Sat.Feb 20, 2016 - Fri.Feb 26, 2016

article thumbnail

Statement-Level Control of DB2 for z/OS Query Parallelization

Robert's Db2

I'm writing about this now because of the increased interest I've seen, at various DB2 for z/OS sites, in using DB2 query parallelization as a means of boosting zIIP engine utilization when -- and this often happens during nighttime hours -- workloads that typically drive consumption of zIIP MIPS (e.g., DB2 DDF transactions, or Java programs running in WebSphere Application Server for z/OS) diminish.

article thumbnail

CJEU Hears Arguments Regarding Whether IP Addresses are Personal Data

Hunton Privacy

On February 25, 2016, the Court of Justice of the European Union (“CJEU”) heard arguments on two questions referred by the German Federal Court of Justice ( Bundesgerichtshof ). The first question was whether or not IP addresses constitute personal data and therefore cannot be stored beyond what is necessary to provide an Internet service. The German court referred the questions to the CJEU for a preliminary ruling in connection with a case that arose in 2008 when a German citizen challenged the

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Your Wireless Gadgets Vulnerable to Hacking?

Productivity Bytes

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in … + Read More.

article thumbnail

The whole is more than the sum of its parts

CGI

The whole is more than the sum of its parts. p.butler@cgi.com. Wed, 02/24/2016 - 23:31. We have all heard the famous quotation by Aristotle, which has been used in many other scenarios: from football teams performing better than what was expected from their collection of players, through to us as human beings. And I think the same applies to future cities and the Internet of Things (IoT). table.

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

President Obama Signs Judicial Redress Act into Law

Hunton Privacy

On February 24, 2016, President Obama signed the Judicial Redress Act (the “Act”) into law. The Act grants non-U.S. citizens certain rights, including a private right of action for alleged privacy violations that occur in the U.S. The Act was signed after Congress approved an amendment that limits the right to sue to only those citizens of countries which (1) permit the “transfer of personal data for commercial purposes” to the U.S., and (2) do not impose personal data transfer policies that “ma

More Trending

article thumbnail

14 steps to a digital business

CGI

14 steps to a digital business. ravi.kumarv@cgi.com. Tue, 02/23/2016 - 03:49. When Steve Jobs took over at Apple in 1997, one of his first decisions was to get rid of the Apple Museum in the foyer. He said he didn’t want to be in a company that was living in its past. He knew that the essence of Apple was vision and innovation, and he didn’t want the company’s future to be held back by the best thinking of its history.

article thumbnail

CNIL Issues Decision Regarding Data Processing for Litigation Purposes

Hunton Privacy

On February 19, 2016, the French Data Protection Authority (“CNIL”) made public its new Single Authorization Decision No. 46 (“Single Authorization AU-46”). This decision relates to the data processing activities of public and private organizations with respect to the preparation, exercise and follow-up regarding disciplinary or court actions, and the enforcement of those actions.