Sat.Jan 24, 2015 - Fri.Jan 30, 2015

article thumbnail

Metromile: A FitBit for Your Car

John Battelle's Searchblog

'The post Metromile: A FitBit for Your Car appeared first on John Battelle's Search Blog. The Metromile staff in front of their SF HQ (Preston is in the red shirt in the back right). Ever since writing Living Systems and The Information First Company last Fall, I’ve been citing Earnest , the financial services startup, as a poster child for what I mean by an “information-first” company.

Insurance 102
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

Not long ago, an IBM colleague of mine who is a WebSphere Application Server (WAS) for z/OS specialist sent to me and to a few other IBMers (including some of our CICS and DB2 for z/OS developers) some information about an application scenario, and asked for our ideas and feedback. The scenario involved a Java program that accessed a local DB2 for z/OS subsystem (i.e., a subsystem in the same z/OS LPAR as the WAS instance) and selected a row to be updated, and then invoked a COBOL program (also

Mining 48
article thumbnail

Maturity models, love them or hate them?

CGI

Maturity models, love them or hate them? narmada.devarajan. Fri, 01/30/2015 - 00:02. Maturity models, love them or hate them; they can help us set improvement objectives against a model of good practice, while possibly distracting us from the meaningful and actionable. Maturity Modal. Which model to use? How much is relevant? I won’t be giving a view on that.

IT 40
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

European Data Protection Supervisor Speaks on Data Protection Day

Hunton Privacy

On January 28, 2015, in connection with Data Protection Day, newly appointed European Data Protection Supervisor (“EDPS”) Giovanni Buttarelli spoke about future challenges for data protection. Buttareli encouraged the EU “to lead by example as a beacon of respect for digital rights,” and “to be at the forefront in shaping a global, digital standard for privacy and data protection which centers on the rights of the individual.

Privacy 40

More Trending

article thumbnail

I Think We are Moving to a World Where We Will Keep Everything Forever. Here’s Why.

Barclay T Blair

Transcript. An edited and condensed transcript of this speech is available here. . Tagged: AHIMA , big data , E-Discovery , InfoGovCon , Information Governance , Keynote , Presentation.

article thumbnail

Determining best-fit workload environment key to effective cloud brokerage

CGI

Determining best-fit workload environment key to effective cloud brokerage. kathy.jacquay@…. Fri, 01/30/2015 - 07:01. In today’s immature cloud brokerage marketplace, there is a big misconception that cloud brokerage is primarily about finding the least expensive virtual machine when it really should be about figuring out the best-fit environment for your workload.

Cloud 40
article thumbnail

FTC Releases Report on Internet of Things

Hunton Privacy

On January 27, 2015, the Federal Trade Commission announced the release of a report on the Internet of Things: Privacy and Security in a Connected World (the “Report”). The Report describes the current state of the Internet of Things, analyzes the benefits and risks of its development, applies privacy principles to the Internet of Things and discusses whether legislation is needed to address this burgeoning area.

Privacy 40
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'The challenge for giant swathes of the tech industry is that bad smell from past plumbing failures -- and fear of the unknown.

65
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

German DPAs Host Event Regarding U.S.-EU Safe Harbor Framework and Initiate Administrative Proceedings Against Two U.S. Companies

Hunton Privacy

On January 28, 2015, the German conference of data protection commissioners hosted a European Data Protection Day event called Europe: Safer Harbor for Data Protection? – The Future Use of the Different Level of Data Protection between the EU and the US. At the conference, the speakers discussed the validity of the U.S.-EU Safe Harbor Framework. Previously, in 2013, the German data protection commissioners stated that they would review whether to suspend data transfers made from Germany to the U

Access 40
article thumbnail

Risk-Based Approach – New Thinking for Regulating Privacy

Hunton Privacy

On February 11, 2015, the International Association of Privacy Professionals Australian New Zealand (“iappANZ”) will host a discussion on the risk-based approach to privacy in Sydney, Australia. Richard Thomas , Global Strategy Advisor for the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”), will present the Centre’s contributions to this topic including the outcomes from the workshops held in Paris and Brussels.

Privacy 40
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

article thumbnail

Finland Introduces New Electronic Privacy Requirements for Online Communications Services Providers

Hunton Privacy

On January 1, 2015, Finland’s Information Security Code ( 2014/ 917 , the “Code”) became effective. The Code introduces substantial revisions to Finland’s existing electronic communications legislation and consolidates several earlier laws into a single, unified text. Although many of these earlier laws remain unchanged, the Code includes extensive amendments in a number of areas.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.