Sat.Mar 14, 2015 - Fri.Mar 20, 2015

article thumbnail

DB2 for z/OS: Non-Disruptively Altering a Native SQL Procedure

Robert's Db2

Not long ago, I was contacted by a DB2 for z/OS DBA who wanted to run a situation by me. On one of his organizations' mainframe DB2 systems -- a system with very high transaction volumes and very stringent application availability requirements -- there was a native SQL procedure for which the ASUTIME specification had to be changed. The DBA wanted to see if I could help him to find a non-disruptive way to effect this stored procedure modification.

IT 48
article thumbnail

FTC to Host Workshop on Cross-Device Tracking

Hunton Privacy

On November 16, 2015, the Federal Trade Commission will host a workshop in Washington, D.C., to examine the benefits and privacy risks associated with “cross-device tracking.” The workshop intends to highlight the types of cross-device tracking techniques and how businesses and consumers can benefit from these practices. The workshop also will address related privacy and security risks, and discuss whether self-regulatory programs apply to these practices.

Privacy 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Staying connected with customers in the age of big data

CGI

Staying connected with customers in the age of big data. Anonymous. Mon, 03/16/2015 - 01:28. The owner of a large supermarket chain approached CGI with how difficult it is to retain customers and attract new ones, especially in their large urban and suburban stores. He felt they were losing sight of their loyal customers and what makes them stay or go.

article thumbnail

UK Announces investment in digital currencies

Privacy and Cybersecurity Law

UK Chancellor, George Osborne, announced yesterday, a £10 million boost from government for digital currency such as Bitcoin. This was […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IPTF Issues Request for Public Comment Regarding Cybersecurity Issues Affecting the Digital Economy

Hunton Privacy

On March 13, 2015, the U.S. Department of Commerce Internet Policy Task Force (“IPTF”) issued a request for public comment regarding cybersecurity issues affecting the digital economy. The IPTF’s request invites all stakeholders interested in cybersecurity to “identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations