Sat.Aug 24, 2013 - Fri.Aug 30, 2013

article thumbnail

Want to See How Detroit Is Coming Back?

John Battelle's Searchblog

'The post Want to See How Detroit Is Coming Back? appeared first on John Battelle's Search Blog. Tonight I checked into my hotel room in Chicago as part of my regular cadence of visiting FM’s offices around the country. I flipped on the TV and the local news featured a dismal report about Detroit’s suburbs. The copy of Time magazine I had in my bag, same thing: Detroit Goes Bust.

Marketing 111
article thumbnail

DB2 for z/OS: GETPAGEs are not ALWAYS the Key Determinant of SQL Statement CPU Time

Robert's Db2

In my DB2 for z/OS-related work over the past 25 years, I've done a lot in the way of performance analysis, looking at individual queries and at DB2-accessing application programs (both transactional and batch in nature). Time and time again, sometimes in reviewing trend data and sometimes in examining DB2 monitor output to gauge the impact of performance tuning actions, I've seen that the CPU time consumed in SQL statement execution rises or falls with the associated level of GETPAGE activity (

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

South Africa Passes Comprehensive Personal Data Protection Legislation

Hunton Privacy

As reported by Bloomberg BNA , the South African Parliament passed the Protection of Personal Information Bill on August 22, 2013. The bill, which was sent to President Jacob Zuma to be signed into law, represents South Africa’s first comprehensive data protection legislation. The Protection of Personal Information Bill sets forth several measures to protect personal data, including: Establishing an Information Protection Regulator with investigatory and enforcement powers.

article thumbnail

else 8.26: Getting a Little Too Comfortable with Technology

John Battelle's Searchblog

'The post else 8.26: Getting a Little Too Comfortable with Technology appeared first on John Battelle's Search Blog. This week in the else round up we explore the responsibilities of technology builders and designers, what it will take for 3D printers and autonomous vehicles to go mainstream, and how humans will always find ways to misuse technology.

Privacy 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FTC Files Complaint Against Medical Testing Lab for Exposing Consumers’ Personal Data

Hunton Privacy

On August 29, 2013, the FTC announced that it had filed a complaint against LabMD, Inc. (“LabMD”) for failing to protect consumers’ personal data. According to the complaint, LabMD, which performs various laboratory tests for consumers, exposed the personal information of more than 9,000 consumers on a peer-to-peer (“P2P”) file-sharing network. Specifically, a LabMD spreadsheet that was found on the P2P network contained names, Social Security numbers, dates of birth, health insurance informatio

More Trending

article thumbnail

Obama Administration Releases Draft Preliminary Cybersecurity Framework

Hunton Privacy

On August 28, 2013, the Obama Administration issued several documents relating to the Cybersecurity Framework that the President called for in Executive Order 13636: Improving Critical Infrastructure Cybersecurity. The documents include: Preliminary Cybersecurity Framework (Discussion Draft) ; Preliminary Cybersecurity Framework: Illustrative Examples (Discussion Draft) ; Message to Senior Executives on the Cybersecurity Framework (Discussion Draft) ; and.

article thumbnail

ICO Stresses Importance of Encryption for Data Security

Hunton Privacy

On August 28, 2013, on the UK Information Commissioner’s Office’s (“ICO’s”) blog, Simon Rice, Technology Group Manager for the ICO, discussed the importance of encryption as a data security measure. He stated that storing any personal information is “inherently risky” but encryption can be a “simple and effective means” to safeguard personal information and reduce the risk of security breaches.

article thumbnail

Hunton Launches Global Privacy Update Webcast Series

Hunton Privacy

As always, the privacy team at Hunton & Williams continues to closely monitor the latest global developments in data protection, privacy and cybersecurity, including progress on the proposed EU General Data Protection Regulation. To keep you informed, we will be hosting regular, 30-minute webcasts to provide brief updates on the most pressing issues.

Privacy 40
article thumbnail

Tiao Discusses Cyber Threats on CNBC

Hunton Privacy

On August 22, 2013, Hunton & Williams partner Paul M. Tiao was featured on CNBC’s Fast Money discussing NASDAQ’s recent crash. In the feature, “Are markets ready for cyber threats?”, Tiao talked about the steps the financial services industry has taken to protect against significant cybersecurity incidents, including “putting in best-of-breed information security policies” and “working across the industry to share information in a way that many other industries are not.”.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.