Sat.Mar 26, 2016 - Fri.Apr 01, 2016

article thumbnail

Observations on DB2 for z/OS Address Space CPU Utilization

Robert's Db2

Have you ever looked at a DB2 Statistics Long report generated by your DB2 monitor? If so, you might have seen a section containing information about the CPU consumption of the various DB2 address spaces. It would look something like the example below, which reflects activity over a one-hour period of time (similar information might be available as well via an online display provided by your DB2 monitor).

IT 82
article thumbnail

Amended Tennessee Breach Notification Law Tightens Timing Requirement

Hunton Privacy

On March 24, 2016, Tennessee Governor Bill Haslam signed into law S.B. 2005 , as amended by Amendment No. 1 to S.B. 2005 (the “Bill”), which makes a number of changes to the state’s data breach notification statute, Tenn. Code § 47-18-2107. The amendments take effect on July 1, 2016. The Bill: Requires businesses and state agencies to notify affected individuals “immediately, but no later than 45 days from the discovery or notification of the breach, unless a longer period of time is required du

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Internet of Things (IoT) and its impacts on the stuff we use everyday

CGI

The Internet of Things (IoT) and its impacts on the stuff we use everyday. p.butler@cgi.com. Wed, 03/30/2016 - 05:16. ‘If you want to create a great product, just focus on one person. Make that one person have the most amazing experience ever’. Brian Chesky. There’s nothing worse than a poor product or service experience. We’ve all been there and know how frustrating it can be.

IoT 40
article thumbnail

CRTC enters into MOU with FTC on spam and unlawful telemarketing

Privacy and Cybersecurity Law

As we have noted in previous posts (here and here), the Canadian Radio-television and Telecommunications Commission (CRTC) has repeatedly highlighted its […].

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A (light hearted and) handy guide to privacy activists for the under 10s

Data Protector

Privacy activists in the olden days There weren’t many privacy activists in the olden days. This was because there was no Internet, and very few people had heard of the Data Protection Commissioner. As it was expensive to make a telephone call, and texts had not yet been invented, it was quite hard to spread rumours and exchange information with lots of people you didn’t know.

Privacy 120

More Trending

article thumbnail

NERC Report Highlights Lessons Learned from Ukraine Electric Utility Cyber Attack

Hunton Privacy

On March 18, 2016, a report was released by a joint team from the North American Electric Reliability Corporation’s Electricity Information Sharing Analysis Center and SANS Industrial Control Systems. According to the report, the cyber attack against a Ukrainian electric utility in December 2015 that caused 225,000 customers to lose power for several hours was based on months of undetected reconnaissance that gave the attackers a sophisticated understanding of the utility’s supervisory control a

Access 40
article thumbnail

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”). A public comment period on these drafts is now open.

article thumbnail

CNIL Launches Work on Compliance Pack Regarding Connected Vehicles

Hunton Privacy

On March 23, 2016, the Chairwoman of the French Data Protection Authority (“CNIL”) opened proceedings that will lead to the release of a compliance pack on connected vehicles. The CNIL announced that the compliance pack will contain guidelines regarding the responsible use of personal data for the next generation of vehicles. It will assist various stakeholders in the industry prepare for the General Data Protection Regulation.

article thumbnail

CIPL’s Bojana Bellamy Testifies on the EU-U.S. Privacy Shield to EU Parliament

Hunton Privacy

On March 17, 2016, Bojana Bellamy , President of the Centre for Information Policy Leadership (“CIPL”), participated on a panel of experts at a hearing in front of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) about the new EU-U.S. Privacy Shield for commercial transfers of EU personal data to the U.S.

Privacy 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.