2015

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me.

The Myth of Valley DoucheBaggery

John Battelle's Searchblog

The post The Myth of Valley DoucheBaggery appeared first on John Battelle's Search Blog. Warning, loads of unabashed cursing ahead). Everyone’s definition of what makes a person or a company “douchey” varies, but we all know ’em when we see them.

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck."

Community Channel’s Natalie Tran on Password Policy

Roger's Information Security

The post Community Channel’s Natalie Tran on Password Policy appeared first on Roger's Information Security Blog. General Passwords

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Living and learning with a Yuneec Typhoon Q500 4k drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k

83

More Trending

We Need a New FUD

ShackF00

One of the most common questions I hear debated in infosec (usually rhetorical) is – “what will it take for management to realize how important security is?”

Secure Your Computer and Avoid Pop-up Scams

JKevinParker

If you get a pop-up while surfing the Web that claims you have a virus or a trojan horse or other security issue, don't believe it, don't call the number, and don't click any links or even their "OK" button. Just close your browser (and all open programs) and run your computer's security scan.

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

In praise of David Smith

Data Protector

As Deputy Commissioner David Smith completes his last lap of the data protection conference circuit, various speakers are extending their hastily-prepared remarks to include a short homily on his contribution to data protection over the decades. Yes, he really has been at the ICO for decades.

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. John Battelle (@johnbattelle) August 7, 2015.

Tips 114

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose.

Blog 70

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

NIST Releases Final Report on De-Identification of Personal Information

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) recently released the final draft of its report entitled De-Identification of Personal Information. The report stems from a review conducted by NIST of various de-identification techniques for removal of personal information from computerized documents.

Living and learning with a Yuneec Typhoon Q500 drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k. Reviews

83

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

Do CISOs Dream of Electric Boardrooms?

ShackF00

This, believe it or not, is a “year end” post above all, with food for thought going into 2016. So here goes. CISOs are an in-demand bunch. Well, that’s what the media tells us, anyway.

Tips 57

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did!

ECM 52

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ?

Sales 52

“Honing in on the Relevant Stuff” | Jinfo (formerly FreePint) Reviews Attensa

Attensa

Dale Moore is a UK-based content specialist and contributing author at Jinfo. Jinfo research is at the heart of the business information industry. Every day they work with information pros who are reimagining information services. Their focus is on aligning information services with corporate strategy and initiatives. The following is a summary of Dale’s comprehensive review of Attensa.

Information Governance in 2020

Positively RIM

Gentle readers: My thoughts on this subject were just published in the Fall issue of The Ethical Boardroom. Here is a link: [link] As always, your feedback, kudos, and brickbats are welcome. Thanks for your interest, Gordy

Not a lot of news from Big Brother Watch today

Data Protector

What are we to make of today’s Big Brother Watch report which claims that local authorities commit 4 data breaches every day? In the words of TV magician Paul Daniels: “Not a lot.” At first glance, it looks impressive. It’s almost 200 pages long.

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing.

Tips 114

Are You Using DB2 for z/OS Real-Time Statistics? DB2 Is

Robert's Db2

DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility.

Blog 65

Brazil Releases Revised Draft Privacy Bill

Hunton Privacy

In late October, the Brazilian Ministry of Justice (the “Ministry”) issued its revised Draft Bill for the Protection of Personal Data (“Draft Bill”). The Ministry released its preliminary draft in January 2015, and the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”) filed public comments to the draft on May 5, 2015.

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key. Enterprise Software

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

FOIA 44

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences.

Your Password Is 12345? Password FAIL

JKevinParker

It's hard to fathom why people don't get that 12345, 123456, and other similarly stupid passwords make their own information and their organization's info much less secure. But many people don't get it. Dark Helmet from SPACEBALLS warned you a long time ago: "12345?

A Eulogy for my Grandfather

Barclay T Blair

Over the holiday season while were visiting family in Alberta, Canada, my 92-year-old grandfather – who had been healthy and active his whole life – passed away. He went quickly and surrounded by his family, and I was honored to be there with my family and to participate in his funeral.

Information Sharing is the Grease in Workplace Collaboration

Attensa

We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.