ION Air Pro simplify wearable HD cameras
Collaboration 2.0
JUNE 8, 2012
ION Air add cloud native capabilities to their new ‘Point-of-view action-sport camcorder’ range, along with easy to use on/off recording
Collaboration 2.0
JUNE 8, 2012
ION Air add cloud native capabilities to their new ‘Point-of-view action-sport camcorder’ range, along with easy to use on/off recording
ChiefTech
JUNE 7, 2012
Designing a mobile application that lets mental health service users register their mood and activity daily proved a long and challenging road. Adil Abrar shares five important lessons. via guardian.co.uk. Five lessons from the experience of designing the "Buddy" app are: Find the right part of the health system to work with; Focus on creating a minimum viable product; Embrace 'agile' development fully to get the most out of bringing designers, developers and strategist to create the solution; E
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Robert's Db2
JUNE 5, 2012
Sometimes, an important DB2 for z/OS feature can be out there for years, and yet not be fully appreciated by lots of people in the DB2 user community. Table-controlled partitioning is such a feature. In this blog entry I want to generally set the record straight about table-controlled partitioning, and in particular I want to make sure that mainframe DB2 folks understand a key aspect of this physical database design option that for some reason eludes many users to this day.
Hunton Privacy
JUNE 8, 2012
Hunton & Williams LLP is pleased to announce its 2012 top rankings from Chambers and Partners and The Legal 500: United States. The firm consistently has maintained its number one ranking in both surveys for its Privacy and Data Security practice. For the last five years, the firm has held the “Band 1” ranking for Privacy and Data Security by Chambers USA , and also received the top spot in the Chambers Global guide earlier this year.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
JKevinParker
JUNE 2, 2012
I admit my Visual Studio 2010 and SharePoint development skills are a little rusty. After all, I have spent the last year or so engaged solely in SharePoint and information architecture planning. But that doesn't take away from the fact that SharePoint and Visual Studio development can be more than a little kludgy. When attempting to deploy one of my new projects to my SharePoint server, I received this error message: Error occurred in deployment step 'Recycle IIS Application Pool': Cannot conne
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Privacy and Cybersecurity Law
JUNE 6, 2012
Following on the heels of its December guidance on cloud privacy and security, NIST has released SP 800-146, “Cloud Computing […].
Hunton Privacy
JUNE 7, 2012
On June 1, 2012, the Attorney General of Vermont announced a series of recent legislative moves to enhance the state’s consumer protection laws, including amendments to Vermont’s security breach notification law. The changes, which were signed into law by Governor Peter Shumlin in early May, include a revised definition of “security breach,” the addition of a 45-day timing requirement for notifying affected consumers, and a requirement to notify the state Attorney General within 14 days of disco
John Battelle's Searchblog
JUNE 7, 2012
I’m reading a fascinating biography of Samuel Morse - Lightning Man: The Accursed Life Of Samuel F.B. Morse by Kenneth Silverman. I’ll post a review in a week or so, but one scene bears a quick post. Morse successfully demonstrated his telegraph between Baltimore and Washington DC in May of 1844. Three days later the Democratic party convention commenced in Baltimore.
Hunton Privacy
JUNE 7, 2012
On June 7, 2012, at the annual Safeguarding Health Information: Building Assurance through HIPAA Security Conference hosted in Washington, D.C. by the Department of Health and Human Services Office for Civil Rights (“OCR”) and the National Institute of Standards and Technology (“NIST”), OCR Director Leon Rodriguez said that, given HIPAA’s 15-year history and the substantial technical assistance OCR and NIST have provided covered entities, tolerance for HIPAA non-compliance is “much, much lower”
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
Hunton Privacy
JUNE 7, 2012
On May 24, 2012, Massachusetts Attorney General Martha Coakley announced that South Shore Hospital agreed to a consent judgment and $750,000 payment to settle a lawsuit stemming from a data breach that occurred in February 2010. At that time, South Shore Hospital shipped several boxes of unencrypted back-up tapes to a service provider in Texas to erase them.
Hunton Privacy
JUNE 5, 2012
On May 24, 2012, the German Federal Government submitted to the Parliament ( Bundestag ) a proposal to amend the Geodatenzugangsgesetz , a federal law concerning access to geographical data that has been in force since 2009. The current law implements Directive 2007/2/EC of the European Parliament and of the Council of 14 March 2007 establishing an Infrastructure for Spatial Information in the European Community (“INSPIRE”).
Hunton Privacy
JUNE 4, 2012
In recent months, two high-profile cases involving Hulu and Netflix have raised questions regarding the scope and application of the Video Privacy Protection Act (“VPPA”), a federal privacy law that has been the focus of increasing attention over the past few years. In the Hulu case, Hulu users claimed that the subscription-based video streaming service disclosed their viewing history to third parties.
Privacy and Cybersecurity Law
JUNE 8, 2012
On May 8th, the FTC released its proposed consent order in its investigation of Myspace.com, finding the social networking site […].
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
Privacy and Cybersecurity Law
JUNE 8, 2012
As part of our coverage of global privacy and data security issues, we thought you would be interested in a […].
Let's personalize your content