Sat.Dec 28, 2013 - Fri.Jan 03, 2014

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

'The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. This post marks the 10th edition of my annual predictions – it’s quite possibly the only thing I’ve consistently done for a decade in my life (besides this site, of course, which is going into its 12th year). But gazing into 2014 has been the hardest of the bunch – and not because the industry is getting so complicated.

Marketing 111
article thumbnail

FTC Reaches Settlement with Accretive Health

Hunton Privacy

On December 31, 2013, the Federal Trade Commission announced that Accretive Health, Inc. (“Accretive”) has agreed to settle charges that the company’s inadequate data security measures unfairly exposed sensitive consumer information to the risk of theft or misuse. Accretive experienced a breach in July 2011 that involved the protected health information of more than 23,000 patients.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Want to use High-Performance DBATs? Check your MAXDBAT Value

Robert's Db2

Of the features introduced with DB2 10 for z/OS, high-performance DBATs is one of my favorites. It enabled (finally) DDF-using applications to get the CPU efficiency benefit that comes from combining thread reuse with the RELEASE(DEALLOCATE) package bind option -- a performance tuning action that has long been leveraged for CICS-DB2 workloads. Implementing high-performance DBATs is pretty easy: in a DB2 10 (or 11) environment, when a package bound with RELEASE(DEALLOCATE) is executed by way of a

IT 48
article thumbnail

vtable protections: fast and thorough?

Scary Beasts Security

Recently, there's been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there's the GCC-based virtual table verification, aka. VTV. There are also multiple experiments based on clang / LLVM and of course MSVC's vtguard. In the non-compiler space, there's Blink's heap partitioning, enabled by PartitionAlloc.

IT 20
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Looking Back: How Did My 2013 Predictions Fare?

John Battelle's Searchblog

'The post Looking Back: How Did My 2013 Predictions Fare? appeared first on John Battelle's Search Blog. It’s that time of year: The annual ritual of looking back and looking forward is in full voice. Long time readers know I always make predictions around the turn of the year, and I expect my 2014 prognostications will come sometime this weekend.

More Trending

article thumbnail

German DPAs Publish Further Guidance on the Use of Personal Data for Advertising Purposes

Hunton Privacy

On December 10, 2013, a German data protection working group on advertising and address trading published new guidelines on the collection, processing and use of personal data for advertising purposes (the “Guidelines”). The working group was established by the committee of German data protection authorities (“DPAs”) and is chaired by the Bavarian DPA.

article thumbnail

Recent Data Breach Events in China

Hunton Privacy

In recent months, the Chinese government has devoted attention to the protection of personal information with, as we previously reported , the promulgation of a number of new data protection regulations. This focus is also illustrated by recent actions related to crimes involving personal information. Gang Selling Personal Information Busted. Police apprehended a 10-member gang in Beijing and Shanghai for illegally obtaining and selling nearly one million pieces of personal information.