Sat.Sep 26, 2015 - Fri.Oct 02, 2015

article thumbnail

It’s Time to Flip the Bit on Publishing and Data

John Battelle's Searchblog

The post It’s Time to Flip the Bit on Publishing and Data appeared first on John Battelle's Search Blog. ( image BI ). My god, do we like to talk about ourselves. That’s my takeaway from the recent algae-bloom of writing around ad blocking and fraud lately – most of it tinged with apocalyptic implications for the future of independent publishing.

Mining 104
article thumbnail

FCC Cites Lyft Inc. and First National Bank Corp. for TCPA Violations

Hunton Privacy

On September 11, 2015, the Federal Communications Commission (“FCC”) announced that Lyft Inc. (“Lyft”) and First National Bank Corporation (“FNB”) violated the Telephone Consumer Protection Act (“TCPA”) by forcing their users to consent to receive automated text messages as a condition of using their services. The FCC warned that these violations could result in fines if they continue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 cybersecurity questions for elected officials

CGI

Dix questions sur la cybersécurité pour les représentants élus. Les gouverneurs, les maires et autres représentants élus doivent composer avec plusieurs défis. La gestion des collectivités est complexe et exige une prise de décisions difficiles, et ce, dans la mire constante du public, où chaque action est passée à la loupe. L’ère numérique ainsi que les nouvelles attentes des citoyens obligent les élus à recourir aux technologies pour contribuer à la transformation des gouvernements en vue d’am

article thumbnail

Schrems: Decision Due Next Week

Privacy and Cybersecurity Law

So much for the dust settling… The CJEU has confirmed that it will be delivering its final judgement on the […].

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do It Right. Not Fast. Right.

John Battelle's Searchblog

The post Do It Right. Not Fast. Right. appeared first on John Battelle's Search Blog. (Cross posted to LI and Medium. Cuz that’s how we roll these days). If you’ve never blown it big time using email — you will. I have several times — in fact, I just did it earlier this evening. And gaaaah!, I wish technology had an answer for the clear and present danger that is myself, rushing through an afternoon, trying to GSD and hit inbox zero.

IT 90

More Trending

article thumbnail

Insurer Hosted Pricing – getting (and staying) ahead of the curve

CGI

Insurer Hosted Pricing – getting (and staying) ahead of the curve. p.butler@cgi.com. Thu, 10/01/2015 - 01:51. The pace of business and the pressure of market change are substantial challenges for insurers. The need to be responsive and provide fast pricing is critical. In an era when other industries such as travel , have platforms that enable them to provide pricing information within seconds, customers now expect immediate responses.

article thumbnail

I Don't Worry About DB2 for z/OS Buffer Pool Hit Ratios

Robert's Db2

And neither should you. It's true that for years, mine was among a chorus of DB2 specialists' voices that placed a lot of emphasis on monitoring DB2 buffer pool hit ratios (there are variations with respect to calculating this ratio, but the basic formula is (GETPAGEs - synchronous reads) / GETPAGEs). Some years ago, it dawned on me (and on others -- and for some folks earlier than for me) that I'd been focusing on the wrong buffer pool performance metric.

Mining 48
article thumbnail

CJEU Announces Date for Judgment on Safe Harbor

Hunton Privacy

On September 29, 2015, the Court of Justice of the European Union (“CJEU”) announced that it will deliver its judgment in the Schrems vs. Facebook case on October 6, 2015. The CJEU’s judgment will be the final ruling in the case, and comes after the Advocate General’s Opinion regarding Safe Harbor earlier this week. Typically, the CJEU delivers its ruling approximately three to six months after publication of the Advocate General’s opinion.

article thumbnail

10 cybersecurity questions for elected officials

CGI

Dix questions sur la cybersécurité pour les représentants élus. narmada.devarajan. Thu, 10/01/2015 - 04:49. Les gouverneurs, les maires et autres représentants élus doivent composer avec plusieurs défis. La gestion des collectivités est complexe et exige une prise de décisions difficiles, et ce, dans la mire constante du public, où chaque action est passée à la loupe.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Centre for Information Policy Leadership Webinar on the APEC Cross-Border Privacy Rules

Hunton Privacy

On September 29, 2015, the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”), a global privacy policy think-tank based in Washington D.C. and London, hosted a webinar on The Ins and Outs of the APEC Cross-Border Privacy Rules (“CBPR”) and their Role in Enabling Legal Compliance and International Data Transfers. CIPL Vice President and Senior Policy Counselor Markus Heyder moderated the session.

Privacy 40
article thumbnail

The importance of STEM and Digital Skills

CGI

The importance of STEM and Digital Skills. shobana.lv@cgi.com. Wed, 09/30/2015 - 04:53. I was fortunate enough to address a terrific audience of senior civil servants recently at Civil Service Live, Edinburgh. The conference provided some real food for thought and I wanted to share the points I raised during my talk which focused on the critical issue of STEM skills in Scotland.

article thumbnail

Seventh Circuit Denies En Banc Review For Data Breach Class Action

Hunton Privacy

On September 17, 2015, the Seventh Circuit rejected Neiman Marcus’ petition for a rehearing en banc of Remijas v. Neiman Marcus Group, LLC, No. 14-3122. In Remijas , a Seventh Circuit panel found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach that resulted in hackers gaining access to customers’ credit and debit card information.

article thumbnail

An Oft-Overlooked DB2 for z/OS Big Memory Exploitation Play

Robert's Db2

Over the past few years, I've done a lot of writing and presenting and talking about ways in which large-scale z Systems memory resources (which I refer to as Big Memory) can be leveraged so as to enhance the performance of DB2 for z/OS subsystems and related applications. While I very much like to see z/OS LPARs with memory sizes of 100 GB or more, I DON'T like to see situations in which organizations stop well short of exploiting Big Memory to maximum positive effect with regard to DB2 perform

IT 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.