November, 2013

article thumbnail

Ubiquitous Video: Why We Need a Robots.txt For the Real World

John Battelle's Searchblog

'The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. Last night I had an interesting conversation at a small industry dinner. Talk turned to Google Glass, in the context of Snapchat and other social photo sharing apps. Everyone at the table agreed: it was inevitable – whether it be Glass, GoPro, a button in your clothing or some other form factor – personalized, “always on” streaming of images will be ubiquitous.

article thumbnail

DB2 for z/OS Work: the Task's the Thing

Robert's Db2

To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.

Access 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The end of an era?

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

84
article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The following features of the law are of particular significance: The law applies only to the processing of personal data in commercial transactions (in effect, private sector transactions, though not including credit reporting a

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CMOs and CTOs should play nice.

CGI

CMOs and CTOs should play nice. Anonymous. Fri, 11/22/2013 - 00:48. Chief Marketing Officers and Chief Technology Officers need to play nice to maximise the benefits that the Digital world offers. In the Digital world in which we now live where we are constantly in touch with everyone and everything in our lives, Marketers have found they are in a position to, and are also expected to do more than they could previously.

More Trending

article thumbnail

Nearly 30 Years In Less Than an Hour

John Battelle's Searchblog

'The post Nearly 30 Years In Less Than an Hour appeared first on John Battelle's Search Blog. Pinch me: Last week I gave a “distinguished” lecture in Engineering at Berkeley. It was an honor to do so – I don’t really see myself as distinguished in any academic sense – and certainly not when it comes to engineering.

Big data 100
article thumbnail

A Great Analytics on System z Use Case: The Operational Data Store

Robert's Db2

A few months ago, I posted an entry to this blog on the subject of "moving queries to data," the idea being that when data to be analyzed for decision support purposes originates in a DB2 for z/OS database (as a great deal of the world's corporate and governmental data does), a very good case can be made for analyzing that data on its platform of origin -- System z -- as opposed to copying and moving the data to a different platform for querying and reporting.

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

75
article thumbnail

GAO Report Highlights Gaps in U.S. Privacy Laws

Hunton Privacy

On November 15, 2013, the U.S. Government Accountability Office (“GAO”) released a report (the “Report”) finding that the current federal statutory privacy scheme contains “gaps” and “does not fully reflect” the Fair Information Practice Principles (“FIPPs”). The Report focused primarily on companies that gather and resell consumer personal information, and on the use of consumer personal information for marketing purposes.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Where to start with Business Benefits Realisation Management

CGI

Where to start with Business Benefits Realisation Management. ravi.kumarv@cgi.com. Tue, 11/12/2013 - 23:10. Try searching the Internet for information on business benefits management and there’s no end to what useful information you can find. Yet, with so much information freely available and with management frameworks requiring it as best practice, why then do businesses still fail to adopt it?

article thumbnail

Malaysia joins the global privacy club!

Privacy and Cybersecurity Law

The hotly anticipated Malaysian Personal Data Protection Act (PDPA) was finally enforced on 15 November 2013. Along with other related […].

Privacy 40
article thumbnail

Twitter Ads Are Getting, Um, More Noticeable

John Battelle's Searchblog

'The post Twitter Ads Are Getting, Um, More Noticeable appeared first on John Battelle's Search Blog. Two of my favorite companies in the world are Twitter and American Express. I have literally dozens of good pals at both. So this is said with love (and a bit more pointedly at Twitter than Amex, which is just one of many advertisers I’ve encountered in the situation described below.

article thumbnail

else 11/25: The Collective Hallucination of Currency

John Battelle's Searchblog

'The post else 11/25: The Collective Hallucination of Currency appeared first on John Battelle's Search Blog. This week, bitcoin seems to have gotten the thumbs up for innovation despite some shady origins, lots of background details came out about the circumstances that approved NSA dragnet, and privacy is declared an anomaly. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email news

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

It’s…A Marketing Barge?!

John Battelle's Searchblog

'The post It’s…A Marketing Barge?! appeared first on John Battelle's Search Blog. ( image CBS KPIX ) The #googlebarge meme has taken a very strange turn. A rather welcome diversion from our industry’s endless NSA revelations, the enigmatic barge floating off Treasure Island had been widely assumed to be a floating data center of some kind.

article thumbnail

A Metal Gun, Made from Digital Bits

John Battelle's Searchblog

'The post A Metal Gun, Made from Digital Bits appeared first on John Battelle's Search Blog. One of the artifacts we’re considering for our book is the 3D printer – not only the MakerBot version, but all types of “bits to atoms” kinds of conversions. The advances in the field are staggering – it is now possible to print human tissue , for example.

IT 88
article thumbnail

More than 200,000 Minutes of Engagement, and Counting

John Battelle's Searchblog

'The post More than 200,000 Minutes of Engagement, and Counting appeared first on John Battelle's Search Blog. Some of you may recall “ Behind the Banner ,” a visualization of the programmatic adtech ecosystem that I created with The Office for Creative Research and Adobe back in May. It was my attempt at explaining the complexities of a world I’ve spent several years engaged in, but often find confounding.

article thumbnail

else 11.11: “You can’t let the algorithms take over”

John Battelle's Searchblog

'The post else 11.11: “You can’t let the algorithms take over” appeared first on John Battelle's Search Blog. Last week there was a lot to say about Twitter and bitcoin, and the Guardian offered some reflections on what the NSA revelations mean to the average Joe. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

else 11.18: “We can see it, we can feel it, because we’re already almost there.”

John Battelle's Searchblog

'The post else 11.18: “We can see it, we can feel it, because we’re already almost there.” appeared first on John Battelle's Search Blog. This week, we talk about rights to data, nuance in the tech debate, and some interesting developments in the wearable sensor world. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 82
article thumbnail

European Commission Recommends Changes to Safe Harbor

Hunton Privacy

On November 27, 2013, the European Commission published an analysis of the EU-U.S. Safe Harbor Framework, as well as other EU-U.S. data transfer agreements. The analysis includes the following documents: A communication on rebuilding trust in EU-U.S. data flows ; An analysis of the functioning of Safe Harbor , including FAQs ; A mid-term report on the Terrorist Finance Tracking Program (“TFTP”) prepared jointly with the U.S.

article thumbnail

Supreme Court of Canada Declares Alberta PIPA Invalid

Hunton Privacy

On November 15, 2013, the Supreme Court of Canada declared the Alberta Personal Information Protection Act (“PIPA”) invalid because the legislation interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms (the “Canadian Charter”). The case arose in the context of a labor union representing employees of a casino in Alberta.

Privacy 40
article thumbnail

Mexico Issues Data Security Guidelines

Hunton Privacy

As reported by Bloomberg BNA , Mexico’s Federal Institute for Access to Information and Data Protection (“IFAI”) recently issued data security guidelines that implement the security provisions of the Federal Law for the Protection of Personal Data Held by Private Parties ( Reglamento de la Ley Federal de Protección de Datos Personales en Posesión de los Particulares ).

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Brazil Moves Forward with Internet and Data Protection Bills

Hunton Privacy

Brazilian lawmakers, including José Eduardo Cardozo, the Minister of Justice of Brazil, and Ideli Salvatti, the Secretariat of Institutional Relations, held several consensus-building meetings with party leaders over the past two weeks to reach a voting agreement on the Marco Civil da Internet (“Marco Civil”), a draft bill introduced in the Brazilian Congress in 2011.

article thumbnail

China Insurance Regulatory Agency Promulgates New Rule Protecting Personal Data of Life Insurance Customers

Hunton Privacy

On November 4, 2013, the China Insurance Regulatory Commission, which is the Chinese regulatory and administrative authority for the insurance sector, issued the Interim Measures for the Management of the Authenticity of Information of Life Insurance Customers (the “Measures”). The Measures require life insurance companies and their agents to ensure the authenticity of personal data of life insurance policy holders.

article thumbnail

Hunton Global Privacy Update – November 2013

Hunton Privacy

On November 19, 2013, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the second webcast in its Hunton Global Privacy Update series. The program focused on the latest updates regarding the EU General Data Protection Regulation (“Proposed Regulation”), including a discussion of the European Parliament’s recent approval of its Compromise Text for the Proposed Regulation.

Privacy 40
article thumbnail

Luxembourg DPA Will Not Investigate Microsoft or Skype over Involvement in the PRISM Program

Hunton Privacy

The Luxembourg data protection authority ( Commission nationale pour la protection des donées , “CNPD”) has stated that it will not investigate complaints relating to the alleged involvement of Microsoft Luxembourg (“Microsoft”) and Skype Software S.a.r.l. and Skype Communications S.a.r.l. (collectively, “Skype”) in the PRISM surveillance program. The PRISM surveillance program involves the transfer of EU citizens’ data to the U.S.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Background Check Companies Settle FCRA Allegations

Hunton Privacy

On November 12, 2013, two companies (the “Defendants”) that provide consumer background reports to third parties, including criminal record checks agreed to an $18.6 million settlement stemming from allegations that they violated the Fair Credit Reporting Act (“FCRA”) when providing these reports to prospective employers. The plaintiffs alleged that the Defendants, in violation of the FCRA, failed to (1) provide consumers with copies of their consumer reports prior to providing the reports to pr

Privacy 40
article thumbnail

FTC Denies COPPA Parental Consent Mechanism Proposal

Hunton Privacy

On November 13, 2013, the Federal Trade Commission announced that it denied a proposal submitted by AssertID, Inc. for a mechanism to obtain verifiable parental consent in accordance with the new Children’s Online Privacy Protection Rule (the “COPPA Rule”) that came into effect July 1, 2013. The COPPA Rule requires operators of certain websites and online services to obtain a parent’s consent before collecting personal information online from a child under the age of 13.

Privacy 40
article thumbnail

State AGs Reach Settlement with Google on Safari Tracking

Hunton Privacy

On November 13, 2013, Google entered into a $17 million settlement agreement with the attorneys general from 37 states and the District of Columbia related to allegations that the company bypassed users’ cookie-blocking settings on Apple’s Safari browser in 2011 and 2012. The settlement requires Google to refrain from bypassing cookie controls in the future and requires Google to maintain a page on its site informing users about cookies and how to manage them.

IT 40