June, 2015

article thumbnail

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing. That statement seems self-evident to anyone involved in what I call the NewCo economy – work no longer has to be a duty, it can be a calling. For those blessed with the talent, education, connections, and skill to turn work into part of their self expression, work isn’t the thing you have to do so you can “have a lif

Education 111
article thumbnail

Are You Using DB2 for z/OS Real-Time Statistics? DB2 Is

Robert's Db2

DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility. Starting with DB2 Version 7 (around the 2000 time frame), DB2 could automatically and periodically (every 30 minutes, by default) write a variety of statistics about table spaces and ind

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More for less on the menu for restaurants who choose HotSchedules

Collaboration 2.0

Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.

Cloud 62
article thumbnail

Germany Adopts a Draft Telecom Data Retention Law that Includes a Localization Requirement

Hunton Privacy

On May 28, 2015, the German government adopted a draft law that would require telecommunications and Internet service providers to retain Internet and telephone usage data. The initiative comes more than a year after the European Court of Justice declared the EU Data Retention Directive invalid, which had been implemented previously by German law. The German law implementing the EU Data Protection Directive had been declared unconstitutional by the German Federal Constitutional Court five years

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Improving road inspections and maintenance through mobile technology

CGI

Improving road inspections and maintenance through mobile technology. shobana.lv@cgi.com. Wed, 06/24/2015 - 08:00. Maintaining road infrastructures is highly complex, but also essential for the safety of travelers and economic progress. Roads are heavily used by both business and private travelers, making it difficult to close them for maintenance. Currently, many government transport agencies rely on road inspection techniques that are manual and time consuming.

Paper 45

More Trending

article thumbnail

I Believe in AIIM Training

JKevinParker

I am a Certified Information Professional. My areas of expertise include Enterprise Information Architecture and Management, Business Process Management, User Experience Design, Web Application Architecture, and SharePoint Architecture. I also speak, write, and make websites. I believe in AIIM training for information professionals. AIIM training and other professional membership benefits have helped my career so much!

article thumbnail

Legislative Alert: Bill S-4, an Act to amend Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) passed in House of Commons.

Privacy and Cybersecurity Law

Today, June 18, 2015, Bill S-4, the Digital Privacy Act was passed by Canada’s House of Commons vote. Bill S-4 […].

Privacy 40
article thumbnail

More for less on the menu for restaurants who choose HotSchedules

Collaboration 2.0

Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.

Cloud 62
article thumbnail

Nevada Expands Definition of Personal Information

Hunton Privacy

On May 13, 2015, Nevada Governor Brian Sandoval (R-NV) signed into law A.B. 179 (the “Bill”), which expands the definition of “personal information” in the state’s data security law. The law takes effect on July 1, 2015. Under the Bill, personal information now includes: a “user name, unique identifier or electronic mail address in combination with a password, access code, or security question and answer that would permit access to an online account;”. a medical identification or health insuranc

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What Kaggle taught us about predictive analytics

CGI

What Kaggle taught us about predictive analytics. Anonymous. Thu, 06/18/2015 - 08:00. Last year, CGI’s data science team from Prague had the great honor of winning the Kaggle purchase prediction challenge sponsored by Allstate , competing against 1,500 teams worldwide, and I wanted to share some of our lessons learned. Kaggle is an open community where top data scientists can solve complex business problems and learn the latest techniques.

article thumbnail

Forget Work Life Balance. It’s All About Work Life Integration

John Battelle's Searchblog

The post Forget Work Life Balance. It’s All About Work Life Integration appeared first on John Battelle's Search Blog. Tuning in. Every so often (though less often than I’d like), I ask one of my team into my band room, a place I created five years ago where the only rules are honest conversations and unbounded agendas. I built it to nurture my budding interest in playing music, but it’s also a great place to pour a drink, erase the white board, and see where the conversat

IT 110
article thumbnail

Information Governance Initiative – the 2015-16 IGI Annual Survey

Barclay T Blair

Please take our survey and help shape the future of Information Governance. eDisclosure Information Project. The Information Governance Initiative has launched a survey whose results will extend knowledge of the spread of information governance thinking and practice and inform future developments. They will be published in an annual report which will include materials such as infographics which the rest of us will be able to use in presentations and other materials.

article thumbnail

Are we nearly there yet?

Privacy and Cybersecurity Law

If you kids ask that one more time… Well, I think it’s only fair for us poor Data Protection kids […].

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Dutch Law Introduces General Data Breach Notification Obligation and Higher Sanctions

Hunton Privacy

On May 26, 2015, the Upper House of the Dutch Parliament passed a bill that introduces a general obligation for data controllers to notify the Dutch Data Protection Authority (“DPA”) of data security breaches and provides increased sanctions for violations of the Dutch Data Protection Act. A Dutch Royal Decree still needs to be adopted to set the new law’s date of entry into force.

article thumbnail

NIST Publishes Draft Report on Privacy Risk Management for Federal Information Systems

Hunton Privacy

On June 2, 2015, the National Institute of Standards and Technology (“NIST”) issued a press release on its recently published draft report, entitled Privacy Risk Management Framework for Federal Information Systems (the “Report”). The Report describes a privacy risk management framework (“PRMF”) for federal information systems designed to promote “a greater understanding of privacy impacts and the capability to address them in federal information systems through risk management.

Risk 45
article thumbnail

SEC Cybersecurity Investigations: A How-to Guide

Hunton Privacy

Hunton & Williams LLP partners Lisa J. Sotto , Scott H. Kimpel and Matthew P. Bosher recently published an article in Westlaw Journal’s Securities Litigation & Regulation entitled SEC Cybersecurity Investigations: A How-to Guide. The article details the U.S. Securities and Exchange Commission’s (“SEC’s”) role in cybersecurity regulation and enforcement, and offers best practice tips for navigating the investigative process.

article thumbnail

PCI Security Standards Council Releases Enhanced Validation Requirements for Designated Entities as PCI DSS Version 3.0 Set to Retire

Hunton Privacy

Earlier this month, the Payment Card Industry Security Standards Council (“PCI SSC”) published a set of enhanced validation procedures designed to provide greater assurance that certain entities are maintaining compliance with the PCI Data Security Standard (“PCI DSS”) effectively and on a continuing basis. The payment card brands and acquirers will determine which organizations are required to undergo a compliance assessment with respect to these supplemental validation requirements, which are

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hunton Webinar on the Proposed EU General Data Protection Regulation on July 9

Hunton Privacy

Hunton & Williams will host a live webinar covering the latest developments on the proposed EU General Data Protection Regulation on Thursday, July 9, at 12:00 p.m. EDT. The webinar will provide an overview of the current status of the EU General Data Protection Regulation, highlights from the ongoing trilogue discussions, and guidance on how to prepare for the upcoming changes.

40
article thumbnail

Federal Court: Data Breach Class Action Against Sony Survives Motion to Dismiss

Hunton Privacy

The U.S. District Court for the Central District of California recently granted, only in part, a motion to dismiss a data breach class action against Sony Pictures Entertainment, Inc. (“Sony”) in Corona v. Sony Pictures Entertainment, Inc. , No. 14-CV-09600 (RGK) (C.D. Cal. June 15, 2015). The case therefore will proceed with some of the claims intact.

article thumbnail

New Hampshire and Oregon Student Privacy Legislation

Hunton Privacy

Legislators in New Hampshire and Oregon recently passed bills designed to protect the online privacy of students in kindergarten through 12th grade. On June 11, 2015, New Hampshire Governor Maggie Hassan (D-NH) signed H.B. 520 , a bipartisan bill that requires operators of websites, online platforms and applications targeting students and their families (“Operators”) to create and maintain “reasonable” security procedures to protect certain covered information about students.

Privacy 40
article thumbnail

Consumer Groups Drop Out of NTIA Multistakeholder Process Regarding the Commercial Use of Facial Recognition Technology

Hunton Privacy

On June 16, 2015, the Consumer Federation of America announced in a joint statement with other privacy advocacy groups that they would no longer participate in the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) multistakeholder process to develop a code of conduct regarding the commercial use of facial recognition technology.

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Council of the European Union Agrees on General Approach to the Proposed General Data Protection Regulation

Hunton Privacy

The Council of the European Union has agreed on a general approach to the proposed EU General Data Protection Regulation (the “Regulation”). This marks a significant step forward in the legislative process, and the Council’s text will form the basis of its “trilogue” negotiations with the European Parliament and the European Commission. The aim of the trilogue process is to achieve agreement on a final text of the Regulation by the end of 2015.

article thumbnail

Banking on a digital future

CGI

Banking on a digital future. p.butler@cgi.com. Mon, 06/15/2015 - 05:40. In my last blog I shared my views on the impact of the digital revolution and its far reaching impact on every one of us and the companies we work for. I read a recent article in the Financial Times about the race to the first true digital bank. This will /could mean the demise of the high street branch with some banks having no branches at all, operating online, and finding other solutions to meeting their physical requir

Access 40
article thumbnail

Hong Kong Privacy Commissioner Hosts 43rd APPA Forum and Big Data Conference

Hunton Privacy

On June 11 and 12, 2015, Asia Pacific Privacy Authority (“APPA”) members, invited observers and guest speakers from the government, private sector, academia and civil society, met in Hong Kong to discuss privacy law and policy issues at the 43rd APPA Forum. At the end of the open session on day two, APPA issued its customary communiqué , setting forth the highlights of the discussions of the open and closed sessions.

article thumbnail

DataGuidance Hosts Webinar on Brazil’s Draft Privacy Law

Hunton Privacy

On June 24, 2015, DataGuidance will host a complimentary webinar on Brazil: Towards Privacy Compliance. The panel of speakers includes Bojana Bellamy , President of the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams; Esther Nunes, Partner of Pinheiro Neto Advogados; and Renato Leite Monteiro of Opice Blum, Bruno, Abrusio & Vainzof Advogados Associados.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

China’s Ministry of Industry and Information Technology Published Rules Governing Use of Text Messaging

Hunton Privacy

On May 19, 2015, China’s Ministry of Industry and Information Technology promulgated its Provisions on the Administration of Short Messaging Services (the “Provisions”), which will take effect on June 30, 2015. Prepared to combat improper texting practices, such as junk short messages, the Provisions were adopted under the July 2014 People’s Republic of China (“P.R.C.

article thumbnail

Hunton Authors Bloomberg BNA Portfolio on Cybersecurity

Hunton Privacy

Hunton & Williams LLP’s Global Privacy and Cybersecurity practice group has written a portfolio for Bloomberg BNA on information security and data breach issues in the United States and globally. Cybersecurity and Data Breach offers a broad overview of relevant legal requirements in the United States, European Union and select countries around the world.

article thumbnail

Europe’s Highest Court Delays Decision in Safe Harbor Case Schrems vs. Facebook

Hunton Privacy

On June 9, 2015, Max Schrems tweeted that the Advocate General of the European Court of Justice (“ECJ”) will delay his opinion in Europe v. Facebook , a case challenging the U.S.-EU Safe Harbor Framework. The opinion was previously scheduled to be issued on June 24. No new date has been set. The delay may allow the U.S. and EU to conclude their negotiations regarding updating the Safe Harbor Framework before the ECJ issues an opinion that could impact the Framework.