Sat.Mar 28, 2015 - Fri.Apr 03, 2015

article thumbnail

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

'The post What’s NewCo? These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. I thought I’d share them here. The first one features folks talking about their experience attending festivals, and the second one features host company presentors doing the same.

86
article thumbnail

The International Conference of Data Protection and Privacy Commissioners Announces Its First Permanent Website

Hunton Privacy

The International Conference of Data Protection and Privacy Commissioners (the “Conference”) has launched a new permanent website. The new website fulfills the agreement made between Commissioners “to create a permanent website in particular as a common base for information and resources management” in the Montreux Declaration adopted in 2005. The Executive Committee Secretariat called the website a “one-stop-shop for permanent Conference documentation,” and will be a resource for members and th

Privacy 58
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DB2-Managed Data Archiving Feature of DB2 11 for z/OS

Robert's Db2

Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS. In the course of these discussions and presentations, I've noticed something interesting pertaining to the DB2-managed data archiving capability delivered with this latest release of the DBMS: a) it is one of the more misunderstood features of DB2 11, and b) when people do understand what DB2-managed archiving is about, it becomes one of the DB2 11 features about which they are most enthusiastic.

article thumbnail

Where there’s opportunity, there is a cyber target

CGI

Là où il y a une occasion, il y a une cybercible. narmada.devarajan. Wed, 04/01/2015 - 02:16. « Puisque mon organisation n’est pas une banque ni un organisme gouvernemental, un important détaillant ou un fournisseur d’infrastructure essentielle, nous n’avons pas tellement à craindre d’être une cible pour les cyberpirates. Nous avons un logiciel antivirus et demeurons à jour grâce à des correctifs de sécurité, donc tout devrait bien aller. ».

40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Court Ruling Allows Claims Against Google for Misuse of Private Information

Hunton Privacy

On March 27, 2015, the England and Wales Court of Appeal issued its judgment in Google Inc. v Vidal-Hall and Others. Google Inc. (“Google”) appealed an earlier decision by Tugendhat J. in the High Court in January 2014. The claimants were users of Apple’s Safari browser who argued that during certain months in 2011 and 2012, Google collected information about their browsing habits via cookies placed on their devices without their consent and in breach of Google’s privacy policy.

Privacy 45

More Trending

article thumbnail

Hunton & Williams LLP Unveils New Mobile-Responsive Privacy and Information Security Law Blog

Hunton Privacy

Hunton & Williams is pleased to announce the release of its newly designed and mobile-responsive Privacy and Information Security Law Blog, www.huntonprivacyblog.com. “Our award-winning blog has served the entire privacy community — from companies and practitioners to international regulators,” said Lisa Sotto, who heads the firm’s global privacy and cybersecurity practice.

article thumbnail

President Obama Issues Executive Order Enabling Treasury to Impose Sanctions on Cyber-Enabled Activities

Hunton Privacy

As reported in Bloomberg BNA , on April 1, 2015, the White House announced that President Obama has signed a new executive order providing the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, the ability to impose sanctions on individuals and entities that engage in certain cyber-enabled activities. The signed executive order, entitled Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities (the “Executiv