Sat.Oct 05, 2013 - Fri.Oct 11, 2013

article thumbnail

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team

article thumbnail

DB2 for z/OS: Something You Might Not Know About Character String Literal Values

Robert's Db2

Here's something I imagine a lot of you (or programs written by you) do all the time: issue DB2 for z/OS-accessing SQL statements that contain character string literal values. Below is a query that I issued from Data Studio earlier today, targeting a table that I'd created on one of our test DB2 subsystems: SELECT PRODUCT_ID, UNIT_SALES FROM PRODUCT_SALES WHERE PRODUCT_ID = 'A12345'; Now, a question for you: is that character string literal value, 'A12345', fixed-length or varying-length?

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. What do you need to know, where to start? (Reprinted from KME Internet Marketing - Northern Virginia and Loudoun Datacenter CoLocation Retail Providers – please send your updated contact information to us if we don’t already have it, for more i

IT 45
article thumbnail

Visualise your way to great business applications

CGI

Visualise your way to great business applications. ravi.kumarv@cgi.com. Fri, 10/11/2013 - 11:35. Last year I was running a series of requirements visualisation workshops at a major bank in South Africa. Right after my kick-off presentation, during the first coffee break, I was pulled aside by a technical architect at the bank who didn't look very happy.

Paper 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

else 10.7: A Dread Pirate Gives Up His Bitcoins

John Battelle's Searchblog

'The post else 10.7: A Dread Pirate Gives Up His Bitcoins appeared first on John Battelle's Search Blog. Anonymity on the web becomes increasingly fractious as Tor and Bitcoin come into question with recent headline-grabbing stories. A quick scan of this weekend’s NYTimes reveals three big articles on the novel ways our digital histories stay with us.

More Trending

article thumbnail

Dentists: Don’t Forget HIPAA Compliance

HIPAA

Since the inception of HIPAA in 1996, its broad implications have affected all areas of health care including dentistry. And, if asked, most dentists and their staff would say they know what the HIPAA regulations are, and yes, they have been trained, but are they really up to date with HIPAA’s ever expanding changes and compliance requirements? Are they trained in the areas of HIPAA Security, Privacy, Enforcement and Breach Notification Rules and do they know that they must be in compliance wit

article thumbnail

Scope and Specification: An IT Strategy War Story

CGI

Scope and Specification: An IT Strategy War Story. ravi.kumarv@cgi.com. Wed, 10/09/2013 - 07:20. Back in 2011 a colleague of mine won an "IT strategy" consulting engagement with a major UK company. He built a small, capable team, and hit the ground running. Being a seasoned consultant he was acutely aware that project scope must be managed carefully if he was to avoid the dreaded “scope creep”.

IT 40
article thumbnail

German DPAs Address a Wide Range of Topics at Annual Conference and Adopt Resolutions

Hunton Privacy

On October 2, 2013, the 86th Conference of the German Data Protection Commissioners concluded in Bremen. This biannual conference provides a private forum for the 16 German state data protection authorities (“DPAs”) and the Federal Commissioner for Data Protection and Freedom of Information, Peter Schaar, to share their views on current issues, discuss relevant cases and adopt Resolutions aimed at harmonizing how data protection law is applied across Germany.

article thumbnail

Belgium Transposes Data Retention Directive

Hunton Privacy

On October 8, 2013, a Royal Decree was published completing the transposition of the EU Data Retention Directive 2006/24/EC (the “Data Retention Directive”) into Belgian law. The Royal Decree was adopted on September 19, 2013. The Data Retention Directive had already been partially implemented through amendments to the Electronic Communications Act of June 13, 2005.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Review of UK ICO Privacy Notices Code of Practice

Hunton Privacy

In its October 2013 e-newsletter, the UK Information Commissioner’s Office (“ICO”) announced that it is reviewing its Privacy Notices Code of Practice (the “Code”) to assess whether it should be updated. The Code, last updated in December 2010 and issued under Section 51 of the UK Data Protection Act 1998 (the “DPA”), is designed to assist organizations “to collect and use information appropriately by drafting clear and genuinely informative privacy notices.”.

Privacy 40
article thumbnail

Centre Reports on 35th International Conference of Data Protection and Privacy Commissioners

Hunton Privacy

On October 4, 2013, The Centre for Information Policy Leadership’s Senior Policy Advisor Fred Cate reported on the 35th International Conference of Data Protection and Privacy Commissioners which concluded on September 24 in Warsaw, Poland. The report indicates that four main issues dominated the Conference: (1) challenges presented by technologies such as mobile apps and online profiling, (2) multinational interoperability and enforcement, (3) pending EU data protection regulation and alternati

Privacy 40
article thumbnail

Dentists: Don’t Forget HIPAA Compliance

HIPAA

Since the inception of HIPAA in 1996, its broad implications have affected all areas of health care including dentistry. And, if asked, most dentists and their staff would say they know what the HIPAA regulations are, and yes, they have been trained, but are they really up to date with HIPAA’s ever expanding changes and compliance requirements? Are they trained in the areas of HIPAA Security, Privacy, Enforcement and Breach Notification Rules and do they know that they must be in compliance wit

article thumbnail

Dentists: Don’t Forget HIPAA Compliance

HIPAA

Since the inception of HIPAA in 1996, its broad implications have affected all areas of health care including dentistry. And, if asked, most dentists and their staff would say they know what the HIPAA regulations are, and yes, they have been trained, but are they really up to date with HIPAA’s ever expanding changes and compliance requirements? Are they trained in the areas of HIPAA Security, Privacy, Enforcement and Breach Notification Rules and do they know that they must be in compliance wit

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.