Sat.Feb 14, 2015 - Fri.Feb 20, 2015

article thumbnail

Office of the Privacy Commissioner of Canada Releases Research Report on Privacy and Cybersecurity

Hunton Privacy

On February 12, 2015, the Office of the Privacy Commissioner of Canada released a research report entitled Privacy and Cyber Security – Emphasizing privacy protection in cyber security activities (the “Report”). The Report explores the interconnected relationship among cybersecurity, privacy and data protection, including common interests and challenges.

Privacy 45
article thumbnail

Finding diamonds in data

CGI

Finding diamonds in data. ravi.kumarv@cgi.com. Thu, 02/19/2015 - 23:24. The right data can help cure diseases, make streets safer, improve customer service and create cost savings. It can help win battles and win ball games. It seems there’s nothing we can’t do better with the right data, along with the tools and skills to analyze it. To explore the world of big data and analytics, CGI is launching this blog to talk about new applications where people are getting value from data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Of DB2 Connect "Gateway" Servers and DB2 for z/OS DSNL030I Authentication Messages

Robert's Db2

A few days ago I received a note in which a DBA reported strange and inconsistent information in some DSNL030I messages that were generated periodically by a DB2 for z/OS subsystem in his charge. The messages in question were tied to authentication failures associated with DDF-using applications (i.e., applications that access DB2 via network connections).

article thumbnail

Article 29 Working Party Reports on Cookie Sweep Results

Hunton Privacy

On February 3, 2015, the Article 29 Working Party (“Working Party”) published a report on a sweep of 478 websites across eight EU Member States (Czech Republic, Denmark, France, Greece, the Netherlands, Slovenia, Spain and the United Kingdom). The sweep was conducted to assess compliance with Article 5.3 of the e-Privacy Directive 2002/58/EC , as amended by 2009/136/EC.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

White House Sets Privacy Expectations for the Federal Government’s Use of Unmanned Aircraft Systems

Hunton Privacy

On February 15, 2015, the White House released a Presidential Memorandum entitled “ Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems ” (the “Memorandum”) to address the privacy, civil rights and civil liberties concerns associated with the federal government’s use of Unmanned Aircraft Systems (“UAS”).

Privacy 40