Sat.Dec 12, 2015 - Fri.Dec 18, 2015

article thumbnail

New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship

John Battelle's Searchblog

The post New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship appeared first on John Battelle's Search Blog. Hey Searchblog readers, posting a teaser here of a story I wrote which ran this week on NewCo. We’re doing more and more original reporting and editorial on our site, I invite you to sign up for our daily newsletter , which curates the best stories and insights on the ongoing transformation of business around the world.

IT 58
article thumbnail

The EU General Data Protection Regulation

Hunton Privacy

On December 17, 2015, after three years of drafting and negotiations, the European Parliament and Council of the European Union reached an informal agreement on the final draft of the EU General Data Protection Regulation (the “Regulation”), which is backed by the Committee on Civil Liberties, Justice and Home Affairs. The Regulation replaces Directive 95/46/EC (the “Directive”), which was enacted in 1995, and will significantly change EU data protection laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Community Channel’s Natalie Tran on Password Policy

Roger's Information Security

The post Community Channel’s Natalie Tran on Password Policy appeared first on Roger's Information Security Blog.

article thumbnail

AIIM Saves the CIP

JKevinParker

In the past week, AIIM has killed off and since resurrected the Certified Information Professional (CIP). I'm very excited that they decided to keep it. Read my take: The Certified Information Professional (CIP) Lives Again! Thank you, AIIM, for listening, and keeping this important Information Management certification.

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sharing best practices in our new Data to Diamonds book

CGI

Sharing best practices in our new Data to Diamonds book. shobana.lv@cgi.com. Tue, 12/15/2015 - 07:00. Making effective use of big data has become a top priority for commercial and government organizations. Having worked on many complex data and analytics projects over the years, we have compiled numerous best practices, and developed our Data2Diamonds methodology for the design and implementation of big data analytics solutions.

More Trending

article thumbnail

EU Data Protection Reform: LIBE agrees!

Privacy and Cybersecurity Law

The EU Parliament LIBE Committee has approved the Data Protection Reform package as reported by Privacy Laws and Business today. For […].

Privacy 40
article thumbnail

HIPAA Settlement Emphasizes Importance of Risk Analyses

Hunton Privacy

On December 14, 2015, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it had settled potential HIPAA Security Rule violations with the University of Washington on behalf of the university’s medical center, medical school and affiliated labs and clinics (collectively, “UW Medical”). OCR investigated UW Medical after receiving a breach report in November 2013 involving an incident in which almost 100,000 individuals had their protected health inform

Risk 40
article thumbnail

U.S. Congress Releases Compromise Bill on Cybersecurity Information Sharing

Hunton Privacy

On December 16, 2015, leaders in the U.S. House of Representatives and Senate released a $1.1 trillion omnibus spending bill that contained cybersecurity information sharing language that is based on a compromise between the Cybersecurity Information Sharing Act, which passed in the Senate in October, and two cybersecurity information sharing bills that passed in the House earlier this year.

FOIA 40
article thumbnail

Deal on EU Data Protection Regulation Imminent

Hunton Privacy

Today, Jan Philip Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, tweeted the following: “Yes, reports on white smoke are right but press information only to follow after second part of our work tonight is done, too.”. More information is expected to follow later today or tomorrow. View the European Parliament’s press release.

40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Managing today’s hybrid IT environments through an effective MSI/SIAM framework

CGI

Managing today’s hybrid IT environments through an effective MSI/SIAM framework. kathy.jacquay@…. Mon, 12/14/2015 - 01:14. Governments increasingly are adopting cloud services and transitioning to multi-provider IT delivery models to improve service levels, access specialized technologies and reduce costs. The challenge is that these hybrid environments need a robust governance function to prevent responsibility gaps or overlaps.

IT 40
article thumbnail

Safe Harbor fallout: where are we now?

Privacy and Cybersecurity Law

As we all know, the EU decided to invalidate Safe Harbor on 6 October 2015. Please see our Insight article […].

article thumbnail

Why ecosystems are so important to the Internet of Things

CGI

Why ecosystems are so important to the Internet of Things. Anonymous. Thu, 12/17/2015 - 07:59. With a plethora of devices and connectivity, the Internet of Things (IoT) is described by many as all encompassing. With that in mind, the concept that partnerships and ecosystems underpin success within the Internet of Things is no surprise. The potential of IoT paints an ideal where you can connect multiple points both within and outside of your organisation, to create insight and value.

IoT 40