the “Report”). The Report is part of AmCham’s Policy Spotlight Series. While in principle addressed to the U.S. and Chinese teams that are currently negotiating the Bilateral Investment Treaty, the Report has been made public.

article thumbnail

When Consumerisation and Cloud Services = Shadow IT

CGI

When Consumerisation and Cloud Services = Shadow IT. p.butler@cgi.com. Tue, 04/14/2015 - 05:33. We have all heard the term 'Consumerisation of IT'- the specific impact that consumer-orientated technologies can have on enterprises as they are adopted by end users, often bypassing an enterprises' IT department. This issue is not new, and generally started with the rise of the feature phone and smart phone as people started to use their own devices rather than the voice & text only devices issued b

Cloud 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

FTC Announces Settlements with Debt Brokers Who Posted Consumers’ Information Online

Hunton Privacy

On April 13, 2015, the Federal Trade Commission announced that it has settled charges with two debt brokers who posted consumers’ unencrypted personal information on a public website. The settlements with Cornerstone and Company, LLC (“Cornerstone”), Bayview Solutions, LLC (“Bayview”), and the companies’ individual owners resulted from initial complaints about the debt brokers in 2014.

article thumbnail

UN Human Rights Council Establishes Special Rapporteur on the Right to Privacy

Hunton Privacy

On March 26, 2015 the United Nations Human Rights Council (the “Council”) announced that it will appoint a new position as special rapporteur on the right to privacy for a term of three years. The position, which is part of the Council’s resolution , is intended to reaffirm the right to privacy and the right to the protection of the law against any interference on a person’s privacy, family, home or correspondences, as set out in Article 12 of the Universal Declaration of Human Rights and Articl

Privacy 40
article thumbnail

FTC Proposes Settlement with Two Companies Over False Safe Harbor Certification Claims

Hunton Privacy

On April 7, 2015, the FTC announced proposed settlements with TES Franchising, LLC, an organization specializing in business coaching, and American International Mailing, Inc., an alternative mail transporting company, related to charges that the companies falsely claimed they were compliant with the U.S.-EU and U.S.-Swiss Safe Harbor Frameworks. The FTC’s complaints against TES Franchising and American International Mailing alleged that the companies’ websites indicated that their Safe Harbor c

Privacy 40
article thumbnail

The perfect digital storm

CGI

The perfect digital storm. ravi.kumarv@cgi.com. Fri, 04/10/2015 - 05:36. I recently attended a Tech UK discussion forum, the subject was ‘Has technology created or destroyed jobs’, t he answer is, of course, both. Over time jobs have been created and jobs lost, where technology has replaced hands, but has created a whole new set of services, in particular for us as consumers.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

AT&T Enters into Largest Data Breach Settlement with FCC to Date

Hunton Privacy

On April 8, 2015, the Federal Communications Commission announced a $25 million settlement with AT&T Services, Inc. (“AT&T”) stemming from allegations that AT&T failed to protect the confidentiality of consumers’ personal information, resulting in data breaches at AT&T call centers in Mexico, Colombia and the Philippines. The breaches, which took place over 168 days from November 2013 to April 2014, involved unauthorized access to customers’ names, full or partial Social Security

article thumbnail

The Internet of Things (IoT) – Start small but start

CGI

The Internet of Things (IoT) – Start small but start. ravi.kumarv@cgi.com. Tue, 04/07/2015 - 04:00. In September 2014, Gartner’s Annual Big Data survey reported, “Looking only at those organizations that have invested in big data, 32% report having deployed, up from 25% in 2013(1). ” Equally worryingly there is a general rule of thumb within the industry that 80% of a BI project cost is in getting the data prepared.

IoT 40
article thumbnail

Video: In Depth – Sotto Details Who, What, Why of Today’s Cyber Threat Landscape

Hunton Privacy

From Wall Street to Main Street to Hollywood, steering clear of a data breach is challenging in a world where it is no longer a question of if but rather a matter of when your company will be hit. Hunton & Williams’ Chair of the Global Privacy and Cybersecurity practice Lisa Sotto speaks in depth with associate Brittany Bacon about three groups of attackers, how they are infiltrating IT systems, what they are looking for, and how you can prepare.