July, 2014

article thumbnail

It’s Time For Twitter To Filter Our Feeds. But How?

John Battelle's Searchblog

'The post It’s Time For Twitter To Filter Our Feeds. But How? appeared first on John Battelle's Search Blog. ( image ). “We don’t put an algorithm between you and your feed,” – Twitter exec Adam Bain, March 2013. “Please do.” Me, today. Twitter has always appealed to tinkerers, to makers, to the people who first took up blogging, who championed RSS and HTML in the early days – you know, the people who created the open web.

article thumbnail

Isolating DB2 for z/OS Accounting Data at the WebSphere Application Level

Robert's Db2

Back in the 1990s, almost all of the DB2 for z/OS-accessing transactional applications I encountered were of the CICS variety. Often, a given DB2 subsystem served as the database manager for multiple CICS-based applications. In such cases, isolation of DB2 accounting information (i.e., database activity figures obtained from DB2 accounting trace records) at the application level was not difficult.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to find undervalued Hearthstone cards automatically

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Delaware Enacts New Data Destruction Law

Hunton Privacy

On July 1, 2014, Delaware Governor Jack Markell signed into law a bill that creates new safe destruction requirements for the disposal of business records containing consumer personal information. The new law requires commercial entities conducting business in Delaware to take reasonable steps to destroy their consumers’ “personal identifying information” prior to the disposal of electronic or paper records.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Are we about to see a step change in digital transformation?

CGI

Are we about to see a step change in digital transformation? p.butler@cgi.com. Tue, 07/22/2014 - 03:00. People have been talking about digital transformation to the enterprise front and back office for some time, especially where they are client or citizen facing. Some progress has been made, but you would not necessarily call it transformational on a large scale yet.

More Trending

article thumbnail

On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video

John Battelle's Searchblog

'The post On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video appeared first on John Battelle's Search Blog. I had a chance to go on Bloomberg today and co-host with Cory and Emily, which was fun. They asked me about my post on Monday , and I answered thusly: I also got to help interview David Medine, who chairs the privacy task force for the Obama Administration: And Ro Khanna, who is running for Congress in the heart of Silicon Valley: And lastly, I got to opine

Privacy 100
article thumbnail

DB2 for z/OS Buffer Pool Enlargement is NOT Just an Elapsed Time Thing

Robert's Db2

A couple of weeks ago, I got a question from a mainframe DB2 DBA about the impact of DB2 buffer pool enlargement on application and system performance. This individual had requested an increase in the size of a buffer pool on his system, and the system administration team had agreed to implement the change; however, one of the system administrators told the DBA that while the larger buffer pool would improve elapsed times for application processes accessing objects assigned to the pool, no CPU e

article thumbnail

How to appraise Hearthstone card values

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Nominate Hunton’s Privacy Blog for the ABA Blawg 100 Amici

Hunton Privacy

Once again, the American Bar Association Journal is compiling its annual list of the 100 best legal blogs , and readers are invited to nominate blawgs they “read regularly and think other lawyers should know about.” We would appreciate you showing your support by submitting a nomination for Hunton & Williams’ Privacy and Information Security Law Blog.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

EU Data Protection Regulation: Update

Privacy and Cybersecurity Law

The EU Data Protection Regulation was discussed, yesterday, at the Privacy Laws & Business conference in Cambridge, UK. Here is […].

Privacy 40
article thumbnail

Digital Accountability and Transparency Act (DATA Act)

JKevinParker

On May 9, 2014, President Barack Obama signed the Digital Accountability and Transparency Act (DATA Act), Public Law No. 113-101, which had been passed unanimously by both the House of Representatives and the Senate. —Data Transparency Coalition ( [link] ). The above statement is great news for everyone in the United States who cares about efficiency and transparency in the federal government.

article thumbnail

NewCo Sizzle Reel, SF Sked Are Up!

John Battelle's Searchblog

'The post NewCo Sizzle Reel, SF Sked Are Up! appeared first on John Battelle's Search Blog. It’s hard to describe what it’s like to attend a NewCo till you’ve been to one, but this video, below, should certainly help. It comes right on the heels of NewCo’s SF schedule going up , which for those of you who’ve never been is like announcing the lineup at Bonnaroo for those of us in the NewCo world.

IT 96
article thumbnail

Content Marketing And the New Mainstream

John Battelle's Searchblog

'The post Content Marketing And the New Mainstream appeared first on John Battelle's Search Blog. ( image ) On the eve of our third annual P&G Signal (a private event I’ve produced for P&G these past few years) comes this piece in HBR : The Content Marketing Revolution. Just this morning I was reflecting on the speed with which the idea that “all brands are publishers” has moved from evangelical blog post to standard business practice – less than four years s

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Else 7.7.14: You’re Not A Target Till You Are

John Battelle's Searchblog

'The post Else 7.7.14: You’re Not A Target Till You Are appeared first on John Battelle's Search Blog. The past week brought fresh revelations about how the NSA targets US citizens, and new insights on the founders of Google, the history of technology, and ongoing stories from Facebook and the EU. To the links… In NSA-intercepted data, those not targeted far outnumber the foreigners who are – The Washington Post - This is a long-ish read, but please, if you read only one s

IT 74
article thumbnail

UK House of Lords Sub-Committee Criticizes the “Right to Be Forgotten”

Hunton Privacy

The EU Sub-Committee on Home Affairs, Health and Education of the UK House of Lords has published its Second Report for 2013-14, entitled EU Data Protection Law: A ‘Right to Be Forgotten’? (the “Report”). The Report summarizes the findings of the Sub-Committee’s investigation into the right to be forgotten, and was triggered in large part by the European Court of Justice’s (“ECJ’s”) decision in Google v.

article thumbnail

Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization

Hunton Privacy

On July 22, 2014, the Data Security Council of India (“DSCI”) announced that it has deemed Vodafone India Limited (“Vodafone”) a “DSCI Privacy Certified” organization. The certification, which is designed to help companies “demonstrate the privacy practices to relevant stakeholders and enhance trust,” is the first for a telecommunications company in India.

Privacy 40
article thumbnail

Hunton Global Privacy Update – July 2014

Hunton Privacy

On July 15, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program covered a number of privacy and data protection topics, including the recent judgment in the Costeja case , the Centre for Information Policy Leadership’s work on a risk-based approach to privacy , the new Canadian anti-spam legislation that went into effect on July 1, and other developments in the U.S. and EU.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC Updates COPPA FAQs on Obtaining Verifiable Parental Consent

Hunton Privacy

On July 16, 2014, the Federal Trade Commission posted revisions to its Frequently Asked Questions that provide guidance on complying with the Children’s Online Privacy Protection Rule (the “COPPA Rule”). The revisions, which are in Section H of the FAQs, address the COPPA Rule requirement that operators of certain websites and online services obtain a parent’s consent before collecting personal information online from a child under the age of 13.

Privacy 40
article thumbnail

New Cybersecurity Center to Be Established in Belgium

Hunton Privacy

On July 17, 2014, the Belgian government announced that it has finalized its Royal Decree on the establishment of a Cybersecurity Center ( Centrum Cyber Security België or Centre Cyber Security Belgique ). The Cybersecurity Center’s tasks would be to monitor the country’s cybersecurity and manage cyber incidents. It also would oversee various cybersecurity projects, formulate legislative proposals relating to cybersecurity, and issue standards and guidelines for securing public sector IT systems

article thumbnail

UK ICO Releases Its Annual Report for 2013/2014

Hunton Privacy

On July 15, 2014, the UK Information Commissioner’s Office (“ICO”) released its Annual Report for 2013/14 (the “Report”). Entitled Effective, Efficient – and Busier than Ever, the Report illustrates the rapid growth of data protection and freedom of information issues in the UK in the past year. It highlights the fact that the ICO has received increasing numbers of questions and complaints from members of the public, processed record numbers of cases, and issued its highest ever level of f

IT 40
article thumbnail

UK Government Announces Emergency Data Retention Law

Hunton Privacy

On July 10, 2014, the UK government announced plans to introduce emergency data retention rules, publishing the Data Retention and Investigatory Powers Bill (the “Bill”) along with explanatory notes and draft regulations. The publication of the Bill follows the European Court of Justice’s April 2014 declaration that the EU Data Retention Directive (the “Directive”) is invalid.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

French Data Protection Authority Announces Cookie Law Compliance Inspections to Begin in October

Hunton Privacy

On July 11, 2014, the French Data Protection Authority (the “CNIL”) announced that, starting in October 2014, it will conduct on-site and remote inspections to verify whether companies are complying with its new guidance on the use of cookies and other technologies. These inspections will take place in connection with the European “cookies sweep day” initiative, which will be launched from September 15 – 19, 2014.

article thumbnail

FTC Files Complaint Against Amazon.com for Unauthorized In-App Charges in Kids’ Apps

Hunton Privacy

On July 10, 2014, the Federal Trade Commission announced that it filed a complaint against Amazon.com, Inc. (“Amazon”) for failing to obtain the consent of parents or other account holders prior to billing them for in-app charges incurred by children. According to the complaint, Amazon, which offers children’s apps through its Appstore, bills Amazon account holders in real money for virtual items that children obtain within an app ( i.e. , “in-app” charges).

article thumbnail

Florida Amends Breach Notification Law to Cover Health Data, Tighten Notice Deadline and Require State Regulator Notification

Hunton Privacy

On June 20, 2014, Florida Governor Rick Scott signed a bill into law that repeals and replaces the state’s existing breach notification statute with a similar law entitled the Florida Information Protection Act (Section 501.171 of the Florida Statutes) (the “Act”). Below is a summary of several key changes the Act makes to the previous breach notification statute: The Act revises the definition of “breach of security” to cover “unauthorized access” of electronic data containing personal informat

article thumbnail

Hunton Introduces Report on the Importance of Cross-Border Data Transfers to Global Prosperity in Europe

Hunton Privacy

Hunton & Williams, in collaboration with the U.S. Chamber of Commerce, recently issued Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , a report which highlights the benefits of cross-border data transfers to businesses in the international marketplace. The report underscores the importance of developing data transfer mechanisms that protect privacy and facilitate the free-flow of data, and also explores opportunities for new data transfer regime

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Russian Parliament Adopts Internet Privacy Bill Requiring Data Localization

Hunton Privacy

Last week, the Russian Parliament adopted a bill amending portions of Russia’s existing legislation on privacy, information technology and data protection. Among other provisions, the law would create a “data localization” obligation for companies engaged in the transmission or recording of electronic communications over the Internet. Such companies would be required to store copies of the data for a minimum of six months in databases that must be located within the Russian Federation.

Privacy 40
article thumbnail

PCLOB Report Concludes NSA’s Non-U.S. Surveillance Program Is Lawful

Hunton Privacy

On July 2, 2014, the Privacy and Civil Liberties Oversight Board (“PCLOB”) held a public meeting to finalize the release of a report concluding that the National Security Agency’s (“NSA’s”) collection of electronic communications from targets reasonably believed to be non-U.S. persons located outside the United States has operated lawfully within its statutory limitations.

article thumbnail

Rethinking Records Management with SharePoint: An AIIM Webinar

JKevinParker

On May 28, 2014, I had the privilege of being the featured speaker for an AIIM webinar called "Rethinking Records Management with SharePoint". The webinar was sponsored by Microsoft, who shared their own story of records management success with SharePoint, demonstrating that they practice what they preach. As the featured speaker, I was the independent voice from the industry and spoke on the features of SharePoint that are best for electronic records management.