2015

article thumbnail

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me. And a (discrete) search will commence to find a suitable replacement for Chris Graham, soon-to-be outgoing Commissioner. How secret should this process be, and when is it appropriate to extend the selection process?

article thumbnail

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing. That statement seems self-evident to anyone involved in what I call the NewCo economy – work no longer has to be a duty, it can be a calling. For those blessed with the talent, education, connections, and skill to turn work into part of their self expression, work isn’t the thing you have to do so you can “have a lif

Education 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 101
article thumbnail

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck.

Access 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents. While de-identification techniques are widely used, there is concern that existing techniques are insufficient to protect personal privacy because certain remaining information can make

Privacy 75

More Trending

article thumbnail

What successful chief information security officers are doing right

CGI

What successful chief information security officers are doing right. Anonymous. Mon, 12/21/2015 - 04:39. The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While mandates vary among organizations, the CISO’s role has evolved from being technology focused to one of a business enabler and risk manager.

article thumbnail

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did! So, this post is a very quick introduction to some of the value I see that AIIM offers. Please share it with anyone you think can benefit from AIIM Professional Membership.

ECM 64
article thumbnail

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Freedom of Expression and Privacy in Labour Disputes: Amendments to Alberta’s Personal Information Protection Act in Force

Privacy and Cybersecurity Law

Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look. Amendments set out in Bill 3, the […].

Privacy 52
article thumbnail

Do privacy laws prevent police forces from naming suspects?

Data Protector

I was asked this question at 6.15 am today. And, if I knew the answer, was I available for a BBC radio interview immediately after the 7.00 am news? No and Yes were my answers – so I subsequently had a chat with BBC Radio’s Adrian Goldberg. The question arose because the Birmingham Mail had asked West Midlands Police to disclose the names and images of ten suspects it had been hunting for at least a decade for crimes including rape and murder.

Privacy 136
article thumbnail

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. — John Battelle (@johnbattelle) August 7, 2015. Over and over again, the press and pundits are declaring the death of the “web we once knew.” And despite having solid proof to the contrary, I’ve always responded that the web will never die, th

IT 111
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose. The misunderstanding of which I speak: some people are under the impression that dynamic SQL statements issued by DDF-connected applications are zIIP-eligible whe

Access 81
article thumbnail

Brazil Releases Revised Draft Privacy Bill

Hunton Privacy

In late October, the Brazilian Ministry of Justice (the “Ministry”) issued its revised Draft Bill for the Protection of Personal Data (“Draft Bill”). The Ministry released its preliminary draft in January 2015, and the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”) filed public comments to the draft on May 5, 2015. Key changes to the new Draft Bill include: adding “legitimate interest” as a basis for processing non-sensitive personal information; adding a risk-bas

Privacy 69
article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

article thumbnail

Community Channel’s Natalie Tran on Password Policy

Roger's Information Security

The post Community Channel’s Natalie Tran on Password Policy appeared first on Roger's Information Security Blog.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Finally! A Way to Make SharePoint Useful

JKevinParker

On 8/26/2015, I was the featured speaker for an AIIM Webinar on SharePoint and how to make it useful. View the presentation recording at the AIIM site , or browse the slides below. Finally! A Way to Make SharePoint Useful from AIIM Webinar Description According to a recent AIIM survey, 37% of SharePoint users have failed to achieve their original expectations for the platform.

Cloud 45
article thumbnail

Improving road inspections and maintenance through mobile technology

CGI

Improving road inspections and maintenance through mobile technology. shobana.lv@cgi.com. Wed, 06/24/2015 - 08:00. Maintaining road infrastructures is highly complex, but also essential for the safety of travelers and economic progress. Roads are heavily used by both business and private travelers, making it difficult to close them for maintenance. Currently, many government transport agencies rely on road inspection techniques that are manual and time consuming.

Paper 45
article thumbnail

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

article thumbnail

EU close to doing a deal on Safe Harbor

Privacy and Cybersecurity Law

It has been reported today by the Reuters news agency that the European Commission is working with the US on […].

IT 52
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Drinker Biddle names Bennett Borden as Chief Data Scientist to lead the firm’s data analytics strategy

Barclay T Blair

What a pleasure and honor to work with Bennett. eDisclosure Information Project. There was a time when the roles of corporate professional advisers were sharply defined. Accountants did the sums, audited accounts and gave financial advice while lawyers dealt, largely reactively, with a well-compartmentalised class of problems which involved meeting legal obligations, securing proprietary rights and bringing or defending litigation claims; IP specialists and a range of others with specific skills

article thumbnail

Remember the Internet When Considering The Things

John Battelle's Searchblog

'The post Remember the Internet When Considering The Things appeared first on John Battelle's Search Blog. Last month I sat down with my old pal Jay Adelson (Digg, Revision 3, Equinix, SimpleGeo) who together with his partner Andy Smith is raising a new fund focused on the Internet of Things. Our goal was to get caught up – I’d tell him about my plans for NewCo , and they’d update me on Center Electric, the fund’s new name.

IoT 111
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'"The oldest and strongest emotion of mankind is fear, and the oldest and strongest kind of fear is fear of the unknown" HP Lovecraft.

101
101
article thumbnail

Are You Using DB2 for z/OS Real-Time Statistics? DB2 Is

Robert's Db2

DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility. Starting with DB2 Version 7 (around the 2000 time frame), DB2 could automatically and periodically (every 30 minutes, by default) write a variety of statistics about table spaces and ind

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Germany Adopts Law to Enable Class Actions for Data Protection Violations

Hunton Privacy

On December 17, 2015, the German Federal Diet ( Bundestag ) adopted a draft law introducing class action-like claims that will enable consumer protection associations to sue companies for violations of German data protection law. The law amends Germany’s Act on Actions for Injunctions to allow consumer protection associations to bring lawsuits against companies for improper use of consumer data in violation of German data protection law.

article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

Preservica celebrates independence!

Preservica

I am delighted to share the great news that today, Preservica has become an independent software business, backed and owned by our original shareholders, and run by the same team of experts who have successfully delivered our digital preservation software to a growing customer base. As we’ve grown and digital preservation has moved up the public and corporate agenda, Preservica have come to realise that we can best serve our customers by creating a corporate model more suitable for our specialis