April, 2015

article thumbnail

Integrations (and Metaservices) For The Win

John Battelle's Searchblog

'The post Integrations (and Metaservices) For The Win appeared first on John Battelle's Search Blog. A GeckoBoard sample dashboard, integrating half a dozen separate data services. What makes for a truly NewCo business? I’ve been giving this question a lot of thought the past six or so months, leading to posts like Maybe The Best Way To Change the World Is To Start a Company , Living Systems and The Information First Company , What Makes a NewCo , and posts on NewCos like MetroMile

article thumbnail

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose. The misunderstanding of which I speak: some people are under the impression that dynamic SQL statements issued by DDF-connected applications are zIIP-eligible whe

Access 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It's the data plan, stupid: The dark side of digital transformation

Collaboration 2.0

'Data costs are now central to the economics of both individuals and the companies they buy things from. Digital strategy has to understand customer mobile data costs and associated mobile back-end development goals and budgeting.

article thumbnail

Data Security Act Introduced in New York State Assembly

Hunton Privacy

On April 8, 2015, a New York Assemblyman introduced the Data Security Act in the New York State Assembly that would require New York businesses to implement and maintain information security safeguards. The requirements would apply to “private information,” which is defined as either: personal information consisting of any information in combination with one or more of the following data elements, when either the personal information or the data element is not encrypted: Social Security number;

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hearthstone 3d card viewer in pure javascript/css3

Elie

To celebrate the new Hearthstone extension, Blackrock Mountain, I’m releasing a Hearthstone 3D card viewer written in pure Javascript. I feel Blackrock Mountain’s release is the perfect opportunity to showcase HTML5’s top notch performance and inspire more people to do cool visualizations on the web. With well over 500 cards, it’s high time to create a tool with powerful filtering and attractive visualization to explore the cards in an interesting fashion that works both on desktops and tablets.

48

More Trending

article thumbnail

My Schedule For NewCo New York 2015

John Battelle's Searchblog

'The post My Schedule For NewCo New York 2015 appeared first on John Battelle's Search Blog. Have you ever been to a music festival, and found yourself overwhelmed by too many great choices? Look at Coachella , for example. There are six stages to chose from. On Friday, how are you supposed to pick between Alabama Shakes and Lykke Li? I love ‘em both.

article thumbnail

A DB2 11 for z/OS Temporal Data Enhancement You Might Have Missed

Robert's Db2

When DB2 10 for z/OS introduced temporal data functionality about five years ago, one of the first use cases that jumped to mind for many people was data-change auditing: a table could be created with (or an existing table altered to add) the "system time" characteristic, and thereafter one would have, in the history table associated with the base table, a record of row changes resulting from UPDATE and DELETE statements targeting the base table.

IT 48
article thumbnail

It's the data plan, stupid: The dark side of digital transformation

Collaboration 2.0

Data costs are now central to the economics of both individuals and the companies they buy things from. Digital strategy has to understand customer mobile data costs and associated mobile back-end development goals and budgeting.

article thumbnail

The International Conference of Data Protection and Privacy Commissioners Announces Its First Permanent Website

Hunton Privacy

The International Conference of Data Protection and Privacy Commissioners (the “Conference”) has launched a new permanent website. The new website fulfills the agreement made between Commissioners “to create a permanent website in particular as a common base for information and resources management” in the Montreux Declaration adopted in 2005. The Executive Committee Secretariat called the website a “one-stop-shop for permanent Conference documentation,” and will be a resource for members and th

Privacy 58
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Privacy Group Requests D.C. Circuit Review Regarding Lack of Privacy Rules in the FAA’s Proposed Drone Regulations

Hunton Privacy

On March 31, 2015, the Electronic Privacy Information Center (“EPIC”) filed a petition (the “Petition”) with the U.S. Court of Appeals for the District of Columbia Circuit accusing the Department of Transportation’s Federal Aviation Administration (“FAA”) of unlawfully failing to include privacy rules in the FAA’s proposed framework of regulations for unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 49
article thumbnail

Washington State Senate Approves Amendment to Data Breach Notification Law

Hunton Privacy

On April 13, 2015, the Senate of Washington State unanimously passed legislation strengthening the state’s data breach law. The bill (HB 1078) passed the Senate by a 47-0 vote, and as we previously reported , passed the House by a 97-0 vote. The bill includes the following amendments to Washington’s existing data breach notification law: Requires notification to the state attorney general in the event of a breach; imposes a 45-day deadline for notification to affected residents and the state att

article thumbnail

Canada Joins the APEC Cross-Border Privacy Rules System

Hunton Privacy

On April 15, 2015, the Asia-Pacific Economic Cooperation (“APEC”) Electronic Commerce Steering Group issued a press release announcing Canada’s participation in the APEC Cross-Border Privacy Rules (“CBPR”) System. The U.S. Department of Commerce’s International Trade Administration also released an official press statement. The Findings Report of the Joint Oversight Panel for the APEC CBPR system, which confirmed that Canada had met the conditions for participation, was released earlier on April

Privacy 45
article thumbnail

UK Court Ruling Allows Claims Against Google for Misuse of Private Information

Hunton Privacy

On March 27, 2015, the England and Wales Court of Appeal issued its judgment in Google Inc. v Vidal-Hall and Others. Google Inc. (“Google”) appealed an earlier decision by Tugendhat J. in the High Court in January 2014. The claimants were users of Apple’s Safari browser who argued that during certain months in 2011 and 2012, Google collected information about their browsing habits via cookies placed on their devices without their consent and in breach of Google’s privacy policy.

Privacy 45
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Sotto Named Among National Law Journal’s “Outstanding Women Lawyers”

Hunton Privacy

Hunton & Williams LLP announces Lisa J. Sotto , head of the firm’s Global Privacy and Cybersecurity practice and managing partner of the New York office, has been named to The National Law Journal’s “Outstanding Women Lawyers” list. The listing, composed of 75 of the most accomplished female lawyers today, includes women who have surpassed their peers based on their excellence in professional practice, development of new areas of law, leadership roles and influence.

Privacy 40
article thumbnail

HHS Reaches Settlement with Pharmacy Over Disposal Issues

Hunton Privacy

The Department of Health and Human Services (“HHS”) recently announced a resolution agreement and $125,000 settlement with Cornell Prescription Pharmacy (“Cornell”) in connection with the disposal of prescription records in an unsecured dumpster on Cornell’s premises. After receiving a report from a Denver television station regarding Cornell’s disposal practices, the HHS’ Office for Civil Rights (“OCR”) investigated Cornell and found several HIPAA Privacy Rule violations, including that Cornell

Privacy 40
article thumbnail

ICO Publishes Summary of Responses to its Big Data Report

Hunton Privacy

On April 10, 2015, the UK Information Commissioner’s Office (“ICO”) published a summary of the feedback received from its July 28, 2014 report on Big Data and Data Protection (the “Report”). The ICO plans to revise its Report in light of the feedback received on three key questions and re-issue the Report in the summer of 2015. Below are key highlights set forth in the summary, entitled Summary of feedback on Big Data and data protection and ICO response (“Summary of Feedback”).

article thumbnail

FTC Reaches Settlement in First Enforcement Action Against a Retail Tracking Company

Hunton Privacy

On April 23, 2015, the Federal Trade Commission (“FTC”) announced that Nomi Technologies (“Nomi”) has agreed to settle charges stemming from allegations that the company misled consumers with respect to their ability to opt out of the company’s mobile device tracking service at retail locations. The settlement marks the FTC’s first Section 5 enforcement action against a company that provides tracking services at retailers.

Retail 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

FCC Joins Asia Pacific Privacy Forum

Hunton Privacy

On April 15, 2015, the Federal Communications Commission (“FCC”) announced that it has joined the Asia Pacific Privacy Authorities (“APPA”), the principal forum for privacy authorities in the Asia-Pacific Region. APPA members meet twice a year to discuss recent developments, issues of common interest and cooperation. The FCC now joins the Federal Trade Commission as the U.S. representatives to APPA.

Privacy 40
article thumbnail

Streamlining onboard sales through a single, back-office solution

CGI

Streamlining onboard sales through a single, back-office solution. shobana.lv@cgi.com. Tue, 04/21/2015 - 06:30. In today’s highly competitive and fast changing travel industry, driving efficiencies and cost-effectiveness are critical to long-term survival. Retail is a prime area for achieving both objectives, and travel operators are seeking to invest in retail systems that streamline and improve processes while offering a shorter payback period and generating more revenue.

Sales 40
article thumbnail

French Data Protection Authority Unveils 2014 Annual Activity Report

Hunton Privacy

On April 16, 2015, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2014 (the “Report”) highlighting its main accomplishments in 2014 and outlining some of the topics it will consider further in 2015. The Report presents the results of the inspections conducted by the CNIL to assess compliance with its cookie law guidance issued in December 2013.

article thumbnail

American Chamber of Commerce in China Publishes Policy Spotlight Report on Protecting Data Flows between China and the U.S.

Hunton Privacy

On April 14, 2015, the American Chamber of Commerce in China (“AmCham”) published a report, entitled Protecting Data Flows in the US-China Bilateral Investment Treaty (the “Report”). The Report is part of AmCham’s Policy Spotlight Series. While in principle addressed to the U.S. and Chinese teams that are currently negotiating the Bilateral Investment Treaty, the Report has been made public.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

When Consumerisation and Cloud Services = Shadow IT

CGI

When Consumerisation and Cloud Services = Shadow IT. p.butler@cgi.com. Tue, 04/14/2015 - 05:33. We have all heard the term 'Consumerisation of IT'- the specific impact that consumer-orientated technologies can have on enterprises as they are adopted by end users, often bypassing an enterprises' IT department. This issue is not new, and generally started with the rise of the feature phone and smart phone as people started to use their own devices rather than the voice & text only devices issued b

Cloud 40
article thumbnail

FTC Announces Settlements with Debt Brokers Who Posted Consumers’ Information Online

Hunton Privacy

On April 13, 2015, the Federal Trade Commission announced that it has settled charges with two debt brokers who posted consumers’ unencrypted personal information on a public website. The settlements with Cornerstone and Company, LLC (“Cornerstone”), Bayview Solutions, LLC (“Bayview”), and the companies’ individual owners resulted from initial complaints about the debt brokers in 2014.

article thumbnail

UN Human Rights Council Establishes Special Rapporteur on the Right to Privacy

Hunton Privacy

On March 26, 2015 the United Nations Human Rights Council (the “Council”) announced that it will appoint a new position as special rapporteur on the right to privacy for a term of three years. The position, which is part of the Council’s resolution , is intended to reaffirm the right to privacy and the right to the protection of the law against any interference on a person’s privacy, family, home or correspondences, as set out in Article 12 of the Universal Declaration of Human Rights and Articl

Privacy 40
article thumbnail

FTC Proposes Settlement with Two Companies Over False Safe Harbor Certification Claims

Hunton Privacy

On April 7, 2015, the FTC announced proposed settlements with TES Franchising, LLC, an organization specializing in business coaching, and American International Mailing, Inc., an alternative mail transporting company, related to charges that the companies falsely claimed they were compliant with the U.S.-EU and U.S.-Swiss Safe Harbor Frameworks. The FTC’s complaints against TES Franchising and American International Mailing alleged that the companies’ websites indicated that their Safe Harbor c

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The perfect digital storm

CGI

The perfect digital storm. ravi.kumarv@cgi.com. Fri, 04/10/2015 - 05:36. I recently attended a Tech UK discussion forum, the subject was ‘Has technology created or destroyed jobs’, t he answer is, of course, both. Over time jobs have been created and jobs lost, where technology has replaced hands, but has created a whole new set of services, in particular for us as consumers.

article thumbnail

AT&T Enters into Largest Data Breach Settlement with FCC to Date

Hunton Privacy

On April 8, 2015, the Federal Communications Commission announced a $25 million settlement with AT&T Services, Inc. (“AT&T”) stemming from allegations that AT&T failed to protect the confidentiality of consumers’ personal information, resulting in data breaches at AT&T call centers in Mexico, Colombia and the Philippines. The breaches, which took place over 168 days from November 2013 to April 2014, involved unauthorized access to customers’ names, full or partial Social Security

article thumbnail

The Internet of Things (IoT) – Start small but start

CGI

The Internet of Things (IoT) – Start small but start. ravi.kumarv@cgi.com. Tue, 04/07/2015 - 04:00. In September 2014, Gartner’s Annual Big Data survey reported, “Looking only at those organizations that have invested in big data, 32% report having deployed, up from 25% in 2013(1). ” Equally worryingly there is a general rule of thumb within the industry that 80% of a BI project cost is in getting the data prepared.

IoT 40