Sat.Oct 24, 2015 - Fri.Oct 30, 2015

article thumbnail

Written First On Medium. Discuss.

John Battelle's Searchblog

The post Written First On Medium. Discuss. appeared first on John Battelle's Search Blog. Image Credit Arch Cape Inn. So I had a thought about the state of the publishing world, specifically that part of it that we’d call blogging(1). And it struck me. Why haven’t we made our own Medium? No, wait, that doesn’t quite sound right. Medium is awesome, and in fact I am writing this post in ( on ?!

article thumbnail

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents. While de-identification techniques are widely used, there is concern that existing techniques are insufficient to protect personal privacy because certain remaining information can make

Privacy 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did! So, this post is a very quick introduction to some of the value I see that AIIM offers. Please share it with anyone you think can benefit from AIIM Professional Membership.

ECM 64
article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cybersecurity: Actions to take for elected officials and agency heads

CGI

Cybersécurité – Mesures à prendre par les représentants élus et les dirigeants d’organismes gouvernementaux. Anonymous. Thu, 10/29/2015 - 07:39. Lorsque les représentants sont élus ou nommés, ils prêtent serment afin de confirmer leur volonté de bien remplir leurs fonctions. Ce serment consiste à jurer qu’ils feront « du mieux qu’ils pourront » pour représenter ceux qui les ont élus ou nommés, et ce, de manière « honorable et intègre ».

More Trending

article thumbnail

Finally! A Way to Make SharePoint Useful

JKevinParker

On 8/26/2015, I was the featured speaker for an AIIM Webinar on SharePoint and how to make it useful. View the presentation recording at the AIIM site , or browse the slides below. Finally! A Way to Make SharePoint Useful from AIIM Webinar Description According to a recent AIIM survey, 37% of SharePoint users have failed to achieve their original expectations for the platform.

Cloud 45
article thumbnail

Surviving the eye of the enterprise hype storm

Collaboration 2.0

At the height of conference season it can seem the hi-tech 'tail' is wagging the customer 'dog', despite increasingly sophisticated business needs. As some businesses transform to bring software in house to meet strategic needs, some hi-tech marketing rhetoric stretches reality and credibility.

article thumbnail

Security in the finance sector: Whose role is it anyway?

CGI

Security in the finance sector: Whose role is it anyway? Anonymous. Mon, 10/26/2015 - 01:33. Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased regulation isn’t just a temporary challenge for global financial institutions—it’s the new reality.”.

IT 40
article thumbnail

EU Commissioner Announces Further Guidance on the Impact of the Safe Harbor Ruling and an Agreement “In Principle” on a New Safe Harbor Framework

Hunton Privacy

On Monday, October 26, 2015, EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, gave a speech before the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) on the recent ruling by the Court of Justice of the European Union (the “CJEU”) that invalidated the European Commission’s Safe Harbor Decision.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Secure Your Computer and Avoid Pop-up Scams

JKevinParker

If you get a pop-up while surfing the Web that claims you have a virus or a trojan horse or other security issue, don't believe it, don't call the number, and don't click any links or even their "OK" button. Just close your browser (and all open programs) and run your computer's security scan. I just ran across a pop-up with a toll-free number and a message of doom and gloom in both text and audio, urging me to call their tech support line to get my computer fixed.

article thumbnail

DB2 for z/OS: DDF and Accounting Trace Records

Robert's Db2

I recently encountered a situation that served to illuminate a number of important aspects of application processing in the context of the DB2 for z/OS distributed data facility (DDF). I'll go through the scenario here, in hopes that you will find the information to be useful. A systems programmer contacted me about a problem his organization had run into with a new application that accesses DB2 for z/OS by way of a network connection (and so uses DDF).

Access 59
article thumbnail

Senate Passes Cybersecurity Information Sharing Act

Hunton Privacy

On October 27, 2015, the U.S. Senate passed S.754 – Cybersecurity Information Sharing Act of 2015 (“CISA”) by a vote of 74 to 21. CISA is intended to facilitate and encourage the sharing of Internet traffic information between and among companies and the federal government to prevent cyber attacks, by giving companies legal immunity from antitrust and privacy lawsuits.

article thumbnail

UK Deputy Information Commissioner on Safe Harbor: “Don’t Panic”

Hunton Privacy

On October 27, 2015, David Smith, the UK Deputy Commissioner of the Information Commissioner’s Office (“ICO”), published a blog post commenting on the ongoing Safe Harbor compliance debate in light of the Schrems v. Facebook decision of the Court of Justice of the European Union. His key message to organizations was, “Don’t panic.”. After engaging in a brief analysis of the implications of the decision, David Smith asked, “Where does this leave businesses that are using the Safe Harbor?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

German DPAs Issue Joint Position Paper on Alternatives to Safe Harbor

Hunton Privacy

On October 26, 2015, the German federal and state data protection authorities (the “German DPAs”) published a joint position paper on Safe Harbor and potential alternatives for transfers of data to the U.S. (the “Position Paper”). The Position Paper follows the Court of Justice of the European Union’s (the “CJEU’s”) ruling on Safe Harbor and contains 14 statements regarding the ruling, including the following key highlights: In light of the Safe Harbor Decision of the CJEU, the German DPAs call

Paper 40
article thumbnail

Federal Court: Attorney-Client Privilege and Work-Product Doctrine Upheld for Materials Associated with Internal Data Breach Investigation

Hunton Privacy

On October 23, 2015, the United States District Court for the District of Minnesota, in large part, upheld Target’s assertion of the attorney-client privilege and work-product protections for information associated with a privileged, internal investigation of Target’s 2013 data breach. The plaintiffs contended that the challenged information was not protected by the attorney-client privilege or the work-product doctrine because “Target would have had to investigate and fix the data breach regard