November, 2015

article thumbnail

Boulder, the World’s Most Creative City: Where I’ll Be Next Week @NewCo

John Battelle's Searchblog

The post Boulder, the World’s Most Creative City: Where I’ll Be Next Week @NewCo appeared first on John Battelle's Search Blog. Boulder is the world’s most creative city , according to a recent study highlighted in Richard Florida’s Rise of the Creative Class – Revisted , so it makes perfect sense that NewCo Boulder has a plethora of extraordinary companies to visit during NewCo Boulder, coming to town November 18-19.

article thumbnail

Brazil Releases Revised Draft Privacy Bill

Hunton Privacy

In late October, the Brazilian Ministry of Justice (the “Ministry”) issued its revised Draft Bill for the Protection of Personal Data (“Draft Bill”). The Ministry released its preliminary draft in January 2015, and the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”) filed public comments to the draft on May 5, 2015. Key changes to the new Draft Bill include: adding “legitimate interest” as a basis for processing non-sensitive personal information; adding a risk-bas

Privacy 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Living and learning with a Yuneec Typhoon Q500 4k drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k

75
article thumbnail

DB2 for z/OS: How I Use -DISPLAY GROUPBUFFERPOOL Output

Robert's Db2

Having recently posted a blog entry on my use of output from the DB2 for z/OS -DISPLAY BUFFERPOOL command , it seems a good time to post a companion entry focused on the -DISPLAY GROUPBUFFERPOOL command. Obviously, this latter command is relevant to people who work with DB2 operating in data sharing mode on a Parallel Sysplex. If you are such a person, read on.

Access 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Have your cake and eat it?

CGI

Have your cake and eat it? p.butler@cgi.com. Mon, 11/30/2015 - 00:59. A common analysis from IT departments is a restatement of the 80:20 rule. That 80% of the costs of the IT budget are caught up with running and maintaining the IT legacy and only 20% is available for new services that will drive through the transformation anticipated by the business.

IT 40

More Trending

article thumbnail

Google Unveils App Streaming: Is This The Platform That Unifies Apps And The Web?

John Battelle's Searchblog

The post Google Unveils App Streaming: Is This The Platform That Unifies Apps And The Web? appeared first on John Battelle's Search Blog. For years I’ve been predicting that mobile apps were a fad – there’s no way we’d settle for such a crappy, de-linked, “ chiclet-ized ” approach to information and services management.

article thumbnail

Trans-Pacific Partnership Addresses Cross-Border Data Transfers and Protection of Personal Information

Hunton Privacy

On November 5, 2015, the White House released the proposed text of the Trans-Pacific Partnership Agreement (the “TPP”) containing a chapter on cross-border data transfers in the context of electronic commerce. In the chapter on Electronic Commerce, Chapter 14, the TPP includes commitments from participating parties to adopt and maintain a legal framework to protect personal information, and encourages cross-border data transfers to help facilitate business and trade.

IT 60
article thumbnail

Living and learning with a Yuneec Typhoon Q500 drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k.

75
article thumbnail

Celebrating digital archives with National Archives Week

Preservica

@explorearchives: “A world without records is a world without memory”. This week, running through to Sunday 22 nd of November, is National Archives Week. The Explore Your Archive campaign, which is now in its third year, is coordinated by one of our customers, The National Archives , and the Archives and Records Association (UK and Ireland). The campaign aims to increase public awareness of the essential role that archives play in our society and to celebrate the wonderful network of collections

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Apprentices – You’re Hired!

CGI

Apprentices – You’re Hired! ravi.kumarv@cgi.com. Fri, 11/20/2015 - 04:17. I spent a very pleasant evening in Edinburgh this week surrounded by some amazing young people at Scotland’s Modern Apprenticeship Awards, which was sponsored for the second year in a row by CGI. I was greatly inspired by the hard work and ingenuity of the prizewinners who are just beginning to start their careers in industries such as IT, construction and retail.

article thumbnail

No, Technology Can’t Solve Your Information Problems

JKevinParker

Note: This is an excerpt from a post I published on LinkedIn Pulse. Read the full post. You see the vendor sales pitches all the time: “Our innovative technology products will solve all of your information problems and make you look super smart!” Balderdash! The solution to your business information problems are things technology vendors cannot sell you in a box or digital download.

Sales 40
article thumbnail

Tesla-As-A-Platform

John Battelle's Searchblog

The post Tesla-As-A-Platform appeared first on John Battelle's Search Blog. (Cross posted from the NewCo site). This is the first in what I hope will become a regular series of posts on new kinds of companies the NewCo team has discovered in our travels to NewCo cities around the world. First up is Tesloop , which I noticed while perusing the schedule for NewCo LA last month.

IT 68
article thumbnail

FCC Reaches Settlement with Cable Operator over Customer Data Breach

Hunton Privacy

On November 5, 2015, the Enforcement Bureau of the Federal Communications Commission (“FCC”) entered into a Consent Decree with cable operator Cox Communications to settle allegations that the company failed to properly protect customer information when the company’s electronic data systems were breached in August 2014 by a hacker. The FCC alleged that Cox failed to properly protect the confidentiality of its customers’ proprietary network information (“CPNI”) and personally identifiable informa

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices

HIPAA

Health care providers and health insurance companies are generally aware that when protected health information (“PHI”) is disclosed to a vendor, such as an attorney, consultant or cloud data storage firm, a business associate agreement is necessary to comply with HIPAA and to safeguard the information disclosed. However, not all vendors will be business associates, even when such vendors may have potential access to PHI, and health care providers and insurers often struggle with how to manage r

article thumbnail

DB2 for z/OS: How I Use -DISPLAY BUFFERPOOL Output

Robert's Db2

A couple of weeks ago, I was going over output of the DB2 for z/OS command -DISPLAY BUFFERPOOL with a group of people, and one of the meeting participants said words to this effect: "You've got some useful formulas and rules of thumb here. Could you write them down for us?" I did that, and it occurred to me that the information would be useful to others in the larger DB2 for z/OS community; so, I've packaged it in this blog entry.

IT 54
article thumbnail

Award Ceremonies – why do we do it?

CGI

Award Ceremonies – why do we do it? ravi.kumarv@cgi.com. Mon, 11/16/2015 - 05:43. Award ceremonies are an interesting phenomenon; across the world thousands of businesses enter awards every week in the hope that winning will raise awareness of their brand, whilst recognising the great work done by their own people; even being nominated raises morale and gives the team a boost.

IT 40
article thumbnail

French Data Protection Authority Issues Guidance and FAQs on Safe Harbor

Hunton Privacy

On November 19, 2015, the French Data Protection Authority (“CNIL”) published guidance, including a set of frequently asked questions , to assist companies that are transferring personal data to the U.S. pursuant to the Safe Harbor framework. In the guidance, the CNIL stated that the October 6, 2015 decision of the Court of Justice of the European Union (“CJEU”) invalidated the European Commission’s decision on the adequacy of the protection provided by Safe Harbor.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

EDPS Issues Opinion on the Challenges of Big Data

Hunton Privacy

On November 19, 2015, the European Data Protection Supervisor (the “EDPS”) published an Opinion entitled Meeting the Challenges of Big Data (the “Opinion”). The Opinion outlines the main challenges, opportunities and risks of big data, and the importance placed on companies processing large volumes of personal data to implement innovative methods to comply with data protection laws.

article thumbnail

Class Action Filed Against Georgia’s Secretary of State

Hunton Privacy

On November 17, 2015, two plaintiffs filed a putative class action alleging that Georgia’s Secretary of State, Brian Kemp, improperly disclosed the Social Security numbers, driver’s license numbers and birth dates of more than 6.1 million Georgia voters. The lawsuit alleges that the Secretary violated Georgia’s Personal Identity Protection Act by disclosing the voters’ personally identifiable information, failing to provide voters notice of the breach and failing to notify consumer reporting age

article thumbnail

APEC Leaders Reinforce Commitment to CBPR System

Hunton Privacy

On November 19, 2015, the White House released a fact sheet from the 23rd Annual APEC Economic Leaders’ Meeting in the Philippines. Under the section on Enhancing Regional Economic Integration, representatives from the U.S. and other APEC economies reinforced their commitment to the ongoing implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system for information controllers.

Privacy 40
article thumbnail

CIPL Points to Transparency as Key Catalyst for Innovative Information Economy

Hunton Privacy

On November 20, 2015, Markus Heyder , Vice President of the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, discussed how “transparency is increasingly understood as a core component of addressing the challenges of the modern information economy” and a key catalyst for a productive and innovative information economy in an article entitled Transparency and the Future of Driverless Privacy published by the International Association of Privacy Professionals.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Retailer Sued over Allegations that Background Check Consent Form Includes Extraneous Information

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On November 2, 2015, a putative class action was filed against retailer Big Lots Stores, Inc. in Philadelphia, stemming from allegations that the company “systematically” violated the Fair Credit Reporting Act’s (“FCRA’s”) “standalone disclosure requirement” by making prospective employees sign a document used as a background check consent form that contained extraneous information.

Retail 40
article thumbnail

China Publishes New Regulation for Personal Data Security in the Courier Industry

Hunton Privacy

On November 16, 2015, the Legislative Affairs Office of the State Council of the People’s Republic of China published a draft Regulation for Couriers (the “Regulation”) and requested public comment on the Regulation. Interested parties have until mid-December 2015 to submit comments on the Regulation. The Regulation comes at a time when courier services and online shopping are growing steadily in China.

article thumbnail

French Data Protection Authority Imposes Fine for Inadequate Security Measures

Hunton Privacy

On November 13, 2015, the French Data Protection Authority (“CNIL”) announced its decision in a case against Optical Center, imposing a fine of €50,000 on the company for violations related to the security and confidentiality of its customers’ personal data. Optical Center distributes optical products via its store network and website, which contains 170,000 customer accounts in France.

article thumbnail

Administrative Law Judge Dismisses Complaint for Failure to Show Current or Future Substantial Consumer Injury

Hunton Privacy

On November 13, 2015, Chief Administrative Law Judge D. Michael Chappell dismissed the FTC’s complaint against LabMD Inc. (“LabMD”) for failing to show that LabMD’s allegedly unreasonable data security practices caused, or were likely to cause, substantial consumer injury. The law judge did not address LabMD’s claim that the FTC does not have jurisdiction to enforce data security standards under the unfairness prong of Section 5 of the FTC Act , and LabMD has reserved its jurisdictional challeng

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Security risks raised by today’s hybrid IT delivery models

CGI

Security risks raised by today’s hybrid IT delivery models. kathy.jacquay@…. Thu, 11/12/2015 - 03:46. Traditional on-premises IT has evolved into a hybrid model that now includes both public and private clouds in the ecosystem. Adding to the cloud dimension presents new security risks that make it even more important to adopt a cohesive and holistic security policy.

Risk 40
article thumbnail

Hunton’s Data Protection Practice Recognized by Chambers UK and Legal 500 UK

Hunton Privacy

Hunton & Williams LLP announces the firm’s Global Privacy and Cybersecurity practice was again recognized by Chambers UK 2016 and The Legal 500 UK 2015 guides, earning Tier 1 rankings. Chambers UK noted that the practice has a “superbly strong bench of highly experienced counsel adept at advising on the most complex of information law concerns. Particularly accomplished in guiding clients through the privacy implications of new technologies, international data transfers, and BCR applications

Privacy 40
article thumbnail

NSA Ordered to Stop Bulk Telephony Metadata Program

Hunton Privacy

On November 9, 2015, U.S. District Judge Richard J. Leon issued a preliminary injunction ordering the National Security Agency to stop its bulk telephony metadata program. The preliminary injunction was issued in favor of subscribers of Verizon Wireless Business Network and comes 20 days before the program was set to expire under the USA Freedom Act.