Sat.Mar 01, 2014 - Fri.Mar 07, 2014

article thumbnail

Else 3.3.14: Is The Internet A Utility?

John Battelle's Searchblog

'The post Else 3.3.14: Is The Internet A Utility? appeared first on John Battelle's Search Blog. The week was dominated by Google related stories, but the top dialog had to do with the Internet itself. I’m sensing something of a shift in society’s beliefs about the Internet’s central role in our humanity. Five years ago, no one wanted to talk about Internet access as a basic human right.

Privacy 96
article thumbnail

DB2 for z/OS SQL PL Routines: REBIND PACKAGE vs. ALTER REGENERATE

Robert's Db2

I have long been a big fan of DB2 for z/OS native SQL procedures, but I also recognized early on that putting this technology to use would require DB2 DBAs to learn some new things. Much of this newness has to do with the fact that for a native SQL procedure (and for its more recently arrived cousin, the "native" SQL scalar function , also known as a compiled SQL scalar function or a non-inline SQL scalar function), there is no external-to-DB2 executable -- no object module, no load module.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Article 29 Working Party Issues Opinion on BCR and APEC CBPR Requirements

Hunton Privacy

On March 6, 2014 the Article 29 Working Party (the “Working Party”) published a comprehensive Opinion: Opinion 02/2014 on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in the EU and Cross-Border Privacy Rules submitted to APEC CBPR Accountability Agents. This blog post provides an overview of the Opinion.

article thumbnail

Fixing Enterprise Wiki Page Titles and URLs in SharePoint 2013

JKevinParker

Enterprise Wiki pages in SharePoint 2013 (as with SharePoint 2010) are pretty easy pages for users to create and author. There are a few things that bug me and other standards advocates out there, chief of which (for me) are the title and file name problems. Problems with Enterprise Wiki Page Titles Create a new page called "My New Page" in an existing page by enclosing that title in double square brackets: This will create a dashed underlined link that, when clicked, will prompt the user to cre

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Importance of Policies

Privacy and Cybersecurity Law

A recent settlement with the US Department of Health and Human Services Office of Civil Rights (OCR) demonstrates the importance […].

More Trending

article thumbnail

U.S. FTC and UK ICO Sign Memorandum of Understanding

Hunton Privacy

On March 6, 2014, the U.S. Federal Trade Commission (“FTC”) and UK Information Commissioner’s Office (“ICO”) signed a memorandum of understanding (“MOU”) to promote increased cooperation and information sharing between the two enforcement agencies. The purpose of the MOU is to facilitate mutual assistance and the exchange of information in investigating and enforcing privacy violations.

Privacy 40
article thumbnail

French Data Protection Authority Issues New Guidelines on E-Commerce and Direct Marketing

Hunton Privacy

On March 5, 2014, the French Data Protection Authority (the “CNIL”) issued new guidelines in the form of five practical information sheets that address online purchases, direct marketing, contests and sweepstakes, and consumer tracking (the “Guidelines”). Online Purchases. In the context of online purchases , the Guidelines make clear that online merchants must limit their use of bank card numbers and visual cryptograms.

article thumbnail

2014 IAPP Global Privacy Summit

Hunton Privacy

Join us at the International Association of Privacy Professionals (“IAPP”) Global Privacy Summit in Washington, D.C., March 5-7, 2014. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Protecting Privacy under the Cybersecurity Microscope. Thursday, March 6, 10:45 a.m. Speakers include: Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice, Hunton & Williams LLP; Victoria King, Global Privacy Officer, United Parcel Se

Privacy 40
article thumbnail

UK ICO Publishes Updated Code of Practice on Privacy Impact Assessments

Hunton Privacy

On February 25, 2014, the UK Information Commissioner’s Office (“ICO”) published an updated code of practice on conducting privacy impact assessments (“PIAs”) (the “Code”). The updated Code takes into account the ICO’s consultation and research project on the conduct of PIAs, and reflects the increased use of PIAs in practice. Under the UK Data Protection Act 1998 (the “Act”), organizations are not subject to any statutory requirement to conduct PIAs.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Protection Regulation: back on track?

Privacy and Cybersecurity Law

The Council of the EU has been busy discussing the draft Regulation this week. There is a press release and […].

40