October, 2014

article thumbnail

The Next Stage of Mobile Quickening: Links Get Intelligent

John Battelle's Searchblog

'The post The Next Stage of Mobile Quickening: Links Get Intelligent appeared first on John Battelle's Search Blog. How Branch Metrics works…click to enlarge. Early in a conversation with Alex Austin, CEO of mobile startup Branch Metrics , I had to interrupt and ask what seemed like a really dumb question. “So, wait, Alex, you’re telling me that the essence of your company’s solution is that it… makes sure a link works?

Passwords 111
article thumbnail

DB2 for z/OS Stored Procedures: Native SQL, or Java?

Robert's Db2

Recently, a mainframe DB2 DBA put a question to me: when should DB2 for z/OS native SQL procedures be used versus Java stored procedures, and vice versa? Why he asked: the DBA worked with a group of developers who, collectively, could code both of these DB2 stored procedure types. Within this group, individuals tended to go with what they were used to.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information

JKevinParker

This presentation is adapted from a tutorial I wrote for AIIM , which is available in their SharePoint Resource Center. I also presented some of this material at the SharePoint Users Group of DC (SUGDC) on 9/11/2014. How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information from Kevin Parker. The AIIM Resource Centers offer lots of tutorials, webinars, publications, perspectives and more on SharePoint and a host of Information Management topics.

article thumbnail

Software Robots – friend or foe?

CGI

Software Robots – friend or foe? p.butler@cgi.com. Fri, 10/31/2014 - 04:00. Robotics are not new. They have existed in manufacturing for many years and their potential has been showcased again by Honda in the form of New ASIMO , which I personally think is a fantastic piece of engineering. But what are software robots? Software Robots, or Robotic Process Automation to use its correct name, is the “application of technology that allows employees in a company to configure computer software or a ‘

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FCC Announces Intended $10 Million Fine in First Data Security Case

Hunton Privacy

On October 24, 2014, the Federal Communications Commission announced that it intends to impose a $10 million fine on TerraCom, Inc. (“TerraCom”) and YourTel America, Inc. (“YourTel”) for violating privacy laws relating to their customers’ personal information. This announcement marks the FCC’s first enforcement action in the data security arena as well as its largest privacy action to date.

More Trending

article thumbnail

My Picks for NewCo Silicon Valley

John Battelle's Searchblog

'The post My Picks for NewCo Silicon Valley appeared first on John Battelle's Search Blog. We’re more than halfway through the NewCo festival season, with Amsterdam, San Francisco, Detroit, New York, and London/UK behind us, and Silicon Valley, Boulder, and Los Angeles coming up. Next up is Silicon Valley , which goes off Oct. 21 – 23, centered on the axis of Palo Alto.

article thumbnail

DB2 for z/OS: Thoughts on Table Space and Index Page Size Selection

Robert's Db2

The other day I got a note, from a DB2 for z/OS DBA, in which I was asked for my thoughts regarding the selection of page size for a table space. I typed out what I hoped would be a useful response, and found myself thinking, as I sometimes do, "Hey -- I could turn this into a blog entry." And so I have. I'll start here by offering some guidelines on page size selection for table spaces, and then I'll shift to the index perspective on the matter.

Access 48
article thumbnail

Living Systems and The Information First Company

John Battelle's Searchblog

'The post Living Systems and The Information First Company appeared first on John Battelle's Search Blog. A map tracing the information flows within Uber’s San Francisco market. One of the great joys of my career is the chance to speak at gatherings of interesting people. Sometimes it’s an unscripted, wide ranging conversation (like during Advertising Week , for example), but other times it’s a formal presentation, which means many hours of preparation and reportage.

article thumbnail

Around The Kitchen Table, a Better Way To Finance “Secondaries” Is Born

John Battelle's Searchblog

'The post Around The Kitchen Table, a Better Way To Finance “Secondaries” Is Born appeared first on John Battelle's Search Blog. Nearly a decade ago I was two years into starting a new company, one that was growing quickly, but at the same time struggling with all the classic problems of a startup. We needed to raise more capital, we needed to hire more of the right people, and we needed to retain and motivate the people we already had brought onboard.

Sales 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

“Peak Google”? Maybe, But Is “Native” The Reason?

John Battelle's Searchblog

'The post “Peak Google”? Maybe, But Is “Native” The Reason? appeared first on John Battelle's Search Blog. From Thompson’s “Peak Google” post. I love Ben Thompson’s Stratechery site, so much in fact that I’m writing a response to his recent “ Peak Google ” post, even though these days most of us limit our bloggy commentary to the 140-character windows of Twitter.

article thumbnail

My NewCo Los Angeles Picks

John Battelle's Searchblog

'The post My NewCo Los Angeles Picks appeared first on John Battelle's Search Blog. I love LA. There, I said it. Yes, I made my entire career and life up here in the Bay Area, and the Dodgers bother me immensely. But I was born in LA, I grew up there, and every time I get back, I get homesick for the light, the warm air, the heady nonsense, and – lately – the extraordinary business culture that’s been brewing these past five or ten years.

IT 86
article thumbnail

Else 10.13.14: Smiling Happy Facebook People (Not Teens, Though)

John Battelle's Searchblog

'The post Else 10.13.14: Smiling Happy Facebook People (Not Teens, Though) appeared first on John Battelle's Search Blog. Now you can buy real, smiling, happy shiny people all over the web, courtesy Facebook. Today’s summary covers the past two weeks of worthy reads, with a strong dose of the Internet’s twin titans Facebook and Google.

IT 83
article thumbnail

Else 10.27.14 – Assange Takes on Google

John Battelle's Searchblog

'The post Else 10.27.14 – Assange Takes on Google appeared first on John Battelle's Search Blog. ( image ) So what are the most powerful, important, noteworthy stories of the past ten or so days? Read on to find out… Assange: Google Is Not What It Seems – Newsweek. Julian Assange veers between wild eyed conspiracy theory and, well, level-headed conspiracy theory in this rather factless but quite compelling read.

IT 83
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FCC Joins the Global Privacy Enforcement Network

Hunton Privacy

On October 28, 2014, the Federal Communications Commission announced that it has joined the Global Privacy Enforcement Network (“GPEN”), a network of approximately 50 privacy enforcement authorities from around the world. The FCC is the second U.S. privacy enforcement authority to join GPEN. The other U.S. member, the Federal Trade Commission, helped establish the network in 2010.

Privacy 40
article thumbnail

UK Government Seeks Stronger Enforcement Powers Against Nuisance Callers and Texters

Hunton Privacy

The UK government has announced proposals designed to make it easier for the Information Commissioner’s Office (“ICO”) to fine companies responsible for nuisance calls and text messages. Under the proposals, the current maximum fine of £500,000 would remain unchanged, but the threshold for imposing fines would be lowered. The rules regarding nuisance calls and texts in the UK are contained in the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) and are enforced by t

article thumbnail

Council of the European Union Proposes Risk-Based Approach to Compliance Obligations

Hunton Privacy

The Council of the European Union has published proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the forthcoming EU General Data Protection Regulation (“Regulation”). This proposal was led by the current Italian Presidency and the revisions reflect input from representatives of the national governments of the EU Member States.

article thumbnail

Toward Goals

Positively RIM

ARMA 2014 – the conference and expo – met in San Diego this week. Here's my initial impression and a differentiator from past meetings: More devotees of Records & Information Management/Governance now recognize that their efforts must enhance and support movement toward their organizations’ goals. In the private sector, that generally means contributing to black ink on the balance sheet.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

California Attorney General Releases New Report with Findings and Recommendations on 2013 Data Breaches

Hunton Privacy

On October 28, 2014, California Attorney General Kamala D. Harris announced the release of the second annual California Data Breach Report. The report provides information on data breaches reported to California’s Attorney General in 2012 and 2013. Overall, 167 breaches were reported by 136 different entities to California’s Attorney General in 2013.

article thumbnail

FTC Reaches Settlement with Online Marketers Over Text Message Spamming, Robocalling and Mobile Cramming Charges

Hunton Privacy

On October 22, 2014, the Federal Trade Commission announced that several interrelated online marketing and advertising companies (“Stipulating Defendants”) agreed to pay nearly $10 million to settle allegations that they engaged in a pattern of text message spamming, robocalling and mobile cramming practices in violation of Section 5 of the FTC Act, the Telemarketing and Consumer Fraud and Abuse Prevention Act, and the Telemarketing Sales Rule.

article thumbnail

TD Bank Agrees to Settlement to Resolve Multistate Investigation into 2012 Data Breach

Hunton Privacy

On October 10, 2014, TD Bank, N.A. entered into an assurance of voluntary compliance (“Assurance”) with a multistate group of nine attorneys general to settle allegations that the company violated state consumer protection and personal information safeguards laws in connection with a 2012 data breach. The breach involved the loss of two unencrypted backup tapes containing the personal information of approximately 260,000 customers.

article thumbnail

CFPB Updates GLB Privacy Rule to Allow Online Privacy Notices

Hunton Privacy

On October 20, 2014, the Consumer Financial Protection Bureau (“CFPB”) announced a finalized rule that enables certain financial institutions to comply with the Gramm-Leach-Bliley Act (“GLB”) by publishing their financial privacy notices online instead of mailing them to their customers. The GLB Privacy Rule requires financial institutions to provide privacy notices to their customers on an annual basis.

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

German DPAs Adopt Resolutions Regarding “Connected Cars” and Cooperation with Competition Authorities

Hunton Privacy

On October 9, 2014, the 88th Conference of the German Data Protection Commissioners concluded in Hamburg. This biannual conference provides a private forum for all German state data protection authorities (“DPAs”) and the Federal Commissioner for Data Protection and Freedom of Information to share their views on current data protection issues, discuss relevant cases and adopt resolutions aimed at harmonizing how data protection law is applied across Germany.

article thumbnail

Obama’s New Executive Order Focuses on Securing Consumer Payments

Hunton Privacy

On October 17, 2014, the White House announced that the President signed a new executive order focused on cybersecurity. The signed executive order, entitled Improving the Security of Consumer Financial Transactions (the “Order”), is focused on securing consumer transactions and sensitive personal data handled by the U.S. Federal Government. The highlights of today’s Order include: Securing Federal Payments.

article thumbnail

Centre Reports on 36th International Conference of Data Protection and Privacy Commissioners

Hunton Privacy

During the October 14, 2014 closed session of the 36th International Conference of Data Protection and Privacy Commissioners (the “Conference”) held in Balaclava, Mauritius, the host, the Data Protection Office of Mauritius, and member authorities of the Conference issued the “Mauritius Declaration on the Internet of Things,” and four new resolutions – a “Resolution on Accreditation” of new members, a “Resolution on Big Data,” a “Resolution on enforcement cooperation,” and a “Resolution on Priva

Privacy 40
article thumbnail

Chinese Supreme People’s Court Issues Interpretations Regarding the Publication of Personal Information on the Internet

Hunton Privacy

In October 2014, the People’s Republic of China Supreme People’s Court issued interpretations regarding the infringement of privacy and personal information on the Internet. The interpretations are entitled Provisions of the Supreme People’s Court on Several Issues concerning the Application of the Rules regarding Cases of the Infringement of Personal Rights over Information Networks (the “Provisions”) and became effective on October 10, 2014.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

California Attorney General Settles Laptop Spying Case with Rent-to-Own Franchisor

Hunton Privacy

On October 14, 2014, rent-to-own retailer Aaron’s, Inc. (“Aaron’s”) entered into a $28.4 million settlement with the California Office of the California Attorney General related to charges that the company permitted its franchised stores to unlawfully monitor their customers’ leased laptops. The settlement stems from a complaint filed on October 7 in the Superior Court of California County of Los Angeles by the Attorney General of California.

Retail 40
article thumbnail

Cybersecurity Incident Highlights Questions about Cyber Insurance Coverage

Hunton Privacy

On October 8, 2014, the Department of Homeland Security reported that over the course of several months, the network of a large critical manufacturing company was compromised. According to the ICS-CERT Monitor , the compromised company is a conglomerate that acquired multiple organizations in recent years, resulting in multiple corporate networks being merged.

article thumbnail

FTC Announces Settlement with AT&T in Mobile Cramming Case

Hunton Privacy

On October 8, 2014, the Federal Trade Commission announced an $80 million settlement with mobile phone carrier AT&T Mobility, LLC (“AT&T”) stemming from allegations related to mobile cramming. The $80 million payment to the FTC is part of a larger $105 million settlement between AT&T and various federal and state regulators, including the Federal Communications Commission and the attorneys general of all 50 states and the District of Columbia.