September, 2015

article thumbnail

It’s Time to Flip the Bit on Publishing and Data

John Battelle's Searchblog

The post It’s Time to Flip the Bit on Publishing and Data appeared first on John Battelle's Search Blog. ( image BI ). My god, do we like to talk about ourselves. That’s my takeaway from the recent algae-bloom of writing around ad blocking and fraud lately – most of it tinged with apocalyptic implications for the future of independent publishing.

Mining 104
article thumbnail

Advocate General of the European Court of Justice Issues Opinion Regarding Safe Harbor

Hunton Privacy

On September 23, 2015, Advocate General of the European Court of Justice Yves Bot issued his Opinion in the case of Max Schrems , which is currently pending before the Court of Justice of the European Union (the “CJEU”). In the opinion, the Advocate General provided his views concerning two key issues related to the U.S.-EU Safe Harbor Framework: (1) the powers of national data protection authorities to investigate and suspend international data transfers made under the Safe Harbor Framework and

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

article thumbnail

Insurer Hosted Pricing – getting (and staying) ahead of the curve

CGI

Insurer Hosted Pricing – getting (and staying) ahead of the curve. p.butler@cgi.com. Thu, 10/01/2015 - 01:51. The pace of business and the pressure of market change are substantial challenges for insurers. The need to be responsive and provide fast pricing is critical. In an era when other industries such as travel , have platforms that enable them to provide pricing information within seconds, customers now expect immediate responses.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

“Honing in on the Relevant Stuff” | Jinfo (formerly FreePint) Reviews Attensa

Attensa

Dale Moore is a UK-based content specialist and contributing author at Jinfo. Jinfo research is at the heart of the business information industry. Every day they work with information pros who are reimagining information services. Their focus is on aligning information services with corporate strategy and initiatives. The following is a summary of Dale’s comprehensive review of Attensa. “The ethos behind the Attensa platform, as a knowledge management and current awareness tool, is n

More Trending

article thumbnail

Do It Right. Not Fast. Right.

John Battelle's Searchblog

The post Do It Right. Not Fast. Right. appeared first on John Battelle's Search Blog. (Cross posted to LI and Medium. Cuz that’s how we roll these days). If you’ve never blown it big time using email — you will. I have several times — in fact, I just did it earlier this evening. And gaaaah!, I wish technology had an answer for the clear and present danger that is myself, rushing through an afternoon, trying to GSD and hit inbox zero.

IT 90
article thumbnail

Blockchain, Cybersecurity and Global Finance

Hunton Privacy

When novelist William Gibson said, “[t]he future is already here, it’s just not very evenly distributed,” he may have had innovation like blockchain technology in mind. In the near future, blockchain may become the new architecture of a reinvented global financial services infrastructure. The technology – a distributed, consensus-driven ledger that enables and records encrypted digital asset transfers without the need of a confirming third party – is revolutionary to global financial services, w

article thumbnail

By: Ray Ban Sunglasses

Cybrary

Ray Ban Sunglasses. Ray-Ban is the global leader in premium eyewear market and by far the best-selling eyewear brand in the world£¡.

article thumbnail

The importance of STEM and Digital Skills

CGI

The importance of STEM and Digital Skills. shobana.lv@cgi.com. Wed, 09/30/2015 - 04:53. I was fortunate enough to address a terrific audience of senior civil servants recently at Civil Service Live, Edinburgh. The conference provided some real food for thought and I wanted to share the points I raised during my talk which focused on the critical issue of STEM skills in Scotland.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Information Sharing is the Grease in Workplace Collaboration

Attensa

We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.

IT 40
article thumbnail

Russia’s new data law

Privacy and Cybersecurity Law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their […].

Privacy 40
article thumbnail

Where I’ll Be During NewCo SF & Oakland Next Month

John Battelle's Searchblog

The post Where I’ll Be During NewCo SF & Oakland Next Month appeared first on John Battelle's Search Blog. (cross posted from the NewCo blog ). NewCo’s San Francisco & Oakland festivals are less than a month away, and they will be our largest, most diverse events ever. More than 225 Bay area companies will be opening their doors to 3,000+ attendees.

article thumbnail

CJEU Announces Date for Judgment on Safe Harbor

Hunton Privacy

On September 29, 2015, the Court of Justice of the European Union (“CJEU”) announced that it will deliver its judgment in the Schrems vs. Facebook case on October 6, 2015. The CJEU’s judgment will be the final ruling in the case, and comes after the Advocate General’s Opinion regarding Safe Harbor earlier this week. Typically, the CJEU delivers its ruling approximately three to six months after publication of the Advocate General’s opinion.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

I Don't Worry About DB2 for z/OS Buffer Pool Hit Ratios

Robert's Db2

And neither should you. It's true that for years, mine was among a chorus of DB2 specialists' voices that placed a lot of emphasis on monitoring DB2 buffer pool hit ratios (there are variations with respect to calculating this ratio, but the basic formula is (GETPAGEs - synchronous reads) / GETPAGEs). Some years ago, it dawned on me (and on others -- and for some folks earlier than for me) that I'd been focusing on the wrong buffer pool performance metric.

Mining 48
article thumbnail

IoT – It’s all about data insights

CGI

IoT – It’s all about data insights. narmada.devarajan. Thu, 09/10/2015 - 02:03. The Internet of Things (IoT) is set to generate vast amounts of new data, with some predictions citing that over 100 billion “things” will send out data over the Internet by 2020. Without new analysis methods, this sheer volume at best risks the value of data being lost and, at worst, may overwhelm a business completely.

IoT 40
article thumbnail

CNIL Publishes Internet Sweep Results and New Guidelines for Websites Aimed at Children

Hunton Privacy

On September 2, 2015, the French Data Protection Authority (“CNIL”) published the results of an Internet sweep of 54 websites visited by children and teenagers. The sweep was conducted in May 2015 to assess whether websites that are directed toward, frequently used by or popular among children comply with French data protection law. As we previously reported , the sweep was coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection author

article thumbnail

Target Data Breach Litigation: District Court Certifies Class of Financial Institutions

Hunton Privacy

On September 15, 2015, Judge Magnuson of the U.S. District Court for the District of Minnesota certified a Federal Rule of Civil Procedure 23(b)(3) class of financial services institutions claiming damages from Target Corporation’s 2013 data breach. The class consists of “all entities in the United States and its Territories that issued payment cards compromised in the payment card data breach that was publicly disclosed by Target on December 19, 2013.”.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SEC Issues Top Cybersecurity Priorities for Broker-Dealers and Investment Advisers

Hunton Privacy

On September 15, 2015, the Office of Compliance, Inspections and Examinations (“OCIE”) at the U.S. Securities and Exchange Commission (“SEC”) issued a Risk Alert outlining its latest cybersecurity examination priorities for SEC-registered broker-dealers and investment advisers. In addition to what we have previously reported , this Risk Alert is the latest in a series of announcements on cybersecurity from OCIE.

article thumbnail

German DPA Fines Data Controller for Inadequate Data Processing Agreement

Hunton Privacy

On August 20, 2015, the Bavarian Data Protection Authority (“DPA”) issued a press release stating that it imposed a significant fine on a data controller for failing to adequately specify the security controls protecting personal data in a data processing agreement with a data processor. The DPA stated in the press release that the data processing agreement did not contain sufficient information regarding the technical and organizational measures to protect the personal data.

article thumbnail

Seventh Circuit Denies En Banc Review For Data Breach Class Action

Hunton Privacy

On September 17, 2015, the Seventh Circuit rejected Neiman Marcus’ petition for a rehearing en banc of Remijas v. Neiman Marcus Group, LLC, No. 14-3122. In Remijas , a Seventh Circuit panel found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach that resulted in hackers gaining access to customers’ credit and debit card information.

article thumbnail

SEC Announces Settlement Order and Publishes Investor Alert

Hunton Privacy

On September 22, 2015, the Securities and Exchange Commission (“SEC”) announced a settlement order (the “Order”) with an investment adviser for failing to establish cybersecurity policies and procedures, and published an investor alert (the “Alert”) entitled Identity Theft, Data Breaches, and Your Investment Accounts. The Order with R.T. Jones Capital Equities Management, Inc.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

U.S.-EU Data Transfer Agreement for Law Enforcement Nearing Completion

Hunton Privacy

On September 8, 2015, representatives from the U.S. Government and the European Commission initialed a draft agreement known as the Protection of Personal Information Relating to the Prevention, Investigation, Detection and Prosecution of Criminal Offenses (the “Umbrella Agreement”). The European Commission’s stated aim for the Umbrella Agreement is to put in place “a comprehensive high-level data protection framework for EU-U.S. law enforcement cooperation.

article thumbnail

Changes to Policy Responsibility for the UK ICO

Hunton Privacy

On September 17, 2015, Prime Minister David Cameron issued a Written Ministerial Statement , announcing that policy responsibility for data protection issues and the UK Information Commissioner’s Office (the “ICO”) will both be transferred from the Ministry of Justice (the “MoJ”) to the Department for Culture, Media & Sport , (the “DCMS”) with the changes taking effect on the same date.

article thumbnail

ICO to Investigate Data Sharing for Marketing by UK Charities

Hunton Privacy

On September 2, 2015, the Information Commissioner’s Office (the “ICO”) announced an investigation into the data sharing practices of charities in the United Kingdom. The announcement follows the publication of an article in a UK newspaper highlighting the plight of Samuel Rae, an elderly man suffering from dementia. In 1994, Rae completed a survey, which resulted in a charity collecting his personal data.

article thumbnail

IoT - Haven’t we been here before?

CGI

IoT - Haven’t we been here before? Anonymous. Tue, 09/08/2015 - 07:49. Is IoT the game changer people believe it to be? The internet of things (IoT) is set to become a $20-$50bn industry over the next 5-10 years. But what will happen to the incumbent industries that were remotely monitoring systems and controlling complex assets with computers long before 'IoT' existed?

IoT 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

APEC Privacy Recognition for Processors Ready for Implementation

Hunton Privacy

The APEC Cross-Border Privacy Rules (“CBPR”) system for information controllers received a significant boost during the recent APEC privacy meetings in the Philippines when APEC finalized a corollary certification scheme for information processors, the APEC Privacy Recognition for Processors (“PRP”). As we previously reported , the PRP allows information processors to demonstrate their ability to effectively implement an information controller’s privacy obligations related to the processing of p

Privacy 40
article thumbnail

Department of Defense Issues New Cyber Incident Reporting and Cloud Computing Requirements for Contractors

Hunton Privacy

On August 26, 2015, the U.S. Department of Defense (“DoD”) published an interim rule entitled Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013–D018) (the “Interim Rule”), that streamlines the obligations for contractors to report network penetrations and establishes DoD requirements for contracting with cloud computing service providers.

Cloud 40
article thumbnail

Schrems v. Irish Data Protection Commissioner: some further thoughts

Privacy and Cybersecurity Law

As the dust begins to settle after the headline-grabbing Advocate General opinion in the Schrems v. Irish Data Protection Commissioner […].

40