March, 2016

article thumbnail

Observations on DB2 for z/OS Address Space CPU Utilization

Robert's Db2

Have you ever looked at a DB2 Statistics Long report generated by your DB2 monitor? If so, you might have seen a section containing information about the CPU consumption of the various DB2 address spaces. It would look something like the example below, which reflects activity over a one-hour period of time (similar information might be available as well via an online display provided by your DB2 monitor).

IT 82
article thumbnail

How an improved responsive design and faster site increased visitor engagement by 104%

Elie

This blog post recounts how moving this site to a fast joyful responsive design with a lot of images improved session duration by 104% and decreased bounce rate by 53%

62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Tech Leadership

John Battelle's Searchblog

The post On Tech Leadership appeared first on John Battelle's Search Blog. I’ve written a piece over on NewCo that I wanted to also post it here. See below… If your business focus is in technology or the Internet, as mine has been for nearly three decades, it’s quite possible you’ve never heard of the GLOBE Series , a global conference dedicated to sustainability in business.

Mining 70
article thumbnail

ICO releases 12 step guide on the GDPR

Privacy and Cybersecurity Law

On Monday this week the UK Information Commissioner’s Office released its first guidance on the General Data Protection Regulation (GDPR): […].

GDPR 52
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ICO Issues Twelve Step Guidance on Preparing for the EU General Data Protection Regulation

Hunton Privacy

On March 14, 2016, the UK Information Commissioner’s Office (“ICO”) published a guide, Preparing for the General Data Protection Regulation (GDPR) – 12 Steps to Take Now. The guide, which is a high-level checklist with accompanying commentary, sets out a number of points that should inform organizations’ data privacy and governance programs ahead of the anticipated mid-2018 entry into force of the GDPR.

GDPR 53

More Trending

article thumbnail

What You Need to Know About the iMessage Security Flaw

Productivity Bytes

Apple has been in the news a lot lately, and most of the stories are about encryption. It’s currently in a battle with the FBI about adding a back door to its encryption software to allow law enforcement to access files on a locked iPhone, and now the software is coming under fire again. Researchers … + Read More. The post What You Need to Know About the iMessage Security Flaw appeared first on Productivity Bytes.

article thumbnail

A (light hearted and) handy guide to privacy activists for the under 10s

Data Protector

Privacy activists in the olden days There weren’t many privacy activists in the olden days. This was because there was no Internet, and very few people had heard of the Data Protection Commissioner. As it was expensive to make a telephone call, and texts had not yet been invented, it was quite hard to spread rumours and exchange information with lots of people you didn’t know.

Privacy 120
article thumbnail

New Posts…For All You RSS Readers

John Battelle's Searchblog

The post New Posts…For All You RSS Readers appeared first on John Battelle's Search Blog. I’ve been writing a lot at NewCo’s publication, and will continue to do so. But I want to make sure you folks know about that work, so here are links to a couple of new pieces. And The Award for the Best Marketing Execution At SXSW Goes To ….

article thumbnail

CRTC enters into MOU with FTC on spam and unlawful telemarketing

Privacy and Cybersecurity Law

As we have noted in previous posts (here and here), the Canadian Radio-television and Telecommunications Commission (CRTC) has repeatedly highlighted its […].

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

JIPDEC Named Accountability Agent for APEC Cross-Border Privacy System

Hunton Privacy

On February 25, 2016, the Asia-Pacific Economic Cooperation (“APEC”) issued a press release announcing the decision by the Joint Oversight Panel of the APEC Electronic Commerce Steering Group to approve the Japan Institute for Promotion of Digital Economy and Community (“JIPDEC”) as a new “Accountability Agent” under the APEC Cross-Border Privacy Rules (“CBPR”) system.

Privacy 53
article thumbnail

The trend toward pay-as-you-drive insurance

CGI

The trend toward pay-as-you-drive insurance. Anonymous. Wed, 03/23/2016 - 08:26. Almost every insurance company is currently working on providing pay-as-you-drive insurance. Some already have succeeded in launching it, while others are busy preparing to go to market. Insurance based on driving behavior can be very attractive for both the insurer and the insured.

article thumbnail

Metaservices FTW!

John Battelle's Searchblog

The post Metaservices FTW! appeared first on John Battelle's Search Blog. Way back when — well, a few years back anyway— I wrote a series of posts around the idea of “ metaservices.” As I mused, I engaged in a bit of derision around the current state (at that point) of the mobile ecosystem, calling it “ chiclet-ized ” — silos of useful data without a true Internet between them.

IT 53
article thumbnail

HHS Launches Phase 2 of HIPAA Audits

Hunton Privacy

On March 21, 2016, the Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it has commenced Phase 2 of the HIPAA Audit Program. Phase 1 of the HIPAA Audit Program ran from 2011-2012 and produced several notable findings, including that two-thirds of covered entities had not performed a risk assessment as required by the HIPAA Security Rule.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hunton Webinar on the EU General Data Protection Regulation

Hunton Privacy

On March 9, 2016, Hunton & Williams LLP hosted a webinar regarding the impact of the EU General Data Protection Regulation (“GDPR”) on global companies. Partner Aaron Simpson moderated the session, and speakers included partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto and partner Wim Nauwelaerts. Together, they explored the key components of the GDPR and discussed a roadmap toward compliance.

GDPR 45
article thumbnail

Consumer Financial Protection Bureau Imposes First Ever Data Security Fine

Hunton Privacy

On March 2, 2016, the Consumer Financial Protection Bureau (“CFPB”) reached a settlement with Dwolla, Inc. (“Dwolla”), an online payment system company, to resolve claims that the company made false representations regarding its data security practices in violation of the Consumer Financial Protection Act. Among other things, the consent order imposes a $100,000 fine on Dwolla.

article thumbnail

HHS Releases Guidance on Health Apps and HIPAA Security Rule Crosswalk

Hunton Privacy

Recently, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) published two guidance documents related to HIPAA compliance. To help mobile app developers understand HIPAA compliance obligations, OCR published guidance on the use of mobile health apps (the “Health App Guidance”). OCR also released a crosswalk (the “Crosswalk”) that maps the National Institute of Standards and Technology (“NIST”) Framework for Improving Critical Infrastructure Cybersecurity Framework (

article thumbnail

How to Safeguard Privacy and Data Security in Corporate Transactions

Hunton Privacy

Personal information about consumers is the lifeblood of many organizations. Because of the potential value of the information, companies are increasingly focused on privacy and data security issues that arise in the context of mergers, acquisitions, divestitures and related transactions. In many corporate transactions, data is a critical asset that should be addressed as a key deal point.

Privacy 45
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hunton & Williams Receives Global Band 1 Ranking for Data Protection by Chambers

Hunton Privacy

Chambers & Partners ranked Hunton & Williams LLP’s Global Privacy and Cybersecurity practice in Band 1 in the recently released 2016 Global guide. The firm has been recognized by Chambers Global as a Band 1 firm, global-wide, for data protection for the past nine years. As noted by Chambers Global , the team is a “[t]op-ranked firm with notable strength negotiating with regulators and advising on compliance programmes.”.

Privacy 40
article thumbnail

NERC Report Highlights Lessons Learned from Ukraine Electric Utility Cyber Attack

Hunton Privacy

On March 18, 2016, a report was released by a joint team from the North American Electric Reliability Corporation’s Electricity Information Sharing Analysis Center and SANS Industrial Control Systems. According to the report, the cyber attack against a Ukrainian electric utility in December 2015 that caused 225,000 customers to lose power for several hours was based on months of undetected reconnaissance that gave the attackers a sophisticated understanding of the utility’s supervisory control a

Access 40
article thumbnail

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”). A public comment period on these drafts is now open.

article thumbnail

CNIL Launches Work on Compliance Pack Regarding Connected Vehicles

Hunton Privacy

On March 23, 2016, the Chairwoman of the French Data Protection Authority (“CNIL”) opened proceedings that will lead to the release of a compliance pack on connected vehicles. The CNIL announced that the compliance pack will contain guidelines regarding the responsible use of personal data for the next generation of vehicles. It will assist various stakeholders in the industry prepare for the General Data Protection Regulation.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

On March 16, 2016, and March 17, 2016, respectively, the Department of Health and Human Services (“HHS”) announced resolution agreements with North Memorial Health Care of Minnesota (“North Memorial”) and The Feinstein Institute for Medical Research (“Feinstein Institute”) over potential violations of the HIPAA Privacy Rule. North Memorial. The HHS’s Office for Civil Rights (“OCR”) began an investigation of North Memorial, a non-profit health care system based in Minnesota, after North Memorial

article thumbnail

UK Government Proposes Elizabeth Denham as New Information Commissioner

Hunton Privacy

On March 22, 2016, the UK government confirmed Elizabeth Denham as its preferred candidate to replace Christopher Graham as Information Commissioner. Subject to a pre-scrutiny hearing by the Culture, Media and Sports Select Committee and final approval from Her Majesty the Queen, Denham would begin her five-year term in mid-2016. In announcing the selection of Denham as the government’s preferred candidate, Secretary of State for Culture, Media and Sport, John Whittingdale, referred to her track

article thumbnail

EU Council to Adopt Position at First Reading on the EU General Data Protection Regulation

Hunton Privacy

On March 17, 2016, the Council of the European Union (the “Council”) published a Draft Statement (the “Statement”) regarding the Council’s position at first reading with respect to the adoption of the EU General Data Protection Regulation (“GDPR”). The Statement follows a political agreement on the draft GDPR reached by the Council on February 12, 2016.

GDPR 40
article thumbnail

Hunton Releases Management Guide to the EU General Data Protection Regulation

Hunton Privacy

On March 9, 2016, Hunton & Williams’ Global Privacy and Cybersecurity practice lawyers released a management guide on the EU General Data Protection Regulation (“GDPR”), entitled “ Overview of the EU General Data Protection Regulation ,” addressing the key impacts the new law will have on businesses. This high-level management guide is intended to provide companies with a roadmap to the Regulation, focusing on topics such as expanded territorial scope, data breach notification rules, the One

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The Collaborative Economy – A constant through the ages

CGI

The Collaborative Economy – A constant through the ages. p.butler@cgi.com. Tue, 03/08/2016 - 18:00. The concept of the collaborative economy , also called sharing economy , peer economy and maker movement has been around for hundreds of years. Pre-industrial revolution, local communities used to collaborate and use each other's horses, ploughs and labour to bring in the harvest.

article thumbnail

Managing innovation to sustain growth and prosperity for local governments

CGI

Managing innovation to sustain growth and prosperity for local governments. Anonymous. Wed, 03/09/2016 - 00:42. Cities and regions that want to grow are embracing technology innovation. We see it all over the globe with local governments using newer technology to: Better understand citizen needs and build services around those needs. Increase connectivity between people, places and things.

article thumbnail

CIPL, Hunton & Williams, TRUSTe to Represent U.S. Business on APEC E-Commerce Business Alliance Expert Council

Hunton Privacy

During last week’s APEC privacy and e-commerce meetings in Lima, Peru, the APEC E-Commerce Business Alliance (“ECBA”) established its 2nd APEC E-Commerce Business Alliance Expert Council (“Expert Council”). The ECBA Expert Council is comprised of 32 e-commerce experts from government, academia and the private sector in the APEC region. The U.S. members are Markus Heyder, Vice President and Senior Policy Counselor at the Centre for Information Policy Leadership, Manuel “Bing” Maisog, partner at H