Sat.Jul 04, 2015 - Fri.Jul 10, 2015

article thumbnail

How Will You Use DB2 for z/OS Global Variables?

Robert's Db2

About seven years ago, in an entry posted to the blog I maintained while working as an independent DB2 consultant (prior to rejoining IBM), I wrote of the evolution of DB2 for z/OS SQL from merely a data manipulation language to a programming language. That evolution continues with DB2 Version 11, in part through the introduction in that DB2 release of global variable functionality.

article thumbnail

CIPL Urges Expansion of Privacy Toolkit Beyond Consent

Hunton Privacy

How do we focus on individuals and ensure meaningful control and the empowerment of individuals in the modern information age? What data privacy tools would drive empowerment in the digital world of today and tomorrow, perhaps more effectively and more nimbly than traditional individual consent? At a time when many countries are legislating or revising their data privacy laws and organizations are searching for best practices to embed in their business models, these questions are more relevant t

Privacy 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity: Futile or necessary investment?

CGI

Cybersecurity: Futile or necessary investment? ravi.kumarv@cgi.com. Fri, 07/10/2015 - 05:33. Last year when I bought a new car, I was looking for features like a backup camera, close-object sensors, running lights and a solid structure. Sure, the idea of trying new technologies was kind of appealing, but the truth is, all of these things were about security and safety.

article thumbnail

Everything you Always Wanted to Know About Capture

JKevinParker

On 7/8/2015, I was the featured speaker for an AIIM Webinar on Capture called "Everything you Always Wanted to Know About Capture into Process". View the presentation recording on the AIIM site , or browse the slide deck below. Everything you Always Wanted to Know About Capture into Process from AIIM Webinar Description Capture today is far more than scanning and mailroom automation; more than being a trigger for workflows and processes in the organization.

40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Article 29 Working Party Issues Opinion on Drones

Hunton Privacy

On June 16, 2015, the Article 29 Working Party (the “Working Party”) adopted an Opinion on Privacy and Data Protection Issues relating to the Utilization of Drones (“Opinion”). In the Opinion, the Working Party provides guidance on the application of data protection rules in the context of Remotely Piloted Aircraft Systems, commonly known as “drones.”.

More Trending

article thumbnail

Lisa Sotto Profiled in Crain’s New York Business on Breaches and Cyber Attacks

Hunton Privacy

On June 29, 2015, Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was profiled in a Crain’s New York Business article entitled Lawyer Goes Into the Breach. The feature highlights the Hunton & Williams privacy team and the tireless work they do for their clients. Here is an excerpt from the article: “Ms.

article thumbnail

Scottish Honor for Peter Hustinx

Hunton Privacy

Richard Thomas, former UK Information Commissioner and Global Strategy Advisor to the Centre for Information Policy Leadership , was invited to a unique event in Scotland last week. Peter Hustinx, who retired as the European Data Protection Supervisor at the end of 2014, was awarded the Honorary Degree of Doctor of Science in Social Science by the University of Edinburgh.

Privacy 40
article thumbnail

It can be inspirational to be inspiring

CGI

It can be inspirational to be inspiring. p.butler@cgi.com. Tue, 07/07/2015 - 06:17. As part of our Corporate Social Responsibility programme here at CGI, we use our experience as skilled IT professionals in our local communities to support and inspire the next generation. Aligned with this, CGI is a corporate patron of The Prince’s Trust whose phenomenal work provides practical and financial support to the young people who need it most by developing key skills, confidence and motivation. table

IT 40