February, 2016

article thumbnail

Scrutinizing the draft Investigatory Powers Bill

Data Protector

The point about pre-legislative scrutiny is that a parliamentary bill gets a good prod before it begins its usual passage through Parliament. The main issues are identified, and stakeholders can marshal their views in an attempt to influence the decision-makers in good time for changes to be made that ought to result in a statute that is far fitter for purpose.

article thumbnail

The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever

John Battelle's Searchblog

The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. ( cross posted from NewCo ). Thanks to NewCo , I’ve gotten out of the Bay Area bubble and visited more than a dozen major cities across several continents in the past year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

President Obama Signs Executive Order Establishing Federal Privacy Council

Hunton Privacy

On February 9, 2016, President Obama signed an Executive Order establishing a permanent Federal Privacy Council (“Privacy Council”) that will serve as the principal interagency support structure to improve the privacy practices of government agencies and entities working on their behalf. The Privacy Council is charged with building on existing interagency efforts to protect privacy and provide expertise and assistance to government agencies, expand the skill and career development opportunities

Privacy 69
article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

52
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Statement-Level Control of DB2 for z/OS Query Parallelization

Robert's Db2

I'm writing about this now because of the increased interest I've seen, at various DB2 for z/OS sites, in using DB2 query parallelization as a means of boosting zIIP engine utilization when -- and this often happens during nighttime hours -- workloads that typically drive consumption of zIIP MIPS (e.g., DB2 DDF transactions, or Java programs running in WebSphere Application Server for z/OS) diminish.

More Trending

article thumbnail

Are Your Wireless Gadgets Vulnerable to Hacking?

Productivity Bytes

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in … + Read More.

article thumbnail

The Waze Effect: Flocking, AI, and Private Regulatory Capture

John Battelle's Searchblog

The post The Waze Effect: Flocking, AI, and Private Regulatory Capture appeared first on John Battelle's Search Blog. (image). A couple of weeks ago my wife and I were heading across the San Rafael bridge to downtown Oakland for a show at the Fox Theatre. As all Bay area drivers know, there’s a historically awful stretch of Interstate 80 along that route – a permanent traffic sh*t show.

Risk 71
article thumbnail

Safe Harbor Deal Between EU and U.S. Not Yet Reached as Negotiations Continue

Hunton Privacy

On February 1, 2016, V?ra Jourová, European Commissioner for Justice, Consumers and Gender Equality, told the European Parliament that an agreement on a new U.S.-EU Safe Harbor agreement has not yet been reached. Jourová indicated that an agreement is close, but additional work is needed to finalize it. In her message to Parliament, Jourová indicated that any new Safe Harbor agreement would have to be fundamentally different from the original agreement and must be continually reviewed.

Access 67
article thumbnail

The whole is more than the sum of its parts

CGI

The whole is more than the sum of its parts. p.butler@cgi.com. Wed, 02/24/2016 - 23:31. We have all heard the famous quotation by Aristotle, which has been used in many other scenarios: from football teams performing better than what was expected from their collection of players, through to us as human beings. And I think the same applies to future cities and the Internet of Things (IoT). table.

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Plan a Successful Information Management Solution Implementation

JKevinParker

How do you plan a successful information management solution implementation? Well, there's a LOT to it! And there are many paths to failure. In AIIM's Electronic Records Management and Enterprise Content Management master courses , we spend four whole days discussing these concepts. In my recent Pulse article on information management and technology , I state: The solution to your business information problems are things technology vendors cannot sell you in a box or digital download.

article thumbnail

Wellcome ingests 20 millionth JPEG

Preservica

The Wellcome Library, a valued user of Preservica since 2008 and one of the world’s most significant resources for medical history, and part of the Wellcome Collection, has just ingested its 20 millionth JPEG2000 image into the Preservica system – a huge landmark for the library and Digital Curator Dave Thomson who’s excitement can easily be interpreted via his energetic twitter page.

article thumbnail

What You Need to Know About the Recent FBI Hack

Productivity Bytes

You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the … + Read More.

article thumbnail

Growth Is Hard

John Battelle's Searchblog

The post Growth Is Hard appeared first on John Battelle's Search Blog. The business story of the decade is one of insurgency: Every sector of our economy has spawned a cohort of software-driven companies “moving fast and breaking things,” “asking for forgiveness, not permission,” and “blitzscaling” their way to “eating the world.” For years we’ve collectively marveled as new kinds of companies have stormed traditional markets, garnering winner-take-all valuations and delivering extraordinar

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Congress Passes Judicial Redress Act

Hunton Privacy

On February 10, 2016, the U.S. House of Representatives passed the Judicial Redress Act , which had been approved by the Senate the night before and included a recent Senate amendment. The House of Representatives previously passed the original bill in October 2015, but the bill was sent back to the House due to the recent Senate amendment. The Judicial Redress Act grants non-U.S. citizens certain rights, including a private right of action for alleged privacy violations that occur in the U.S.

article thumbnail

14 steps to a digital business

CGI

14 steps to a digital business. ravi.kumarv@cgi.com. Tue, 02/23/2016 - 03:49. When Steve Jobs took over at Apple in 1997, one of his first decisions was to get rid of the Apple Museum in the foyer. He said he didn’t want to be in a company that was living in its past. He knew that the essence of Apple was vision and innovation, and he didn’t want the company’s future to be held back by the best thinking of its history.

article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

40
article thumbnail

Is your vital digital information at risk of being the next "eX-Files"?

Preservica

As 90s hit television series The X-Files returns to our screens after a 13 year hiatus, we have launched an awareness campaign to highlight the danger of file format and software obsolescence, and an impending ‘Digital Dark Age’ – warned against by Google’s Vint Cerf last year. Many file formats and software applications popular in 1993 have already disappeared or become obsolete.

Risk 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New German Consumer Action risk; now in force

Privacy and Cybersecurity Law

With the entry into force of the new Unterlassungsklagengesetz (UKlaG) [otherwise known as the “Gesetz zur Verbesserung der zivilrechtlichen Durchsetzung […].

Risk 52
article thumbnail

DB2 for z/OS: When Did You Last Check Your Subsystem's DSMAX Value?

Robert's Db2

As a DB2 for z/OS system grows and evolves, the value of certain ZPARM parameters should be reviewed to ensure that they are still appropriate in the context of the current environment. Failure to do this can result in a situation in which the operational efficiency (or some other characteristic) of the system is negatively impacted. One of these ZPARMs that should be periodically revisited is DSMAX.

IT 48
article thumbnail

European Commission Presents EU-U.S. Privacy Shield

Hunton Privacy

On February 29, 2016, the European Commission issued the legal texts that will implement the EU-U.S. Privacy Shield. These texts include a draft adequacy decision from the European Commission, Frequently Asked Questions and a Communication summarizing the steps that have been taken in the last few years to restore trust in transatlantic data flows. The agreement in support of the new EU-U.S. transatlantic data transfer framework, known as the EU-U.S.

Privacy 56
article thumbnail

What does the resurgence of vinyl records say about IoT?

CGI

What does the resurgence of vinyl records say about IoT? p.butler@cgi.com. Fri, 02/19/2016 - 00:03. "Digitally delivered - the one thing the business thought the consumer wanted which was convenience, but I don't think it did anything to strengthen the connection between the music and the fan. When you reduce the visual marker to a thumbnail, it's not like holding a CD let alone a 12" LP.

IoT 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

NEW YEAR, NEW WEBSITE, AND NEW BLOG!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

40
article thumbnail

Should a Company Have a Soul?

John Battelle's Searchblog

The post Should a Company Have a Soul? appeared first on John Battelle's Search Blog. Much of the Republican debates have been expendable theatrics, but I watched this weekend’s follies from South Carolina anyway. And one thing has struck me: The ads are starting to get better. This season’s debates have had the highest ratings of any recent Presidential race, and they’re attracting some serious corporate sponsorship.

IT 68
article thumbnail

EU-US Privacy Shield Announced

Privacy and Cybersecurity Law

Today, political agreement has been reached on the new solution to replace the Safe Harbor regime, the so-called “EU-US Privacy […].

Privacy 40
article thumbnail

California Attorney General Releases Report Defining “Reasonable” Data Security

Hunton Privacy

On February 16, 2016, California Attorney General Kamala D. Harris released the California Data Breach Report 2012-2015 (the “Report”) which, among other things, provides (1) an overview of businesses’ responsibilities regarding protecting personal information and reporting data breaches and (2) a series of recommendations for businesses and state policy makers to follow to help safeguard personal information.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Department of Homeland Security Issues Procedures Regarding Sharing Cybersecurity Information

Hunton Privacy

On February 16, 2016, the Department of Homeland Security (“DHS”), in collaboration with other federal agencies, released a series of documents outlining procedures for both federal and non-federal entities to share and disseminate cybersecurity information. These documents were released as directed by the Cybersecurity Act of 2015 (the “Act”), signed into law on December 18, 2015.

article thumbnail

Article 29 Working Party Issues Statement on EU-U.S. Privacy Shield and Other Data Transfer Mechanisms

Hunton Privacy

On February 3, 2016, the Article 29 Working Party (the “Working Party”) issued a statement on the consequences of the ruling of the Court of Justice of the European Union (the “CJEU”) in the Schrems case invalidating the European Commission’s Safe Harbor Decision. The statement follows several weeks of analysis of the other data transfer mechanisms ( i.e. , the EU Standard Contractual Clauses and Binding Corporate Rules) in light of the CJEU’s judgment, as well as the assessment of the current l

Privacy 53
article thumbnail

Administrative Law Judge Orders Health Care Provider to Pay HIPAA Civil Monetary Penalty

Hunton Privacy

On February 3, 2016, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) announced that an Administrative Law Judge (“ALJ”) ruled that Lincare, Inc. (“Lincare”) violated the HIPAA Privacy Rule and ordered the company to pay $239,800 to OCR. Lincare, a health care provider, was investigated by OCR in 2009 after the ex-spouse of a Lincare employee discovered records in their home that contained the protected health information (“PHI”) of several hundred Lincare patient

Privacy 49