March, 2015

article thumbnail

A Few Questions For Publishers Contemplating Facebook As A Platform

John Battelle's Searchblog

'The post A Few Questions For Publishers Contemplating Facebook As A Platform appeared first on John Battelle's Search Blog. Well, it’s happening. According to no less authoritative source than The New York Times , The New York Times is preparing to plant a taproot right inside the highly walled garden that is Facebook. As Times’ executives contemplate moving The Grey Lady squarely under the rather constrictive confines of Facebook’s terms of service , they may be comforting themselves with

Access 110
article thumbnail

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DB2-Managed Data Archiving Feature of DB2 11 for z/OS

Robert's Db2

Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS. In the course of these discussions and presentations, I've noticed something interesting pertaining to the DB2-managed data archiving capability delivered with this latest release of the DBMS: a) it is one of the more misunderstood features of DB2 11, and b) when people do understand what DB2-managed archiving is about, it becomes one of the DB2 11 features about which they are most enthusiastic.

article thumbnail

FTC Forms Office of Technology Research and Investigation

Hunton Privacy

On March 23, 2015, the Federal Trade Commission announced the formation of the Office of Technology Research and Investigation (“OTRI”), which the FTC describes as “an office designed to expand the FTC’s capacity to protect consumers in an age of rapid technological innovation.”. The OTRI will succeed and expand the focus of the FTC’s previously-created Mobile Technology Unit, which focused on consumer protection issues relating to mobile technologies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

$1.1 Million Penalty Issued Under Canada’s Anti-Spam Law

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) announced today that it has issued a Notice of Violation to Quebec-based business Compu-Finder […].

IT 40

More Trending

article thumbnail

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

'The post What’s NewCo? These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. I thought I’d share them here. The first one features folks talking about their experience attending festivals, and the second one features host company presentors doing the same.

86
article thumbnail

Digital washing can wreck your strategic business planning

Collaboration 2.0

'Like France''s 1930''s Maginot Line, ''digital washing'' of old ideas and lack of forward thinking has the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

article thumbnail

DB2 for z/OS: Non-Disruptively Altering a Native SQL Procedure

Robert's Db2

Not long ago, I was contacted by a DB2 for z/OS DBA who wanted to run a situation by me. On one of his organizations' mainframe DB2 systems -- a system with very high transaction volumes and very stringent application availability requirements -- there was a native SQL procedure for which the ASUTIME specification had to be changed. The DBA wanted to see if I could help him to find a non-disruptive way to effect this stored procedure modification.

IT 48
article thumbnail

FTC to Host Workshop on Cross-Device Tracking

Hunton Privacy

On November 16, 2015, the Federal Trade Commission will host a workshop in Washington, D.C., to examine the benefits and privacy risks associated with “cross-device tracking.” The workshop intends to highlight the types of cross-device tracking techniques and how businesses and consumers can benefit from these practices. The workshop also will address related privacy and security risks, and discuss whether self-regulatory programs apply to these practices.

Privacy 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ? All valid questions. There must have been a conversation between executives and the IT department at the Secretary of State’s office about this, and it’s fascinating to imagine how that conversation went

IT 40
article thumbnail

Staying connected with customers in the age of big data

CGI

Staying connected with customers in the age of big data. Anonymous. Mon, 03/16/2015 - 01:28. The owner of a large supermarket chain approached CGI with how difficult it is to retain customers and attract new ones, especially in their large urban and suburban stores. He felt they were losing sight of their loyal customers and what makes them stay or go.

article thumbnail

With Meridian, Sovrn Levels the Playing Field For Publishers

John Battelle's Searchblog

'The post With Meridian, Sovrn Levels the Playing Field For Publishers appeared first on John Battelle's Search Blog. A long, strange, and ultimately rewarding trip, that’s what many involved in the past ten years at Federated Media, Lijit, and now sovrn Holdings might say. One year ago, give or take, we sold FM’s assets to LIN Media , and created sovrn Holdings , a programmatic data business focused on one mission: to foster an ecosystem where independent and influential publis

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Feature Differences in Office 365 Plans

JKevinParker

I wanted to compare exactly which features are available for these Office 365 plans: Office 365 Business Premium. Office 365 Enterprise E1. Office 365 Enterprise E3. The Office 365 plan comparison page did not give me enough detail. So I checked out the latest Office 365 service comparison page on TechNet (updated 1/28/2015 at the time of this post).

article thumbnail

Centre for Information Policy Leadership Holds Privacy Consultations in Brazil

Hunton Privacy

As part of its ongoing Brazil outreach initiative, a delegation of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) is in Brasilia and Rio de Janeiro the week of March 23, 2015. The delegation will meet with Brazilian government representatives, organizations and experts to discuss global privacy law and best practice developments and other issues of mutual interest, as well as a joint global privacy dialogue workshop in Brazil planned for later this year.

Privacy 40
article thumbnail

Online Dating Site Hit with Anti-Spam Law Fine

Privacy and Cybersecurity Law

On the heels of issuing its first Notice of Violation under Canada’s Anti-spam Legislation (CASL) earlier this month, the Canadian […].

IT 40
article thumbnail

CGI Top 5 UK Employer Award

CGI

CGI Top 5 UK Employer Award. p.butler@cgi.com. Fri, 03/06/2015 - 02:00. Well here goes, my first blog, I hope you enjoy it. I plan to use this channel on a regular basis to share my thoughts on a variety of topics. CGI is a people business. Ensuring that we are providing the best possible environment and culture for our people to build their careers and develop their skills is critical to our success.

IT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.

article thumbnail

IPTF Issues Request for Public Comment Regarding Cybersecurity Issues Affecting the Digital Economy

Hunton Privacy

On March 13, 2015, the U.S. Department of Commerce Internet Policy Task Force (“IPTF”) issued a request for public comment regarding cybersecurity issues affecting the digital economy. The IPTF’s request invites all stakeholders interested in cybersecurity to “identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations

article thumbnail

Montana and Washington State Propose Amendments to Data Breach Legislation

Hunton Privacy

On March 4, 2015, the House of Representatives of Washington passed a bill ( HB 1078 ), which would amend the state’s breach notification law to require notification to the state Attorney General in the event of a breach and impose a 45-day timing requirement for notification provided to affected residents and the state regulator. The bill also mandates content requirements for notices to affected residents, including (1) the name and contact information of the reporting business; (2) a list of

article thumbnail

FTC Enters into Memorandum of Understanding with Dutch Data Protection Authority

Hunton Privacy

On March 9, 2015, the Federal Trade Commission announced that it has entered into a Memorandum of Understanding (the “Memorandum”) with the Dutch Data Protection Authority (the “Dutch DPA”). The Memorandum, which does not create legally binding obligations on the FTC or the Dutch DPA, focuses on the following five objectives: cooperating when enforcing applicable privacy laws such as the FTC Act and the Dutch Data Protection Act, including sharing relevant information about complaints; facilitat

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

NTIA Announces New Multistakeholder Process on Drone Privacy

Hunton Privacy

On March 4, 2015, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process seeking comments on best practices concerning privacy, transparency and accountability issues related to the use of commercial and private unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 40
article thumbnail

IoT – it’s all about insights

CGI

IoT – it’s all about insights. ravi.kumarv@cgi.com. Thu, 03/05/2015 - 04:11. The Internet of things (IoT) is set to generate vast amounts of new data, with some predictions at over 100Billion ‘things’ sending out data on the Internet by 2020. Without new analysis methods, the sheer volume, at best risks the value of data being lost, and at worst, may overwhelm a business completely.

IoT 40
article thumbnail

Department of Education Releases Guidance for Schools Regarding Terms of Service Offered by Providers of Online Educational Services

Hunton Privacy

On February 26, 2015, the Department of Education’s Privacy Technical Assistance Center (“PTAC”) issued guidance to assist schools, school districts and vendors with understanding the primary laws regulating student privacy and how compliance with those laws may be affected by Terms of Service (“TOS”) offered by providers of online educational services and mobile applications.

article thumbnail

Third Circuit Hears Oral Arguments in FTC v. Wyndham

Hunton Privacy

On March 3, 2015, the Third Circuit heard oral arguments in FTC v. Wyndham Worldwide Corp. (“Wyndham”) on whether the FTC has the authority to regulate private companies’ data security under Section 5 of the FTC Act. As we previously reported , on June 26, 2012, the FTC announced that it had filed suit against Wyndham and three of its subsidiaries alleging that the company posted misleading representations on Wyndham websites regarding how the company safeguarded customer information.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Sotto Featured on Penn Law’s “Great Minds on Law and Life” Podcast on New Threats to Digital Privacy and Cybersecurity

Hunton Privacy

On March 3, 2015, Steven Barnes, the host of the new Penn Law podcast series, Case in Point: Great Minds on Law and Life, interviewed Lisa Sotto , partner and chair of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, and Anita Allen, professor of law and philosophy at the University of Pennsylvania Law School and vice provost for faculty on trends in privacy and cybersecurity, discussing what we mean when we talk about our right to privacy.

Privacy 40
article thumbnail

Sotto Speaks Out on Potential for “Armageddon-Type Cyber Event”

Hunton Privacy

On March 2, 2015, HuffPost Live interviewed four cybersecurity experts in response to a top financial regulator’s warning of an “Armageddon-type cyber event” that could eventually affect the U.S. economy. Lisa Sotto , partner and chair of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was featured, describing the threat as legitimate and stressing that hackers are becoming more creative, sophisticated and motivated.

article thumbnail

White House Releases Discussion Draft for a Consumer Privacy Bill of Rights

Hunton Privacy

On February 27, 2015, the White House released a highly-anticipated draft of the Consumer Privacy Bill of Rights Act of 2015 (the “Act”) that seeks to establish baseline protections for individual privacy in the commercial context and to facilitate the implementation of these protections through enforceable codes of conduct. The Federal Trade Commission is tasked with the primary responsibility for promulgating regulations and enforcing the rights and obligations set forth in the Act.

Privacy 40