February, 2015

article thumbnail

Remember the Internet When Considering The Things

John Battelle's Searchblog

'The post Remember the Internet When Considering The Things appeared first on John Battelle's Search Blog. Last month I sat down with my old pal Jay Adelson (Digg, Revision 3, Equinix, SimpleGeo) who together with his partner Andy Smith is raising a new fund focused on the Internet of Things. Our goal was to get caught up – I’d tell him about my plans for NewCo , and they’d update me on Center Electric, the fund’s new name.

IoT 111
article thumbnail

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Office of the Privacy Commissioner of Canada Releases Research Report on Privacy and Cybersecurity

Hunton Privacy

On February 12, 2015, the Office of the Privacy Commissioner of Canada released a research report entitled Privacy and Cyber Security – Emphasizing privacy protection in cyber security activities (the “Report”). The Report explores the interconnected relationship among cybersecurity, privacy and data protection, including common interests and challenges.

Privacy 45
article thumbnail

What happens when yesterday's digital natives are tomorrow's leaders?

CGI

What happens when yesterday's digital natives are tomorrow's leaders? p.butler@cgi.com. Thu, 02/26/2015 - 05:38. The term Digital Native was originally used by Marc Prensky in his seminal article, " Digital Natives , Digital Immigrants", where he applies the term digital native to a new group of students enrolling in educational establishments referring to the young generation as “native speakers” of the digital language of computers, and social media etc.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Gleanings from LegalTech NY

Positively RIM

It’s easy to get lost in the LegalTech glitz. There are sumptuous breakfasts, hosted Happy Hours, and late night parties. On the show floor, there is flashy signage, free cappuccinos, beauteous bootblacks, and ingenious swag.* The conference sessions, despite a penchant for hyperbole, are where the rubber meets the road (to coin a phrase). At the very end of LegalTech New York, on Feb. 6, ARMA International delivered a three session track on Information Governance (IG).

More Trending

article thumbnail

Maybe The Best Way To Change the World Is To Start a Company

John Battelle's Searchblog

'The post Maybe The Best Way To Change the World Is To Start a Company appeared first on John Battelle's Search Blog. ( image ) This piece from Smithsonian caught my eye today – Young People Mistrust Government So Much They Aren’t Running for Office. It covers a Rutgers professor who studies millennial attitudes towards politics, and concludes that the much-scrutinized generation abhors politics – logging a ten point decrease in sentiment toward government in just the past dec

article thumbnail

Snapshot: College and University Retention Schedules

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Shortly after joining Brandeis to establish a records program, and being new to RIM as it applies to academia, I realized that it might be a good idea to review retention schedules from other colleges and universities (CUs) as part of my research.

article thumbnail

Two Wyoming Bills Amending the State’s Breach Notification Statute Are Headed to the Governor

Hunton Privacy

On February 23, 2015, the Wyoming Senate approved a bill (S.F.36) that adds several data elements to the definition of “personal identifying information” in the state’s data breach notification statute. The amended definition will expand Wyoming’s breach notification law to cover certain online account access credentials, unique biometric data, health insurance information, medical information, birth and marriage certificates, certain shared secrets or security tokens used for authentication pur

article thumbnail

Finding diamonds in data

CGI

Finding diamonds in data. ravi.kumarv@cgi.com. Thu, 02/19/2015 - 23:24. The right data can help cure diseases, make streets safer, improve customer service and create cost savings. It can help win battles and win ball games. It seems there’s nothing we can’t do better with the right data, along with the tools and skills to analyze it. To explore the world of big data and analytics, CGI is launching this blog to talk about new applications where people are getting value from data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Recent Brooklyn Document Storage Warehouse Fire, and Many Other Tragedies, Point Out Why Digitizing Paper Documents Should Be Considered.

Shoreline Records Management

The massive fire last week in Brooklyn’s CitiStorage Document Storage warehouse was not the first time a document storage facility has been destroyed. To name a few, 1997 South Brunswick, NJ, USA, 2006 London, England, 2006 Ottawa, Canada, 2011 Aprilia, Italy, and 2014 Buenos Aires, Argentina. With 1.1 Million Cubic Feet of records potentially destroyed at CitiStorage, including that of legal firms, financial intuitions, medical practices and hospitals ( Mount Sinai Health System, New York-Presb

Paper 24
article thumbnail

Of DB2 Connect "Gateway" Servers and DB2 for z/OS DSNL030I Authentication Messages

Robert's Db2

A few days ago I received a note in which a DBA reported strange and inconsistent information in some DSNL030I messages that were generated periodically by a DB2 for z/OS subsystem in his charge. The messages in question were tied to authentication failures associated with DDF-using applications (i.e., applications that access DB2 via network connections).

article thumbnail

Your Network Transcends Time – Care For It

John Battelle's Searchblog

'The post Your Network Transcends Time – Care For It appeared first on John Battelle's Search Blog. Every year around this year I fly to Arizona and attend the IAB Annual Meeting , a confab of 1000+ executives in the interactive media business. Yes, it’s a rubber-chicken boondoggle – what ballroom-based warm-climated event in February isn’t?

IT 101
article thumbnail

The Curious State of Information Governance at LegalTech: Contradictions Abound

Positively RIM

At the New York City LegalTech Feb. 3-6, Information Governance (IG) could be seen as an incidental tag line or a rising star. I say “incidental tag line” because many exhibitors added IG to their signage in a list of bulleted items. It was as if they wanted to be sure not to exclude someone because they didn't have a requisite buzz word.kind of like Burger King adding a vegetarian patty to their menu so a single herbivore in a group would not 86 the idea of going to Whopperland.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Article 29 Working Party Reports on Cookie Sweep Results

Hunton Privacy

On February 3, 2015, the Article 29 Working Party (“Working Party”) published a report on a sweep of 478 websites across eight EU Member States (Czech Republic, Denmark, France, Greece, the Netherlands, Slovenia, Spain and the United Kingdom). The sweep was conducted to assess compliance with Article 5.3 of the e-Privacy Directive 2002/58/EC , as amended by 2009/136/EC.

Privacy 40
article thumbnail

Riding the IoT Hype Cycle

CGI

Riding the IoT Hype Cycle. Anonymous. Thu, 02/05/2015 - 07:08. As you may have seen from recent coverage, there is a huge amount of hype surrounding the Internet of Things (IoT). The July 2014 Gartner Hype Cycle for the Internet of Things states that ‘Overall, the IoT Hype Cycle is particularly light on the mature side of the Hype Cycle. This is fully expected, because it reflects the fact that many of the IoT technologies are in the early part of their life cycle and adoption’1.

IoT 40
article thumbnail

White House Sets Privacy Expectations for the Federal Government’s Use of Unmanned Aircraft Systems

Hunton Privacy

On February 15, 2015, the White House released a Presidential Memorandum entitled “ Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems ” (the “Memorandum”) to address the privacy, civil rights and civil liberties concerns associated with the federal government’s use of Unmanned Aircraft Systems (“UAS”).

Privacy 40
article thumbnail

President Obama Signs Executive Order on Cybersecurity Information Sharing

Hunton Privacy

On February 13, 2015, at the White House’s Cybersecurity and Consumer Protection Summit at Stanford University, President Obama signed an executive order promoting private sector cybersecurity information sharing (“Executive Order”). Building on the current cybersecurity information sharing efforts of Information Sharing and Analysis Centers and groups such as the National Cyber-Forensics and Training Alliance, the new Executive Order emphasizes the need for private companies, non-profit organiz

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Highlights Debt Collection and Data Protection Issues in Letter to CFPB

Hunton Privacy

On February 5, 2015, the Federal Trade Commission sent a letter to the Consumer Financial Protection Bureau (“CFPB”) summarizing the agency’s efforts in the debt collection arena in 2014. The letter is intended to assist the CFPB with preparing its annual report to Congress on the enforcement of the Fair Debt Collection Practices Act, which must be submitted pursuant to the Dodd-Frank Wall Street Reform and Consumer Protection Act.

article thumbnail

Article 29 Working Party Clarifies Scope of Health Data Processed by Lifestyle and Wellbeing Apps

Hunton Privacy

On February 5, 2015, the Article 29 Working Party (the “Working Party”) published a letter that responds to a request of the European Commission to clarify the scope of the definition of health data in connection with lifestyle and wellbeing apps. In the annex to this letter, the Working Party identifies criteria to determine when personal data qualifies as “health data,” a special category of data receiving enhanced protection under the EU Data Protection Directive 95/46/EC (the “Directive”).

article thumbnail

Brazil Releases Draft Personal Data Protection Bill

Hunton Privacy

On January 28, 2015, the Brazilian government issued the Preliminary Draft Bill for the Protection of Personal Data ( Anteprojeto de Lei para a Proteção de Dados Pessoais ) on a website specifically created for public debate on the draft bill. The text of the bill (in Portuguese) is available on the website. ([link]. The draft bill applies to individuals and companies that process personal data via automated means, provided that the (1) processing occurs in Brazil or (2) personal data was collec

article thumbnail

SEC Releases Observations from Recent Cybersecurity Examinations of Broker-Dealers and Advisers

Hunton Privacy

On February 3, 2015, the Securities and Exchange Commission (“SEC”) released a Risk Alert , entitled Cybersecurity Examination Sweep Summary, summarizing observations from the recent round of cybersecurity examinations of registered broker-dealers and investment advisers under the Cybersecurity Examination Initiative. Conducted by the SEC Office of Compliance Inspections and Examinations (“OCIE”) from 2013 through April 2014, the examinations inspected the cybersecurity practices of 57 registere

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

German Government Adopts Draft Law Regarding the Enforcement of Data Protection Law by Consumer Protection Associations

Hunton Privacy

On February 4, 2015, the German government adopted a draft law to improve the enforcement of data protection provisions that are focused on consumer protection. As reported earlier , the new law would bring about a fundamental change in how German data protection law is enforced. The draft law enables consumer protection organizations, trade associations and certain other associations to enforce cease-and desist letters and file interim injunctions in cases where companies violate the newly defi

article thumbnail

The Role of Risk Management in Data Protection – From Theory to Practice

Hunton Privacy

On February 12, 2015, the International Association of Privacy Professionals (“IAPP”) will host a web conference on The Role of Risk Management in Data Protection – From Theory to Practice. Panelists will include Bojana Bellamy , President of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”), Fred Cate , Senior Policy Advisor of CIPL, and Hilary Wandall, Associate Vice President, Compliance and Chief Privacy Officer of Merck & Co., Inc.

Risk 40
article thumbnail

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. The Centre for Information Policy Leadership at Hunton & Williams participated as part of the U.S. delegation. The principal focus of the meetings was implementing the APEC Cross-Border Privacy Rules (“CBPR”) system, developing a corollary APEC recognition mechanism

Privacy 40
article thumbnail

Debate Over the Progress of the EU General Data Protection Regulation

Hunton Privacy

On January 20, 2015, a group of public officials and industry representatives met in a public discussion panel in Brussels to debate the progress of the proposed EU General Data Protection Regulation (the “ Proposed Regulation”) and the major themes that are yet to be resolved. The panelist included Paul Nemitz, Director for the Fundamental Rights and Union Citizenship of the European Commission, Jan Philipp Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties,

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The New IBM z13 Mainframe: A DB2 for z/OS Perspective

Robert's Db2

Last month, IBM announced the z13 -- the latest generation of the mainframe computer. The z13 is chock full of great technical features, and there are already plenty of presentations, white papers, and "redbooks" in which you can find a large amount of related information. Going through all that information is an option, but you might be thinking, "I'm a DB2 for z/OS person.