Sat.Feb 08, 2014 - Fri.Feb 14, 2014

article thumbnail

Buh-Bye, CableCo

John Battelle's Searchblog

'The post Buh-Bye, CableCo appeared first on John Battelle's Search Blog. When it comes to television business models and the endless debate about “ cutting the cord ,” I consider myself in the “fast follower” camp – I’m not willing to endure the headaches and technical backflips required to get rid of cable entirely, but I sure am open to alternatives should they present themselves.

Marketing 102
article thumbnail

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now." In the space below, I'll provide some background information on DB2 11's bind concurrency enhancement, and then I'll give you the bonus insight that you might see as the "cherry on top" -- the important scenario that is addressed by DB2 11 bind concurrency but which has received little (if any) coverage in documents and

IT 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DC, Northern Virginia Enterprise Architects, Health Technology Professionals - an #NVTC Joint Committee Meeting with Former HHS CIO John Teeter - 2/18/2014

Interactive Information Management

Northern Virginia Enterprise Architects, Health Technology Professionals , in the Washington DC metro region - if you are members, stakeholders or guests of the Northern Virginia Technology Council ( #NVTC ), please join us this next Tuesday Feb 8 th , 2014, from 7:30-9AM, for a Health Technology, Business and Enterprise Architecture Joint Committee Meeting.

CMS 45
article thumbnail

Broad Interpretations of Terrorism Exclusions Are Incompatible with Cyber Insurance

Hunton Privacy

The scale of some recent cyber events has been extraordinary. Target reports that 70 million people (almost 25% of the U.S. population) were affected by its recent breach. CNN recently reported that in South Korea there was a breach that affected 40% of its citizens. The staggering impact of these events is leading companies to seek protection through both technology and financial products, such as insurance.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

else 2.10: “Information that was never designed for a human to see”

John Battelle's Searchblog

'The post else 2.10: “Information that was never designed for a human to see” appeared first on John Battelle's Search Blog. This week, we were thinking about data post-language, reading the tea leaves of algorithms, and wondering how to protect the first principles of the web. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

More Trending

article thumbnail

Making Real Money for Bands in the Age of Social Media - Democratization of the Royalties Model, by Gideen.com

Interactive Information Management

Welcome to M usic Business 3.0 - it's not about the $1 song anymore. Most artists these days are gifting songs away just for email addresses, the occasional "like". The 3.0 music business model is about creating tracks and collecting many different revenue types internationally for each track/song. It's a new content marketing model and platform for music, for the entire music industry.

article thumbnail

FTC Announces Settlement with Online Gaming Company Falsely Claiming Compliance with the Safe Harbor Framework

Hunton Privacy

On February 11, 2014, the Federal Trade Commission announced a proposed settlement with Fantage.com stemming from allegations that the company made statements in its privacy policy that deceptively claimed that Fantage.com was complying with the U.S.-EU Safe Harbor Framework. The U.S.-EU Safe Harbor Framework is a cross-border data transfer mechanism that enables certified organizations to move personal data from the European Union to the United States in compliance with European data protection

article thumbnail

NIST Releases Final Cybersecurity Framework

Hunton Privacy

On February 12, 2014, the National Institute of Standards and Technology (“NIST”) issued the final Cybersecurity Framework , as required under Section 7 of the Obama Administration’s February 2013 executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”). The Framework, which includes standards, procedures and processes for reducing cyber risks to critical infrastructure, reflects changes based on input received during a widely-attended public workshop held last No

article thumbnail

German Ministry Moves on Privacy Litigation

Hunton Privacy

On February 11, 2014, Germany’s Federal Minister of Justice and Consumer Protection announced that consumer rights organizations will soon be able to sue businesses directly for breaches of German data protection law. Such additional powers had already been contemplated by the German governing coalition’s agreement and the Minister now expects to present a draft law in April of this year to implement them.

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

French Data Protection Authority Revises Authorization on Whistleblowing Schemes

Hunton Privacy

In a decision published on February 11, 2014, the French Data Protection Authority (“CNIL”) adopted several amendments to its Single Authorization AU-004 regarding the processing of personal data in the context of whistleblowing schemes (the “Single Authorization”). Since 2005, companies in France have had to register their whistleblowing schemes with the CNIL either by self-certifying to the CNIL’s Single Authorization or by filing a formal request for approval with the CNIL.