January, 2015

article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

'The post Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech… appeared first on John Battelle's Search Blog. 2015. My eleventh year of making predictions. Seems everyone’s gotten onto this particular bus, and I’m now late to the party – I never get around to writing till the weekend – when I have open hours in front of me, and plenty of time to contemplate That Which May Come.

Marketing 111
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

19.5% of https sites trigger browser warning as they use sha-1 signed certificates

Elie

19.5% of HTTPS-enabled sites in Alexa's Top 1 Million trigger or will soon trigger a Chrome security warning because they are using the now deprecated SHA-1 signature algorithm to sign their HTTPS certificate. Soon those sites will be flagged by all major browsers as insecure.

article thumbnail

DB2 for z/OS: Native SQL Procedures and STAY RESIDENT

Robert's Db2

A couple of days ago, I received from a DB2 for z/OS professional a question about stored procedures. This individual asked specifically about the STAY RESIDENT option of CREATE PROCEDURE (and ALTER PROCEDURE), and its effect on a native SQL procedure (i.e., a stored procedure that is written in SQL procedure language -- aka SQL PL -- and which runs in the DB2 database services address space).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Freedom of Expression and Privacy in Labour Disputes: Amendments to Alberta’s Personal Information Protection Act in Force

Privacy and Cybersecurity Law

Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look. Amendments set out in Bill 3, the […].

Privacy 52

More Trending

article thumbnail

Apple and Google: Middle School Mean Girls Having At It

John Battelle's Searchblog

'The post Apple and Google: Middle School Mean Girls Having At It appeared first on John Battelle's Search Blog. ( image ) I’m the father of three children, and two of them are girls. And while my first was a boy, and therefore “broke me in” with extraordinary acts of Running Headlong Into Fence Posts and Drinking Beer Stolen From Dad’s Fridge Yet Forgetting To Hide The Bottles, nothing, NOTHING, prepared me for Girls Behaving Badly To Each Other Whilst In Middle Sch

IT 109
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'"The oldest and strongest emotion of mankind is fear, and the oldest and strongest kind of fear is fear of the unknown" HP Lovecraft.

101
101
article thumbnail

European Data Protection Supervisor Speaks on Data Protection Day

Hunton Privacy

On January 28, 2015, in connection with Data Protection Day, newly appointed European Data Protection Supervisor (“EDPS”) Giovanni Buttarelli spoke about future challenges for data protection. Buttareli encouraged the EU “to lead by example as a beacon of respect for digital rights,” and “to be at the forefront in shaping a global, digital standard for privacy and data protection which centers on the rights of the individual.

Privacy 40
article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

Not long ago, an IBM colleague of mine who is a WebSphere Application Server (WAS) for z/OS specialist sent to me and to a few other IBMers (including some of our CICS and DB2 for z/OS developers) some information about an application scenario, and asked for our ideas and feedback. The scenario involved a Java program that accessed a local DB2 for z/OS subsystem (i.e., a subsystem in the same z/OS LPAR as the WAS instance) and selected a row to be updated, and then invoked a COBOL program (also

Mining 48
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Canadian Privacy Compliance: Time for your Online Checkup

Privacy and Cybersecurity Law

In a previous post on online behavioural advertising (OBA), we wrote about the Office of the Privacy Commissioner’s “call to action” to stakeholders in […].

Privacy 40
article thumbnail

Determining best-fit workload environment key to effective cloud brokerage

CGI

Determining best-fit workload environment key to effective cloud brokerage. kathy.jacquay@…. Fri, 01/30/2015 - 07:01. In today’s immature cloud brokerage marketplace, there is a big misconception that cloud brokerage is primarily about finding the least expensive virtual machine when it really should be about figuring out the best-fit environment for your workload.

Cloud 40
article thumbnail

Metromile: A FitBit for Your Car

John Battelle's Searchblog

'The post Metromile: A FitBit for Your Car appeared first on John Battelle's Search Blog. The Metromile staff in front of their SF HQ (Preston is in the red shirt in the back right). Ever since writing Living Systems and The Information First Company last Fall, I’ve been citing Earnest , the financial services startup, as a poster child for what I mean by an “information-first” company.

Insurance 102
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'The challenge for giant swathes of the tech industry is that bad smell from past plumbing failures -- and fear of the unknown.

65
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC Releases Report on Internet of Things

Hunton Privacy

On January 27, 2015, the Federal Trade Commission announced the release of a report on the Internet of Things: Privacy and Security in a Connected World (the “Report”). The Report describes the current state of the Internet of Things, analyzes the benefits and risks of its development, applies privacy principles to the Internet of Things and discusses whether legislation is needed to address this burgeoning area.

Privacy 40
article thumbnail

I Think We are Moving to a World Where We Will Keep Everything Forever. Here’s Why.

Barclay T Blair

Transcript. An edited and condensed transcript of this speech is available here. . Tagged: AHIMA , big data , E-Discovery , InfoGovCon , Information Governance , Keynote , Presentation.

article thumbnail

Your Password Is 12345? Password FAIL

JKevinParker

It's hard to fathom why people don't get that 12345, 123456, and other similarly stupid passwords make their own information and their organization's info much less secure. But many people don't get it. Dark Helmet from SPACEBALLS warned you a long time ago: "12345? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!".

article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT). p.butler@cgi.com. Thu, 01/22/2015 - 03:28. Many of you will be familiar with the term IoT – well it’s hard to miss if you scan the press, social media and business pages. CGI have a long track record working in this area, so in this blog, I thought I’d provide a potted history to the term, its origins and what it means to us at CGI.

IoT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Three Golden Rules of Naming Something

John Battelle's Searchblog

'The post The Three Golden Rules of Naming Something appeared first on John Battelle's Search Blog. ( image ) I love being part of naming something. It’s probably the flat out most fun you can have legally with your clothes on – but for many folks, including entrepreneurs, it’s the source of endless consternation. It doesn’t have to be.

IT 93
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

article thumbnail

German DPAs Host Event Regarding U.S.-EU Safe Harbor Framework and Initiate Administrative Proceedings Against Two U.S. Companies

Hunton Privacy

On January 28, 2015, the German conference of data protection commissioners hosted a European Data Protection Day event called Europe: Safer Harbor for Data Protection? – The Future Use of the Different Level of Data Protection between the EU and the US. At the conference, the speakers discussed the validity of the U.S.-EU Safe Harbor Framework. Previously, in 2013, the German data protection commissioners stated that they would review whether to suspend data transfers made from Germany to the U

Access 40
article thumbnail

A Eulogy for my Grandfather

Barclay T Blair

Over the holiday season while were visiting family in Alberta, Canada, my 92-year-old grandfather – who had been healthy and active his whole life – passed away. He went quickly and surrounded by his family, and I was honored to be there with my family and to participate in his funeral. I was asked to make a “slide show,” and spent a couple of days with hundreds of photos going back to the 1920s, which was a beautiful way to meditate on this man’s life.

IT 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Updated – Publishing CCTV Images – Don’t Be Tempted!

Managing Your Information

With the recent publicity surrounding Virgin Trains, empty seats and Jeremy Corbyn , it would seem that organisations remain unaware of the data protection implications when using CCTV images. There was an interesting story that was reported in the press on 31 December 2015 about a restaurant who posted an image from their CCTV on Facebook of a group of 4 people that had allegedly left the restaurant without paying their bill.

article thumbnail

App Stores Must Go

John Battelle's Searchblog

'The post App Stores Must Go appeared first on John Battelle's Search Blog. 2014 was the year the industry woke up to the power of mobile app installs, and the advertising platforms that drive them. Facebook’s impressive mobile revenue numbers – 66% of its Q3 2014 revenue and growing – are a proxy for the mobile economy at large, and while the company doesn’t divulge what percentage of that revenue is app install advertising, estimates range from a third to a half

article thumbnail

Risk-Based Approach – New Thinking for Regulating Privacy

Hunton Privacy

On February 11, 2015, the International Association of Privacy Professionals Australian New Zealand (“iappANZ”) will host a discussion on the risk-based approach to privacy in Sydney, Australia. Richard Thomas , Global Strategy Advisor for the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”), will present the Centre’s contributions to this topic including the outcomes from the workshops held in Paris and Brussels.

Privacy 40
article thumbnail

Federal Court Grants Partial Summary Judgment to Government in an Action Against Dish Network Alleging Telemarketing Violations

Hunton Privacy

On January 21, 2015, the Federal Trade Commission announced that the U.S. District Court for the Central District of Illinois granted partial summary judgment on December 12, 2014, to the federal government in its action against Dish Network LLC (“Dish”), alleging that Dish violated certain aspects of the Telemarketing Sales Rule (“TSR”) that restrict placing calls to numbers on the National Do-Not-Call Registry and an entity’s internal Do-Not-Call list.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

ENISA Issues Report on Implementation of Privacy and Data Protection by Design

Hunton Privacy

On January 12, 2015, the European Union Agency for Network and Information Security (“ENISA”) published a report on Privacy and Data Protection by Design – from policy to engineering (the “Report”). The “privacy by design” principle emphasizes the development of privacy protections at the early stages of the product or service development process, rather than at later stages.

Privacy 40
article thumbnail

German DPA Appeals Court Decision on Facebook Fan Pages and Suggests Clarification by ECJ on Data Controllership

Hunton Privacy

On January 14, 2015, the data protection authority of the German federal state of Schleswig-Holstein (“Schleswig DPA”) issued an appeal challenging a September 4, 2014 decision by the Administrative Court of Appeals, which held that companies using Facebook’s fan pages cannot be held responsible for data protection law violations committed by Facebook because the companies do not have any control over the use of the data.

article thumbnail

Proposed Indiana Law Would Raise Bar for Security and Privacy Requirements

Hunton Privacy

Indiana Attorney General Greg Zoeller has prepared a new bill that, although styled a “security breach” bill, would impose substantial new privacy obligations on companies holding the personal data of Indiana residents. Introduced by Indiana Senator James Merritt (R-Indianapolis) on January 12, 2015, SB413 would make a number of changes to existing Indiana law.

Privacy 40