July, 2015

article thumbnail

NewCo Cincinnati Is Next Week. Here Are The Companies I’m Getting Inside

John Battelle's Searchblog

The post NewCo Cincinnati Is Next Week. Here Are The Companies I’m Getting Inside appeared first on John Battelle's Search Blog. I know I rave about all the NewCo cities, but once again I am picking my companies from a new festival lineup – and once again, I’m blown away. Next week is NewCo Cincinnati , and wow – what a stellar group of companies to chose from.

IT 97
article thumbnail

Have Microsoft blown it? Part II

Collaboration 2.0

I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices. In response to some of the comments and debate last week here are some further thoughts on my rationale.

IT 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

article thumbnail

DB2 for z/OS Group Buffer Pools: ALLOWAUTOALT, Directory Entries, and GBP Size

Robert's Db2

So, I've seen something interesting lately in reviewing some DB2 for z/OS data sharing systems, and as is often the case in such situations, when I see something interesting I want to write about it. Thus this blog entry. Hope you find it to be useful. What has caught my eye recently in looking over DB2 data sharing configuration information? Big group buffer pool (GBP) directory to data entry ratios.

IT 48
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

States Writing Biometric-Capture Laws May Look to Illinois

Hunton Privacy

Recent class actions filed against Facebook and Shutterfly are the first cases to test an Illinois law that requires consent before biometric information may be captured for commercial purposes. Although the cases focus on biometric capture activities primarily in the social-media realm, these cases and the Illinois law at issue have ramifications for any business that employs biometric-capture technology, including those who use it for security or sale-and-marketing purposes.

Sales 49

More Trending

article thumbnail

What We Can Learn From the Hacking Team Hack

Productivity Bytes

There is one word that strikes fear into the heart of government agencies and firms engaged in dealings of a secretive and questionable nature. “Hacktivism” has inspired decentralized groups of hackers dedicated to routing out unlawful espionage, corporate greed and human rights violations wherever they occur. And sometimes other hackers are the target of such … + Read More.

article thumbnail

Office productivity: Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 64
article thumbnail

Article on Document-Level Redaction of Electronic Documents

Positively RIM

On June 30 online , KM World published an article I wrote on Document-Level Redaction of Electronic Documents. While this is not everyone's cup of tea, it is an important tool for many RIMmers. [As it has fallen out of use a bit, I remind my gentle readers that RIM is an acronym for Records & Information Management.] The article can be found at [link].

IT 40
article thumbnail

How Will You Use DB2 for z/OS Global Variables?

Robert's Db2

About seven years ago, in an entry posted to the blog I maintained while working as an independent DB2 consultant (prior to rejoining IBM), I wrote of the evolution of DB2 for z/OS SQL from merely a data manipulation language to a programming language. That evolution continues with DB2 Version 11, in part through the introduction in that DB2 release of global variable functionality.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Connecticut Passes New Data Protection Measures into Law

Hunton Privacy

On July 1, 2015, Connecticut’s governor signed into law Public Act No. 15-142, An Act Improving Data Security and Agency Effectiveness (the “Act”), that (1) amends the state’s data breach notification law to require notice to affected individuals and the Connecticut Attorney General within 90 days of a security breach and expands the definition of personal information to include biometric data such as fingerprints, retina scans and voice prints; (2) affirmatively requires all businesses, includi

article thumbnail

Visualizing better healthcare

CGI

Visualizing better healthcare. kathy.jacquay@…. Wed, 07/29/2015 - 05:20. Graphical displays of data have been with us since the 1700s, according to visualization guru Edward Tufte. People are visual creatures, so if we want to really understand a set of data, it’s of great value to be able to see points of comparison, say in a timeline, graph or diagram.

40
article thumbnail

Everything you Always Wanted to Know About Capture

JKevinParker

On 7/8/2015, I was the featured speaker for an AIIM Webinar on Capture called "Everything you Always Wanted to Know About Capture into Process". View the presentation recording on the AIIM site , or browse the slide deck below. Everything you Always Wanted to Know About Capture into Process from AIIM Webinar Description Capture today is far more than scanning and mailroom automation; more than being a trigger for workflows and processes in the organization.

40
article thumbnail

Office productivity: Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 64
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK Supreme Court to re-consider compensation rights under Data Protection Act

Privacy and Cybersecurity Law

This week, Google has been granted permission to appeal to the UK Supreme Court as part of the decision in […].

article thumbnail

vsftpd-3.0.3 released. and the horrors of FTP over SSL

Scary Beasts Security

I just released vsftpd-3.0.3, as noted on the vsftpd home page. It's actually been almost three years(!) since vsftpd-3.0.2, so things do seem to be getting very stable and calming down. The exception to things getting very stable and calming down seems to be SSL over FTP, which has been a constant source of, uh, joy, for some time now. Some issues fixed relate to security and warrant describing here because I think they are interesting.

article thumbnail

House of Representatives Passes Bill to Permit Broader Use and Disclosure of Protected Health Information for Research Purposes

Hunton Privacy

On July 10, 2015, the United States House of Representatives passed the 21st Century Cures Act (the “Act”), which is intended to ease restrictions on the use and disclosure of protected health information (“PHI”) for research purposes. Currently, the HIPAA Privacy Rule permits the use and disclosure of PHI for research purposes without requiring authorization from an individual but does require that any waiver of the authorization requirement be approved by an institutional review board or a pri

article thumbnail

Shared services are an effective means to innovation and savings

CGI

Les services partagés : un modèle efficace pour réaliser des économies et stimuler l’innovation. narmada.devarajan. Tue, 07/21/2015 - 01:29. Dans le secteur privé, les services partagés sont courants et généralement admis. Il convient même aux entreprises de très grande envergure d’utiliser des processus et systèmes administratifs uniques pour la facturation, l’approvisionnement, les ressources humaines, la formation et les finances ainsi que pour le soutien en matière de communications, de mark

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 64
article thumbnail

Has Microsoft blown it? Part II

Collaboration 2.0

I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices.

IT 65
article thumbnail

CIPL Urges Expansion of Privacy Toolkit Beyond Consent

Hunton Privacy

How do we focus on individuals and ensure meaningful control and the empowerment of individuals in the modern information age? What data privacy tools would drive empowerment in the digital world of today and tomorrow, perhaps more effectively and more nimbly than traditional individual consent? At a time when many countries are legislating or revising their data privacy laws and organizations are searching for best practices to embed in their business models, these questions are more relevant t

Privacy 49
article thumbnail

Draft Cybersecurity Law Published for Comment in China

Hunton Privacy

On July 6, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published a draft of the country’s proposed Network Security Law (the “Draft Cybersecurity Law”). A public comment period on the Draft Cybersecurity Law is now open until August 5, 2015. At this point, the Draft Cybersecurity Law has not yet been finalized.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Hunton Webinar on the Proposed EU General Data Protection Regulation: Preparing for Change

Hunton Privacy

On July 9, 2015, Hunton & Williams LLP hosted a webinar on the Proposed EU General Data Protection Regulation: Preparing for Change (Part 1). Hunton & Williams partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto moderated the session, which was led by speakers Bridget Treacy , managing partner of the firm’s London office; Wim Nauwelaerts, managing partner of the firm’s Brussels office; and Jörg Hladjk, counsel in the firm’s Brussels office.

Privacy 45
article thumbnail

EDPS Issues Opinion and Launches Regulation App for Mobile Devices

Hunton Privacy

On July 27, 2015, Giovanni Buttarelli, the European Data Protection Supervisor (“EDPS”), published Opinion 3/2015 on the reform of Europe’s data protection laws, intended to “assist the participants in the trilogue in reaching the right consensus on time.” The Opinion sets out the EDPS’ vision for the regulation of data protection, re-stating the case for a framework that strengthens the rights of individuals and noting that “the time is now to safeguard individuals’ fundamental rights and freed

GDPR 40
article thumbnail

Federal Court: Seventh Circuit States Data Breach Class’ Allegations Against Neiman Marcus Satisfy Article III Standing

Hunton Privacy

On July 20, 2015, the United States Court of Appeals for the Seventh Circuit reversed a previous decision that dismissed a putative data breach class action against Neiman Marcus for lack of Article III standing. Remijas et al. v. Neiman Marcus Group, LLC , No. 14-3122. The litigation arose from a 2013 data breach in which approximately 350,000 customers’ cards were exposed.

article thumbnail

Hunton Publishes Several Chapters in International Comparative Legal Guide to Data Protection

Hunton Privacy

Hunton & Williams is pleased to announce its participation with the Global Legal Group in the publication of the second edition of the book The International Comparative Legal Guide to: Data Protection 2015. Members of the Hunton & Williams Global Privacy and Cybersecurity team prepared several chapters in the guide, including the opening chapter on “Legislative Change: Assessing the European Commission’s Proposal for a Data Protection Regulation,” and chapters on Belgium, China, France,

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

FERC Proposes to Accept Updated CIP Standards and Calls for New Cybersecurity Controls

Hunton Privacy

On July 16, 2015, the Federal Energy Regulatory Commission (“FERC”) issued a new Notice of Proposed Rulemaking (“NOPR”) addressing the critical infrastructure protection (“CIP”) reliability standards. The NOPR proposes to accept with limited modifications seven updated CIP cybersecurity standards. The NOPR also proposes that new requirements be added to the CIP standards to protect supply chain vendors against evolving malware threats and addresses risks to utility communications networks.

article thumbnail

Indonesia Publishes Proposed Data Protection Rule

Hunton Privacy

On July 14, 2015, pursuant to an implementation requirement of Government Regulation 82 of 2012, the Indonesian government published the Draft Regulation of the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems (“Proposed Regulation”). The Proposed Regulation addresses the protection of personal data collected by a variety of government agencies, enumerates the rights of those whose personal data is collected and the obligations of users of

article thumbnail

FCC Issues Clarifications Regarding the Telephone Consumer Protection Act

Hunton Privacy

On July 10, 2015, the Federal Communications Commission (“FCC”) released a Declaratory Ruling and Order that provides guidance with respect to several sections of the Telephone Consumer Protection Act (“TCPA”). The Declaratory Ruling and Order responds to 21 separate requests from industry, government and others seeking clarifications regarding the TCPA and related FCC rules.