Sat.Mar 16, 2013 - Fri.Mar 22, 2013

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Why? Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

article thumbnail

SXSW 2013 Highlights: Kurt Daradics & Stephen Wolfram

Daradiction

Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf extension), which he's proclaiming as the convergence of the past 30 years of his work.

Cloud 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Innovation in service delivery - PatchworkHQ pilot in Victoria

ChiefTech

When I joined Ripple Effect Group in 2009 (then known as Headshift), one of the company's case studies that immediately resonated with me was Patient Opinion. There was nothing like it in Australia and if you've been following me for a while, you'll know I've often featured it as a case study of what we can do when we think beyond getting government agencies on to Facebook and Twitter.

article thumbnail

Supreme Court Limits Plaintiffs Ability to Cap Damages Prior to Class Certification

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On March 19, 2013, in Standard Fire Insurance Co.v. Knowles , the United States Supreme Court ruled that stipulations by a named plaintiff on behalf of a proposed class prior to class certification cannot serve as the basis for avoiding federal jurisdiction under the Class Action Fairness Act of 2005 (“CAFA”).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Private Sector CloudStore, anyone?

CGI

Private Sector CloudStore, anyone? ravi.kumarv@cgi.com. Mon, 03/18/2013 - 08:00. In February 2012 the Cabinet Office launched something rather revolutionary: A catalogue of IT services, available on-demand to any public sector buyer, with predictable prices, and from pre-vetted suppliers. This innovation much-simplifies normal public sector procurement process.

Sales 40

More Trending

article thumbnail

Google Apps-based intranet: Ahold case study

ChiefTech

Back in October last year I asked, can you run your intranet using just Google Apps or Salesforce Chatter? Since then I've shared some interesting case studies about companies using Salesforce Chatter and Microsoft Yammer. But I've been quite keen to find a Google Sites example, if only because I'm a little dubious about the results that could be achieved.

article thumbnail

French Data Protection Authority Discloses Its 2013 Inspection Program

Hunton Privacy

On March 19, 2013, the French Data Protection Authority (“CNIL”) announced (in French) its annual inspection program, providing an overview of its inspections of data controllers in 2012 and a list of inspections that it plans to conduct in 2013. Under French data protection law, the CNIL is authorized to collect any useful information in connection with its investigations and has access to data controllers’ electronic data and data processing programs.

IT 40
article thumbnail

Reflecting on Pragmatic Ethnography

ChiefTech

I'm not a ethnographer by training and its not on my CV, but I realise that I have often (and increasingly) employed methods that are common to ethnography in my work. My BarCamp Canberra 2013 presentation, "Pragmatic Ethnography" tried to capture a little of my own professional experience of working in the field. At Ripple Effect Group , one of the constant themes in our social business research and strategic projects with clients is working out how we get closer to the stakeholders that our wo

article thumbnail

U.S. Court Finds National Security Letter Nondisclosure Provisions Unconstitutional

Hunton Privacy

On March 14, 2013, the United States District Court for the Northern District of California granted a motion to prohibit the government from issuing National Security Letters (“NSLs”) to electronic communication service providers (“ECSPs”) requesting “subscriber information” and enforcing nondisclosure clauses contained in such letters. The nondisclosure clauses are intended to prevent ECSPs from disclosing that they received an NSL.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

European Data Protection Supervisor Issues Additional Comments on EU Data Protection Reform Package

Hunton Privacy

On March 15, 2013, European Data Protection Supervisor Peter Hustinx sent a letter to Juan Fernando López Aguilar, Chair of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”), with his comments regarding certain aspects of the European Commission’s proposed revised data protection framework. On March 20, 2013, Peter Hustinx was invited to present his comments during a LIBE Committee meeting, together with the President of the Article 29 Working Party, Jacob

article thumbnail

UK Justice Select Committee Warns of ICO Funding Shortfall

Hunton Privacy

On March 12, 2013, the UK Government Justice Committee published a report on the functions, powers and resources of the UK Information Commissioner’s Office (the “Report”). The Report highlights several key issues raised during an oral evidence session held with the UK Information Commissioner, Christopher Graham, and his two Deputy Commissioners, David Smith and Graham Smith.

article thumbnail

German DPAs Adopt Resolutions on Proposed U.S.–EU Free Trade Zone, Social Networks and EU Data Protection

Hunton Privacy

On March 14, 2013, the 85th Conference of the German Data Protection Commissioners concluded in Bremerhaven. This biannual conference provides a private forum for the 16 German state data protection authorities (“DPAs”) and the Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, to share their views on current issues, discuss relevant cases and adopt Resolutions aimed at harmonizing how data protection law is applied across Germany.

article thumbnail

Commerce Department to Host Data Privacy Seminar

Hunton Privacy

The U.S. Department of Commerce’s International Trade Administration (“ITA”) will host a data privacy seminar in Waltham, Massachusetts, on Monday, March 25 from 8:30 – 11:30 a.m. EST. Seminar participants will hear from a number of Commerce privacy experts who will discuss the Obama Administration’s privacy blueprint and provide updates on significant international developments involving the U.S.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK ICO Issues Guidance on BYOD for Organizations

Hunton Privacy

On March 7, 2013, the UK Information Commissioner’s Office (“ICO”) published guidance (the “Guidance”) on Bring Your Own Device (“BYOD”) to explain to data controllers “what they need to consider when permitting the use of personal devices to process personal data for which they are responsible.” BYOD refers to the use of individuals’ personal devices to access and store corporate information.

article thumbnail

Article 29 Working Party Opines on Mobile Apps

Hunton Privacy

On February 27, 2013, the Article 29 Working Party (the “Working Party”) adopted an Opinion (the “Opinion”) addressing personal data protection issues related to the development and use of applications on mobile devices. The Opinion identifies the key data protection risks associated with mobile apps and clarifies the legal framework and obligations applicable to the various parties involved in the development and distribution of mobile apps, including app stores, app developers, operating syste

article thumbnail

Costa Rica Imposes Five-Day Breach Notification Obligation and Other Stringent Data Protection Requirement

Hunton Privacy

On March 5, 2013, Costa Rica published the Reglamento a la Ley de Protección de la Persona Frente al Tratamiento de sus Datos Personales (Regulations of the Law of Protection of the Person in the Processing of His Personal Data) (the “Regulations”). The wide-ranging Regulations, which took effect immediately, expand and clarify many aspects of the underlying law and include the requirements described below.

article thumbnail

UK ICO Publishes Further Analysis of Commission’s Revised Data Protection Framework

Hunton Privacy

On February 12, 2013, the UK Information Commissioner’s Office published a further analysis of the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). This latest analysis supplements the initial analysis paper on the Proposed Regulation published on February 27, 2012. Although the general views expressed in its initial paper stand, the ICO has now provided greater detail regarding its views of the substantive provisions of the Proposed Regulation.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

LIBE Committee Debates Proposed EU General Data Protection Regulation

Hunton Privacy

On March 20, 2013, the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”) held legislative deliberations regarding the European Commission’s proposed General Data Protection Regulation (”Proposed Regulation”). The LIBE Committee Chair, Juan Fernando López Aguilar, noted that 2,783 amendments to the Proposed Regulation and 504 amendments to the proposed Police and Criminal Justice Directive (“Proposed Directive”) have been tabled.