Sat.Mar 25, 2017 - Fri.Mar 31, 2017

article thumbnail

Darwin’s advice to the energy sector: get agile!

CGI

Darwin’s advice to the energy sector: get agile! shobana.lv@cgi.com. Thu, 03/30/2017 - 07:00. What does Charles Darwin have to do with digital transformation in the energy sector? More than you might think. Darwin’s theory—that it isn’t the strongest of the species that survives, but the ones most responsive to change—can point the way for utilities to move faster toward a sustainable energy system.

article thumbnail

Aligning Wireless Networks with Compliance in Healthcare

Outpost24

In transmitting and storing critical patient data, wireless devices are integral to the response time (and often the resulting quality of care) offered by our healthcare systems. However, thanks largely in part to government acts like the. Health Insurance Portability and Accountability Act (HIPAA) (1) and. Health Information Technology for Economic and Clinical Health (HITECH) Act (2) have increasingly been prodding healthcare providers to adopt more and more technology in order to fully comply

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Running REORG to Reclaim Disk Space

Robert's Db2

Think of why you run the DB2 for z/OS REORG utility, and a number of reasons are likely to come quickly to mind: to restore row order per a table's clustering key; to reestablish free space (for inserts and/or for updates ); to remove the AREO* status set for a table space following (for example) an ALTER TABLE ADD COLUMN operation; or to materialize a pending DDL change such as an enlargement of a table space's DSSIZE.

article thumbnail

CNIL Unveils 2017 Inspection Program and 2016 Annual Activity Report

Hunton Privacy

On March 28, 2017, the French Data Protection Authority (“CNIL”) published its Annual Activity Report for 2016 (the “Report”) and released its annual inspection program for 2017. The Report presents the main accomplishments in 2016 and highlights the diversified activity at both the national and EU level with the adoption of two major pieces of legislation, namely: The EU General Data Protection Regulation (“GDPR”), which imposes new accountability obligations, including the obligation to (1) k

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

InfoGov Links Of The Week 03-31-2017

Information is Currency

AIIM 2017 State of Information Management. For purposes of context for our survey, we positioned digital transformation as the concept of being paperless, using multi-channel inbound capture, and the impact digital transformation will have on individuals, business organizations, and operational processes. What we found is that there is progressive movement, albeit not the hockey stick inclination everyone hopes for, but movement nonetheless.

ECM 40

More Trending

article thumbnail

Four things to look for in a multi-source services integrator (MSI)

CGI

Four things to look for in a multi-source services integrator (MSI). shobana.lv@cgi.com. Tue, 03/28/2017 - 07:00. Many organizations are embracing agile, hybrid IT strategies to enable faster, easier ways to deploy digital technologies and achieve digital transformation. Such hybrid approaches of both cloud and legacy assets often involve a diverse, multi-supplier ecosystem.

article thumbnail

Managing Privacy and Data Security Risks in M&A Transactions

Hunton Privacy

On April 5, 2017, Hunton & Williams LLP and Stroz Friedberg will host a webinar on managing privacy and data security risks before, during and after an M&A transaction. Join Lisa J. Sotto , partner and chair of Global Privacy and Cybersecurity at Hunton & Williams; Rocco Grillo, Cyber Resilience Global Leader from Stroz Friedberg; and Keith O’Sullivan, CISO from Time Inc., for a discussion on how to prepare for and understand privacy and data security challenges in the context of cor

Privacy 40
article thumbnail

CMSWire Article: Why You Need a Unified Information Strategy

JKevinParker

Today my first CMSWire article was published: Why You Need a Unified Information Strategy. Information is one of the most important business assets, yet organizations continue to struggle with growing information chaos. Even with continuing advances in technology, buying more tech is not solving the problem. Yes, technology is part of the solution, but to get it right, you must get your information strategy right.

IT 40
article thumbnail

Black box discovery of memory corruption RCE on box.com

Scary Beasts Security

Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Post-truth surprises

MIKE 2.0

Unexpected election results around the world have given the media the chance to talk about their favourite topic: themselves! With their experience running polls, the media are very good at predicting the winner out of two established parties or candidates but are periodically blindsided by outsiders or choices that break with convention. In most cases, there were plenty of warnings but it takes hindsight to make experts of us all.

article thumbnail

Intelligent Information Management and AIIM17

JKevinParker

Read my reflections on the 2017 AIIM Conference on LinkedIn Pulse: Intelligent Information Management and AIIM17. In that post, I also link to others' reflections on AIIM17.