June, 2014

article thumbnail

A Return To Form In Media

John Battelle's Searchblog

'The post A Return To Form In Media appeared first on John Battelle's Search Blog. Once upon a time, print was a vibrant medium, a platform where entrepreneurial voices created new forms of value, over and over again. I’ll admit it was my native platform, at least for a while – Wired and The Industry Standard were print-driven companies, though they both innovated online, and the same could be said for Make , which I helped early in its life.

IT 111
article thumbnail

DB2 for z/OS: the Functional Advantages of Native SQL Procedures

Robert's Db2

I have been a big fan of DB2 for z/OS native SQL procedures ever since the functionality was introduced with DB2 9 , back in 1997. I have posted quite a few blog entries on the topic, the first in 1998 (written while I was working as an independent consultant) and the most recent just last month. In these blog entries, and in presentations I've delivered over the past several years (and in discussions generally), I've focused largely on performance aspects of native SQL procedures versus externa

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choose the right sharing icon to boost user engagement

Elie

What’s the best icon to entice people to share something through their social networks? It turns out to be the one used on Android. While this may contradict guidelines proposed by some designers, this conclusion is based on the results of a survey of 7,500 users.

IT 48
article thumbnail

Hunton Listed as Top-Ranked Firm for Both Cyber Crime and Privacy in The Legal 500 United States 2014 Guide

Hunton Privacy

Hunton & Williams LLP proudly announces that the firm’s Global Privacy and Cybersecurity practice was ranked in Tier 1 in The Legal 500 United States 2014 guide for cyber crime and data protection and privacy. Global practice chair Lisa Sotto also was ranked as a leading lawyer and partner Aaron Simpson was highlighted for his work on privacy and cybersecurity matters.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What is a hot topic now, the international implementation of intelligent transport systems?

CGI

What is a hot topic now, the international implementation of intelligent transport systems? Anonymous. Thu, 06/26/2014 - 08:00. The morning is rush hour in both Helsinki and Barcelona. Both cities are also actively discussing, among other topics, how technology can facilitate peak hour traffic, and future urban transport solutions. The tenth ITS European Congress was held in Helsinki, Finland for the first time.

More Trending

article thumbnail

Feels Like Apple…in 1992

John Battelle's Searchblog

'The post Feels Like Apple…in 1992 appeared first on John Battelle's Search Blog. I went on Bloomberg today, ostensibly to talk about data marketing, NewCo, and anything newsworthy. Turns out, we talked (mostly) about Apple. Bloomberg’s got the video up here , and embedded below. While I understand the headline – Battelle: “Apple Failed to Be Apple” – that’s not exactly my point.

article thumbnail

UK Government launches “Cyber Essentials” badge

Privacy and Cybersecurity Law

The UK Government has launched a new cyber security certification framework called “Cyber Essentials“ This is part of a continuing effort […].

article thumbnail

DB2 for z/OS: Getting to Universal Table Spaces

Robert's Db2

Often, there is a bit of a time lag between the introduction of a DB2 for z/OS feature and the widespread adoption of the new technology. Take universal table spaces, for example. These were introduced with DB2 9 for z/OS (almost 7 years ago), but some organizations are only now beginning to convert non-universal table spaces to the universal variety.

IT 48
article thumbnail

New Centre for Information Policy Leadership White Paper on a “Privacy Risk Framework” and the “Risk-Based Approach”

Hunton Privacy

The Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) has published a white paper entitled A Risk-based Approach to Privacy: Improving Effectiveness in Practice. This is the first paper in the Centre’s new multi-year Privacy Risk Framework Project. It follows the Centre’s March 2014 Risk Workshop, held in Paris with Centre members, privacy experts, regulators and other stakeholders.

Paper 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Electric cars need to be supported by intelligent transport systems

CGI

Electric cars need to be supported by intelligent transport systems. Anonymous. Fri, 06/20/2014 - 10:00. It is not surprising that there is a world of expectation from electric cars. Electro-mobility is far more than replacing internal combustion engines with electric motors and tanks with batteries. It is about taking auto-IQ to an entirely new level - with thinking auto parts that avoid traffic jams, prevent collisions and are part of an intelligent traffic flow controlled by an invisible hand

article thumbnail

Execute without read

Scary Beasts Security

A couple of years ago, during an idle moment, I wondered what we could do if we had the hardware CPU primitive of pages with permissions execute-only (i.e. no read and write): [link] It turns out that aarch64 has exactly such support. Here's support heading in to the Linux kernel: [link] The original idea was to defeat ROP by having all of the instructions randomized a bit on a per-install basis.

IT 20
article thumbnail

Why You Need to See ‘Her’ (Or, ‘Her’ Again)

John Battelle's Searchblog

'The post Why You Need to See ‘Her’ (Or, ‘Her’ Again) appeared first on John Battelle's Search Blog. A while ago I wrote a piece about Dave Egger’s latest novel The Circle. I gave the post the too-clever-by-twice title of Why You Should Read The Circle, Even If You Don’t Buy It. While the book had (to my mind) deep flaws, it was far too important to not read.

article thumbnail

Canada’s Anti-Spam Law – not just for Canadians

Privacy and Cybersecurity Law

Canada’s Anti-Spam Law (CASL) enters into force on Canada Day, July 1. It was passed in 2010 as a “made-in-Canada” […].

IT 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Else 6.2.14: What Do We Want The Internet To Be?

John Battelle's Searchblog

'The post Else 6.2.14: What Do We Want The Internet To Be? appeared first on John Battelle's Search Blog. So much to note over these past two weeks (I took last Monday off for Memorial Day): Google bends to the Euro and tops Apple in a key index that doesn’t really matter (much), Meeker updates her famously design-challenged Internet Trends powerpoint deck, and we continue the endless debate around what we want the Internet to be.

article thumbnail

Search and Apps – Give Consumers Back Their Links

John Battelle's Searchblog

'The post Search and Apps – Give Consumers Back Their Links appeared first on John Battelle's Search Blog. I’ve railed against the “chicletized” world of apps for years. I’ve never been a fan of the way mobile has evolved, with dozens, if not hundreds, of segregated little “chiclets” of stovepiped apps, none of which speak to each other, all without any universal platform to unite them save the virtual walled garden of Apple or Google’s app st

IT 86
article thumbnail

Else 6.16.14: Internet Ads Grow, Apple Ads Blow

John Battelle's Searchblog

'The post Else 6.16.14: Internet Ads Grow, Apple Ads Blow appeared first on John Battelle's Search Blog. Up and to the right, baby. Lots of advertising news in this issue of Signal, as the bi-annual IAB report shows strong gains (YAY, Internet!). To the links: Internet Ads Surge 19% in Just One Year – WSJ That’s strong growth for an industry working on its 21st year. ( IAB report ).

article thumbnail

Else 6.9.14: The Internet Beats Rabbit Ears

John Battelle's Searchblog

'The post Else 6.9.14: The Internet Beats Rabbit Ears appeared first on John Battelle's Search Blog. The world’s most fascinating story kept time this past week – cord cutting beat rabbit ears, Google took some punches, and billion-dollar companies pondered their fate once the bloom starts to fade. To the links… Internet-TV Delivery to Surpass Over-the-Air – Worldscreen Worth noting that more of us get TV from the Internet than get it from “over the air”

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Else 6.30.14: Input, Output, Kaput

John Battelle's Searchblog

'The post Else 6.30.14: Input, Output, Kaput appeared first on John Battelle's Search Blog. This past week in tech brought Google’s I/O developer conference, and with it lots of debate on the culture of the Valley, the future of links in the mobile world, the end of the Internet (again), and the death of the IPO. To the (dead? resurgent?) links: In­side the Mir­rortoc­ra­cy – Carlos Buenos From time to time a commentator hits the mark when it comes to the Valley’s cultur

IT 67
article thumbnail

Else 6.23.14: Questioning Valley Idols

John Battelle's Searchblog

'The post Else 6.23.14: Questioning Valley Idols appeared first on John Battelle's Search Blog. A fascinating week of links, starting with a blast from the past (see above), but the real meat of the week came in the debates around some of the Valley’s most scared cows. For more, read on… Tech Time Warp of the Week: Watch IBM Warn Us About Glassholes 10 Years Ago- Wired I am particularly enamored with “Park Bench” – if I saw a guy doing what this guy is doing i

FOIA 65
article thumbnail

German DPAs Publish App Guidelines and Step Up Enforcement

Hunton Privacy

On June 18, 2014, the German state data protection authorities responsible for the private sector (the Düsseldorfer Kreis) issued guidelines concerning the data protection requirements for app developers and app publishers (the “Guidelines”). The Guidelines were prepared by the Bavarian state data protection authority and cover requirements in Germany’s Telemedia Act as well as the Federal Data Protection Act.

article thumbnail

Proposed Legislation Would Give EU Citizens Right to Sue in U.S. for Wrongful Disclosure of Personal Information

Hunton Privacy

On June 25, 2014, U.S. Attorney General Eric Holder announced that the Obama Administration is looking to pass legislation that would provide EU citizens with a right to judicial redress in U.S. courts if their personal information that was shared for law enforcement purposes is later intentionally or wilfully disclosed. The announcement was made during the EU-U.S.

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Supreme Court Finds Warrantless Cell Phone Searches Unconstitutional

Hunton Privacy

On June 25, 2014, the United States Supreme Court issued a unanimous opinion in Riley v. California , holding 9-0 that law enforcement personnel cannot search detained suspects’ cell phones without a warrant. Writing for the Court, Chief Justice John Roberts found that the practice of searching cell phones implicates “substantially greater” individual privacy interests than other physical objects that may be found on an arrestee and deserves heightened protections.

Privacy 40
article thumbnail

Article 29 Working Party’s Opinion on Adequacy of Quebec’s Data Protection Regime

Hunton Privacy

On June 23, 2014, the Article 29 Working Party (the “Working Party”) published its Opinion 7/2014 on the protection of personal data in Québec (the “Opinion”). In this Opinion, the Working Party provides its recommendations to the European Commission on whether the relevant provisions of the Civil Code of Québec and the Québec Act on the Protection of Personal Information in the Private Sector (the “Québec Privacy Act”) ensure an adequate level of protection for international data transfers in a

Privacy 40
article thumbnail

Restrictions on Cross-Border Data Flows Discussed at President’s Export Council Meeting

Hunton Privacy

On June 19, 2014, the President’s Export Council (“PEC”) held a meeting to discuss nine key issues, including the effects of foreign laws that restrict cross-border data flows. At the meeting, the private sector members of the PEC submitted a recommendation letter to President Obama expressing their concern about the threat to American business from protectionist, cross-border data transfer restrictions imposed by foreign countries.

article thumbnail

HHS Settles Case Involving Unattended Medical Records

Hunton Privacy

On June 23, 2014, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $800,000 settlement with Parkview Health System, Inc. (“Parkview”) following a complaint involving patient medical records that were dumped by Parkview employees and left unattended on a physician’s driveway. In 2008, Parkview took custody of hard copy medical records containing protected health information of several thousand patients of a retiring physician.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Recent Developments Concerning Cybersecurity Disclosure for Public Companies

Hunton Privacy

Cyber incidents have become more common — and more severe — in recent years. Like other federal agencies, the Securities and Exchange Commission (“Commission”) has recently been analyzing the applicability of its existing regulations relating to cybersecurity risks. The Commission’s efforts are focused on maintaining the integrity of market systems, protecting customer data and the disclosure of material information.

article thumbnail

DOJ Announces Multinational Efforts to Disrupt Gameover Zeus Botnet

Hunton Privacy

On June 2, 2014, the U.S. Department of Justice announced a U.S.-led multinational effort to disrupt the “Gameover Zeus” botnet and the malware known as “Cryptolocker.” The DOJ also unsealed charges filed in Pittsburgh, Pennsylvania and Omaha, Nebraska against an administrator of Gameover Zeus. Gameover Zeus, a sophisticated type of malware that first emerged in 2011, is designed to steal banking and other credentials from the computers it infects.

article thumbnail

Article 29 Working Party Comments on the Risk-Based Approach to Privacy

Hunton Privacy

In response to increasing interest in a “risk-based” approach among privacy experts, including policymakers working on the proposed EU General Data Protection Regulation, the Article 29 Working Party (the “Working Party”) published a statement on the role of a risk-based approach in data protection legal frameworks (the “Statement”). The Statement confirms the Working Party’s general support for including a risk-based approach in the EU data protection framework.

Risk 40