December, 2015

article thumbnail

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck.

Access 85
article thumbnail

Can Business Get A Conscience?

John Battelle's Searchblog

The post Can Business Get A Conscience? appeared first on John Battelle's Search Blog. This post is a book review, but it starts with a story from my past. Way, way back, before San Francisco begat hip startups with nonsensical names, I found myself on the second floor of a near-abandoned warehouse on South Park, now one of the priciest areas of SF, but then, one of the cheapest.

IT 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Germany Adopts Law to Enable Class Actions for Data Protection Violations

Hunton Privacy

On December 17, 2015, the German Federal Diet ( Bundestag ) adopted a draft law introducing class action-like claims that will enable consumer protection associations to sue companies for violations of German data protection law. The law amends Germany’s Act on Actions for Injunctions to allow consumer protection associations to bring lawsuits against companies for improper use of consumer data in violation of German data protection law.

article thumbnail

What successful chief information security officers are doing right

CGI

What successful chief information security officers are doing right. Anonymous. Mon, 12/21/2015 - 04:39. The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While mandates vary among organizations, the CISO’s role has evolved from being technology focused to one of a business enabler and risk manager.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

More Trending

article thumbnail

AIIM Saves the CIP

JKevinParker

In the past week, AIIM has killed off and since resurrected the Certified Information Professional (CIP). I'm very excited that they decided to keep it. Read my take: The Certified Information Professional (CIP) Lives Again! Thank you, AIIM, for listening, and keeping this important Information Management certification.

IT 40
article thumbnail

New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship

John Battelle's Searchblog

The post New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship appeared first on John Battelle's Search Blog. Hey Searchblog readers, posting a teaser here of a story I wrote which ran this week on NewCo. We’re doing more and more original reporting and editorial on our site, I invite you to sign up for our daily newsletter , which curates the best stories and insights on the ongoing transformation of business around the world.

IT 58
article thumbnail

The EU General Data Protection Regulation

Hunton Privacy

On December 17, 2015, after three years of drafting and negotiations, the European Parliament and Council of the European Union reached an informal agreement on the final draft of the EU General Data Protection Regulation (the “Regulation”), which is backed by the Committee on Civil Liberties, Justice and Home Affairs. The Regulation replaces Directive 95/46/EC (the “Directive”), which was enacted in 1995, and will significantly change EU data protection laws.

article thumbnail

Sharing best practices in our new Data to Diamonds book

CGI

Sharing best practices in our new Data to Diamonds book. shobana.lv@cgi.com. Tue, 12/15/2015 - 07:00. Making effective use of big data has become a top priority for commercial and government organizations. Having worked on many complex data and analytics projects over the years, we have compiled numerous best practices, and developed our Data2Diamonds methodology for the design and implementation of big data analytics solutions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Preservica celebrates independence!

Preservica

I am delighted to share the great news that today, Preservica has become an independent software business, backed and owned by our original shareholders, and run by the same team of experts who have successfully delivered our digital preservation software to a growing customer base. As we’ve grown and digital preservation has moved up the public and corporate agenda, Preservica have come to realise that we can best serve our customers by creating a corporate model more suitable for our specialis

article thumbnail

Canada’s role in international botnet takedown

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has served its first warrant under Canada’s Anti-Spam Law (CASL) to take down […].

IT 40
article thumbnail

Wyndham Settles FTC Charges in FTC v. Wyndham

Hunton Privacy

On December 9, 2015, the Federal Trade Commission announced that Wyndham Worldwide Corporation (“Wyndham”) settled charges brought by the FTC stemming from allegations that the company unfairly failed to maintain reasonable data security practices. The case is FTC v. Wyndham Worldwide Corporation, et al. (2:13-CV-01887-ES-JAD) in the U.S. District Court for the District of New Jersey.

article thumbnail

Innovation Happens Everywhere Now: Barcelona-based Typeform Proves It

John Battelle's Searchblog

The post Innovation Happens Everywhere Now: Barcelona-based Typeform Proves It appeared first on John Battelle's Search Blog. Over on the NewCo site, I’ve profiled Typeform , a Barcelona-based NewCo. Below is a short outtake from that piece, if you’d like to read the entire thing, head on over to NewCo , which is publishing more and more pieces on innovative new kinds of companies around the world. .

IT 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

President Signs Law Providing Exception to Annual Privacy Notice Requirement under the Gramm-Leach-Bliley Act

Hunton Privacy

On December 4, 2015, President Obama signed the Fixing America’s Surface Transportation Act (the ‘‘FAST Act’’) into law. The FAST Act, which is aimed at improving the country’s surface transportation infrastructure, contains a provision that modifies the annual privacy notice requirement under the Gramm-Leach-Bliley Act (“GLBA”). Under the current GLBA Privacy Rule, financial institutions must mail an annual privacy notice to their customers that sets forth how they collect, use and disclose tho

Privacy 45
article thumbnail

California Attorney General Announces $25 Million Settlement with Comcast

Hunton Privacy

On December 15, 2015, the California Attorney General announced an approximately $25 million settlement with Comcast Cable Communications, LLC (“Comcast”) stemming from allegations that Comcast disposed of electronic equipment (1) without properly deleting customer information from the equipment and (2) in landfills that are not authorized to accept electronic equipment.

article thumbnail

FTC Settles with Oracle over Charges of Software Security Misrepresentations

Hunton Privacy

On December 21, 2015, the Federal Trade Commission announced software company Oracle Corporation (“Oracle”) has agreed to settle FTC charges that accused the company of misrepresenting the security of its software updates. The proposed Agreement Containing Consent Order (“Consent Order”) stems from an FTC complaint that alleged the company had deceived consumers about the security provided by updates to the Java Platform, Standard Edition software (“Java SE”).

article thumbnail

FTC Announces Largest Settlement Ever with LifeLock

Hunton Privacy

On December 17, 2015, the Federal Trade Commission announced that LifeLock, Inc. (“LifeLock”) has agreed to pay $100 million to settle contempt charges for deceptive advertising. According to the FTC, “[t]his is the largest monetary award obtained by the Commission in an order enforcement action.” Under the terms of the settlement , $68 million of the settlement amount will be paid to class action consumers who were injured by the identity theft protection company’s violation of a 2010 settlemen

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Issues COPPA Settlements Against Mobile App Operators

Hunton Privacy

On December 17, 2015, the FTC announced a pair of COPPA settlements against operators of child-directed mobile apps available for download in the major app stores. These cases are the FTC’s first COPPA actions involving the collection of persistent identifiers, and no other personal information, from children since the FTC’s updated COPPA Rule went into effect in 2013.

article thumbnail

HIPAA Settlement Emphasizes Importance of Risk Analyses

Hunton Privacy

On December 14, 2015, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it had settled potential HIPAA Security Rule violations with the University of Washington on behalf of the university’s medical center, medical school and affiliated labs and clinics (collectively, “UW Medical”). OCR investigated UW Medical after receiving a breach report in November 2013 involving an incident in which almost 100,000 individuals had their protected health inform

Risk 40
article thumbnail

U.S. Congress Releases Compromise Bill on Cybersecurity Information Sharing

Hunton Privacy

On December 16, 2015, leaders in the U.S. House of Representatives and Senate released a $1.1 trillion omnibus spending bill that contained cybersecurity information sharing language that is based on a compromise between the Cybersecurity Information Sharing Act, which passed in the Senate in October, and two cybersecurity information sharing bills that passed in the House earlier this year.

article thumbnail

Deal on EU Data Protection Regulation Imminent

Hunton Privacy

Today, Jan Philip Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, tweeted the following: “Yes, reports on white smoke are right but press information only to follow after second part of our work tonight is done, too.”. More information is expected to follow later today or tomorrow. View the European Parliament’s press release.

40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Managing today’s hybrid IT environments through an effective MSI/SIAM framework

CGI

Managing today’s hybrid IT environments through an effective MSI/SIAM framework. kathy.jacquay@…. Mon, 12/14/2015 - 01:14. Governments increasingly are adopting cloud services and transitioning to multi-provider IT delivery models to improve service levels, access specialized technologies and reduce costs. The challenge is that these hybrid environments need a robust governance function to prevent responsibility gaps or overlaps.

IT 40
article thumbnail

Why I believe the Blockchain will transform Government

CGI

Why I believe the Blockchain will transform Government. ravi.kumarv@cgi.com. Fri, 12/11/2015 - 04:23. You may not yet have come across the Blockchain but it is making waves within the financial services community and is heralded as one of the most significant advances in technology for a generation. In essence, it is a new database technology that is based on a distributed ledger, which itself is cryptographically secured.

article thumbnail

CEOs: Are You Treading Water or Truly Transforming?

CGI

CEOs: Are You Treading Water or Truly Transforming? ravi.kumarv@cgi.com. Thu, 12/10/2015 - 07:40. Why do so many brilliant companies fail to transform? 150 years ago Western Union was one of the most powerful companies on earth, thanks to its monopoly of the United States’ telegraph network. Gradually, its leaders spotted a threat: a tiny start-up with a breakthrough communications technology.

article thumbnail

European Negotiators Close Deal on First EU Rules on Cybersecurity

Hunton Privacy

On December 7, 2015, European negotiators reached an agreement on the draft text of the Network and Information Security Directive (the “NIS Directive”), the first pan-EU rules on cybersecurity. The NIS Directive was first proposed by the European Commission on February 7, 2013, as part of its cybersecurity strategy for the European Union and aims to ensure a uniform level of cybersecurity across the EU.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Why I support the Autumn Statement

CGI

Why I support the Autumn Statement. p.butler@cgi.com. Fri, 12/04/2015 - 05:35. Last week the Chancellor outlined his much-awaited Autumn spending review. This contained the usual measures related to individuals but what caught my attention was the significant focus placed on both digital transformation and greater collaboration across government. As Tim Gregory has blogged previously these are both issues we are passionate about at CGI.

article thumbnail

Triple-S Management Corporation Enters into $3.5 Million HIPAA Settlement

Hunton Privacy

On November 30, 2015, the U.S. Department of Health and Human Services (“HHS”) announced that Triple-S Management Corporation (“Triple-S”), an insurance holding company based in San Juan, Puerto Rico, agreed on behalf of certain of its subsidiaries to settle potential violations of the HIPAA Privacy and Security Rules with HHS’s Office for Civil Rights (“OCR”).

article thumbnail

The TPP Agreement and Privacy

Privacy and Cybersecurity Law

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries […].

Privacy 52