Sat.Aug 23, 2014 - Fri.Aug 29, 2014

article thumbnail

AdTech Is Alive and Well: I’ll Have the Full Stack, Please

John Battelle's Searchblog

'The post AdTech Is Alive and Well: I’ll Have the Full Stack, Please appeared first on John Battelle's Search Blog. Reading The Information’s piece on Facebook’s reported re-introduction of the Atlas ad-serving technology , I wondered – Does the market really need six or more full stack adtech solutions? Google is the undisputed leader in the field – it’s spent nearly ten years stitching its own technology into acquisitions like DoubleClick (the original

Analytics 102
article thumbnail

DB2 10 for z/OS, 1 MB Page Frames, and the Number 6656

Robert's Db2

I recently received an interesting message from a mainframe DB2 person I've known for a long time. At his DB2 10 for z/OS site, 1 MB page frames had recently been made available on the System z servers, and my friend moved to leverage this resource via page-fixed DB2 buffer pools. Nothing unusual there. What's interesting is the information he saw in the output of -DISPLAY BUFFERPOOL commands subsequently entered for the page-fixed pools.

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming NIST Workshop to Focus on Draft Privacy Engineering Concepts

Hunton Privacy

On September 15-16, 2014, the National Institute of Standards and Technology (“NIST”) will sponsor a workshop to further its Privacy Engineering initiative. The workshop will focus on developing draft privacy engineering definitions and concepts that will be explored in a forthcoming NIST report. Draft workshop materials available on the NIST website highlight some of the issues to be considered, and include a Model Discussion Draft that details NIST’s privacy engineering objectives.

Privacy 40
article thumbnail

NewCo New York 2014: My Chairman’s Picks To Visit

John Battelle's Searchblog

'The post NewCo New York 2014: My Chairman’s Picks To Visit appeared first on John Battelle's Search Blog. Last week I created my schedule for NewCo San Francisco, and wrote about them here. What many folks don’t know is that there are now nine confirmed NewCo festivals around the world. Three weeks after San Francsico, nearly 100 New York companies will be opening their doors and welcoming festival goers in our second annual NewCo New York, Sept. 30th-Oct. 2nd.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 for z/OS: Can a Pooled DBAT Hold Locks?

Robert's Db2

The answer to the question in the title of this post is, "No, it can't -- unless it can." How's that for a hook? OK, a little background. A DBAT is a database access thread. It's the kind of thread that a network-attached application process uses to interact with a DB2 for z/OS system (such a process, also referred to as a DRDA requester, issues SQL statements that get to DB2 by way of the distributed data facility, aka DDF).

IT 48

More Trending

article thumbnail

Germany Issues Revised Draft Cybersecurity Law

Hunton Privacy

On August 19, 2014, the German Federal Ministry of the Interior published a revised draft cybersecurity law (the “Draft Law”). An earlier version of the law was published in March 2013. The Draft Law is intended to serve as a cornerstone of Germany’s recently-announced digital agenda. “Critical Infrastructure” and Security Requirements. The revised Draft Law will amend a number of laws and provisions relating to IT security.

article thumbnail

Writing Is Code, Reading Is Visualization

John Battelle's Searchblog

'The post Writing Is Code, Reading Is Visualization appeared first on John Battelle's Search Blog. Yesterday I stumbled onto a fascinating PBS Newshour interview with book designer Peter Mendelsund, well-regarded for his cover treatments of titles ranging from George Dyson’s Turing’s Cathedral to The Girl With The Dragon Tattoo. Mendelsen argued that when we read, we visualize the text, each of us creating a different reality in our minds.

103
103