Sat.Jun 02, 2012 - Fri.Jun 08, 2012

article thumbnail

ION Air Pro simplify wearable HD cameras

Collaboration 2.0

ION Air add cloud native capabilities to their new ‘Point-of-view action-sport camcorder’ range, along with easy to use on/off recording

Cloud 85
article thumbnail

Lessons from designing mobile digital public services

ChiefTech

Designing a mobile application that lets mental health service users register their mood and activity daily proved a long and challenging road. Adil Abrar shares five important lessons. via guardian.co.uk. Five lessons from the experience of designing the "Buddy" app are: Find the right part of the health system to work with; Focus on creating a minimum viable product; Embrace 'agile' development fully to get the most out of bringing designers, developers and strategist to create the solution; E

62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The ONE Key Aspect of DB2 for z/OS Table-Controlled Partitioning that People Seem Most Likely to Forget

Robert's Db2

Sometimes, an important DB2 for z/OS feature can be out there for years, and yet not be fully appreciated by lots of people in the DB2 user community. Table-controlled partitioning is such a feature. In this blog entry I want to generally set the record straight about table-controlled partitioning, and in particular I want to make sure that mainframe DB2 folks understand a key aspect of this physical database design option that for some reason eludes many users to this day.

Mining 48
article thumbnail

Hunton & Williams Maintains Top-Tier Privacy Team Rankings in Chambers USA and The Legal 500 United States

Hunton Privacy

Hunton & Williams LLP is pleased to announce its 2012 top rankings from Chambers and Partners and The Legal 500: United States. The firm consistently has maintained its number one ranking in both surveys for its Privacy and Data Security practice. For the last five years, the firm has held the “Band 1” ranking for Privacy and Data Security by Chambers USA , and also received the top spot in the Chambers Global guide earlier this year.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Updating the Site URL Property of Your SharePoint Development Project

JKevinParker

I admit my Visual Studio 2010 and SharePoint development skills are a little rusty. After all, I have spent the last year or so engaged solely in SharePoint and information architecture planning. But that doesn't take away from the fact that SharePoint and Visual Studio development can be more than a little kludgy. When attempting to deploy one of my new projects to my SharePoint server, I received this error message: Error occurred in deployment step 'Recycle IIS Application Pool': Cannot conne

More Trending

article thumbnail

NIST Releases Cloud Computing Guidance

Privacy and Cybersecurity Law

Following on the heels of its December guidance on cloud privacy and security, NIST has released SP 800-146, “Cloud Computing […].

Cloud 40
article thumbnail

Vermont Attorney General Announces Amendments to Security Breach Notification Law

Hunton Privacy

On June 1, 2012, the Attorney General of Vermont announced a series of recent legislative moves to enhance the state’s consumer protection laws, including amendments to Vermont’s security breach notification law. The changes, which were signed into law by Governor Peter Shumlin in early May, include a revised definition of “security breach,” the addition of a 45-day timing requirement for notifying affected consumers, and a requirement to notify the state Attorney General within 14 days of disco

article thumbnail

In 1844, Morse Gets The Scoop, Then Tweets His Dinner

John Battelle's Searchblog

I’m reading a fascinating biography of Samuel Morse - Lightning Man: The Accursed Life Of Samuel F.B. Morse by Kenneth Silverman. I’ll post a review in a week or so, but one scene bears a quick post. Morse successfully demonstrated his telegraph between Baltimore and Washington DC in May of 1844. Three days later the Democratic party convention commenced in Baltimore.

article thumbnail

OCR Director Leon Rodriguez Says Tolerance for HIPAA Non-Compliance Is Low

Hunton Privacy

On June 7, 2012, at the annual Safeguarding Health Information: Building Assurance through HIPAA Security Conference hosted in Washington, D.C. by the Department of Health and Human Services Office for Civil Rights (“OCR”) and the National Institute of Standards and Technology (“NIST”), OCR Director Leon Rodriguez said that, given HIPAA’s 15-year history and the substantial technical assistance OCR and NIST have provided covered entities, tolerance for HIPAA non-compliance is “much, much lower”

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Massachusetts Hospital Settles Data Breach Lawsuit

Hunton Privacy

On May 24, 2012, Massachusetts Attorney General Martha Coakley announced that South Shore Hospital agreed to a consent judgment and $750,000 payment to settle a lawsuit stemming from a data breach that occurred in February 2010. At that time, South Shore Hospital shipped several boxes of unencrypted back-up tapes to a service provider in Texas to erase them.

article thumbnail

German Government Proposes Amendments to Act on Access to Digital Geographical Data

Hunton Privacy

On May 24, 2012, the German Federal Government submitted to the Parliament ( Bundestag ) a proposal to amend the Geodatenzugangsgesetz , a federal law concerning access to geographical data that has been in force since 2009. The current law implements Directive 2007/2/EC of the European Parliament and of the Council of 14 March 2007 establishing an Infrastructure for Spatial Information in the European Community (“INSPIRE”).

Access 40
article thumbnail

Recent Cases Focus Attention on the Video Privacy Protection Act

Hunton Privacy

In recent months, two high-profile cases involving Hulu and Netflix have raised questions regarding the scope and application of the Video Privacy Protection Act (“VPPA”), a federal privacy law that has been the focus of increasing attention over the past few years. In the Hulu case, Hulu users claimed that the subscription-based video streaming service disclosed their viewing history to third parties.

Privacy 40
article thumbnail

The FTC’s Myspace Consent Order May Impact Use by Mobile App Developers of Unique IDs

Privacy and Cybersecurity Law

On May 8th, the FTC released its proposed consent order in its investigation of Myspace.com, finding the social networking site […].

IT 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Privacy and data interception in Saudi Arabia

Privacy and Cybersecurity Law

As part of our coverage of global privacy and data security issues, we thought you would be interested in a […].

Privacy 40