Sat.Aug 08, 2015 - Fri.Aug 14, 2015

article thumbnail

Do privacy laws prevent police forces from naming suspects?

Data Protector

I was asked this question at 6.15 am today. And, if I knew the answer, was I available for a BBC radio interview immediately after the 7.00 am news? No and Yes were my answers – so I subsequently had a chat with BBC Radio’s Adrian Goldberg. The question arose because the Birmingham Mail had asked West Midlands Police to disclose the names and images of ten suspects it had been hunting for at least a decade for crimes including rape and murder.

Privacy 136
article thumbnail

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. — John Battelle (@johnbattelle) August 7, 2015. Over and over again, the press and pundits are declaring the death of the “web we once knew.” And despite having solid proof to the contrary, I’ve always responded that the web will never die, th

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy by Design Certification offered by Ryerson University

Hunton Privacy

On May 25, 2015, the Privacy and Big Data Institute at Ryerson University in Canada announced that it is offering a Privacy by Design Certification. Privacy by Design is a “framework that seeks to proactively embed privacy into the design specifications of information technologies” to obtain the most secure data protection possible. Organizations that attain the certification will be permitted to post a “Certification Shield” “to demonstrate to consumers that they have withstood the scrutiny of

Privacy 40
article thumbnail

Cyber dashboards demonstrate value to executives

CGI

Cyber dashboards demonstrate value to executives. shobana.lv@cgi.com. Tue, 08/11/2015 - 08:00. Organizations can spend a lot of money on cybersecurity, where the people, processes and tools all need to work together. Cyber threats are constantly changing, which means toolsets are changing as well, and cyber professionals need constant training. They also need ample time to participate in cyber communities where information about ever-more sophisticated threats is shared.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How effective is the Telephone Preference Service?

Data Protector

I don't know, either. The TPS’s website provides individuals with an easy way to register their objection to receiving unsolicited direct marketing calls, but no information on how effective it is at stamping out these practices. There’s no information on the volume of complaints it receives, and how these are trending over time. There’s no information on the work it does to investigate these complaints, before handing them to the Information Commissioner’s Office.

Marketing 120

More Trending

article thumbnail

Information Transparency & The “True Cost” Calculator

John Battelle's Searchblog

The post Information Transparency & The “True Cost” Calculator appeared first on John Battelle's Search Blog. The view from Bolinas. It’s been so long since I’ve written here, and I’ve missed it terribly. As startups tend to do, NewCo has taken over most of my waking hours. So I thought I’d just sit and write for a spell, even if what comes out isn’t fully baked.

article thumbnail

What Does a DB2 for z/OS System Look Like When You Have Memory to Burn?

Robert's Db2

I've long been an advocate of Big Memory (meaning, lots of real storage) for DB2 for z/OS systems. For years, I was disappointed at seeing one production DB2 subsystem after another running in a z/OS LPAR with 16 GB, 20 GB, maybe 40 GB of memory -- enough real storage to run decently, but not enough to let DB2 do its thing with maximum performance. It was like seeing a thoroughbred racehorse in a small coral.

Sales 48
article thumbnail

Not a lot of news from Big Brother Watch today

Data Protector

What are we to make of today’s Big Brother Watch report which claims that local authorities commit 4 data breaches every day? In the words of TV magician Paul Daniels: “Not a lot.” At first glance, it looks impressive. It’s almost 200 pages long. But, and this is a big but, there are only a few pages of analysis – once you get past page 12, a series of annexes contain the responses from each local authority, revealing how minor the vast majority of the reported incidents (occurring between April