April, 2014

article thumbnail

Google+ Won (Or Why Google Never Needed A Social Network)

John Battelle's Searchblog

'The post Google+ Won (Or Why Google Never Needed A Social Network) appeared first on John Battelle's Search Blog. Since the news that Google+ chief Vic Gundotra has abruptly left the company , the common wisdom holds that Google’s oft-derided Facebook clone will not be long for this world. But whether or not Google+ continues as a standalone product isn’t the question.

Honeypots 111
article thumbnail

A Tiger Changes His Stripes: I LIKE Java on z/OS

Robert's Db2

I well remember a phone conversation, from about six or seven years ago, during which a friend of mine and I discussed an application project at his site which involved use of DB2 for z/OS stored procedures. Me: "In what language will the stored procedure programs be written?" My friend (sounding like someone whose favorite sports team had just lost the championship game): "Java.

Access 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You Saw It Here First: Information Governance Moves Beyond "Buzzword"

Positively RIM

Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.

article thumbnail

Calculate the Number of Connections Between Objects or People

JKevinParker

I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection. One way to calculate this for more than 2 objects is to add up all the whole numbers between 1 and (n-1) where n is the number of objects.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Meaning matters: why google switched to numeric captchas

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

More Trending

article thumbnail

What Is Google?

John Battelle's Searchblog

'The post What Is Google? appeared first on John Battelle's Search Blog. Every so often it’s fun to see what Google says about itself via its autocomplete function. For your enjoyment, a few choice images: The post What Is Google? appeared first on John Battelle's Search Blog.

IT 111
article thumbnail

DB2 for z/OS: the Importance of Historical Performance Data

Robert's Db2

Just within the past couple of weeks, I've received questions of a similar nature from two different DB2 for z/OS people. In each message, a DBA described a change that he had made in a production DB2 environment (in one case a size increase for several buffer pools, and in the other a change from an external stored procedure to a native SQL procedure).

article thumbnail

Chinese Postal Bureau Issues Personal Information Protection Rules

Hunton Privacy

In March 2014, the State Postal Bureau of the People’s Republic of China (the “SPBC”) formally issued three rules (the “Rules”) establishing significant requirements regarding the protection of personal information: (1) Provisions on the Management of the Security of Personal Information of Postal and Delivery Service Users (the “Security Provisions”); (2) Provisions on the Reporting and Handling of Security Information in the Postal Sector (the “Reporting and Handling Provisions”); and (3) Prov

article thumbnail

Clarification of Last Post

Positively RIM

Gentle Reader: A statement in my last post, the wrapup to the Executive Conference on Information Governance, deserves clarification. When I reported that, " ARMA scraped to send five people to Amelia Island," I was referring to ARMA staff members. The greater ARMA community was well-represented, with some 80 percent of attendees registering through ARMA's efforts.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Word Cloud: Information Chaos vs. Information Opportunity

JKevinParker

I created a Wordle word cloud of AIIM's eBook “Information Chaos V. Information Opportunity: THE information challenge for the next decade” Download this word cloud as a hi-res PDF These are the top 100 words in the paper. I replaced “IT” with “informationtechnology”, or else it would have been filtered out as a common word.

Cloud 40
article thumbnail

Why Information Sharing Precedes Open Data - Coffee Talk

Interactive Information Management

The Agency Deputy CIO (DCIO), Enterprise Architect (EA), IT System/Security Manager (ITSM) and the Open Data Community Evangelist (ODCE) – Over Cafeteria Coffee The DCIO & ITSM at a table, talking about the annual IT budget status. The ODCE drifts over, recognizes the ITSM from a recent agency newsletter. ODCE – "Can I sit here? I wanted to talk to you about opening up data, freeing it, from your system to my Github group.

article thumbnail

The Next Vegas Will Be A City That Lets You Truly Disappear – If Only For A While

John Battelle's Searchblog

'The post The Next Vegas Will Be A City That Lets You Truly Disappear – If Only For A While appeared first on John Battelle's Search Blog. ( image ) My daily reading took me to two places today – to Compton, California , well-known for its crime to anyone who grew up in LA (as I did), and to this NYT piece , which muses that the city, once the place we went to disappear, is likely to be the first place where anonymity is no longer guaranteed.

Marketing 100
article thumbnail

Europe under Review : Part 2 of 8 – Data Collection

Privacy and Cybersecurity Law

As the next in our series of “back to privacy basics”, we look the rules regarding collection and processing of […].

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

U.S. Court Rules Microsoft Must Release User Data Stored Overseas

Hunton Privacy

On April 25, 2014, a judge in the U.S. District Court for the Southern District of New York ruled that Microsoft must release user data to U.S. law enforcement when issued a search warrant, even if the data is stored outside of the U.S. The case stems from a search warrant seeking the contents of all emails, records and other information regarding one of Microsoft’s email users.

article thumbnail

In Retrospect: The First Executive Conference on Information Governance

Positively RIM

Last year, when leaders of ARMA International and The Sedona Conference discovered they were each planning conferences on Information Governance for this April, it was obvious they should combine their efforts, not compete. The result was the first Executive Conference on Information Governance, held April 14-15 at Amelia Island, Florida. Congratulations to ARMA and Sedona on a highly successful conference!

article thumbnail

Else 4.28.14: F*ck Policy, Except When I Care About The Outcome

John Battelle's Searchblog

'The post Else 4.28.14: F*ck Policy, Except When I Care About The Outcome appeared first on John Battelle's Search Blog. ( image ) This past week saw a significant increase in society’s willingness to have a deeper conversation about what it means to Become Data. The Supreme Court heard arguments in a case that may well supplant the Betamax case in import.

Mining 94
article thumbnail

Introducing #Climate

John Battelle's Searchblog

'The post Introducing #Climate appeared first on John Battelle's Search Blog. As many of you know, each year I write a set of predictions about the industry – this year, however, I had a bit of a hard time getting going. The reason? A persistent sense of “existential anxiety” around climate change. In Predictions 2014: A Difficult Year To See , I wrote: I’ve been mulling these predictions for months, yet one overwhelming storm cloud has been obscuring my otherwise consist

Cloud 92
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Else 4.7.14: So Much Information, Precious Little Insight

John Battelle's Searchblog

'The post Else 4.7.14: So Much Information, Precious Little Insight appeared first on John Battelle's Search Blog. Reading over my picks from the past week, I noticed a strong theme – we’re using more and more apps, creating more and more data, but we’re not setting the true value we might from connecting all the dots. Sure, the NSA is – and Facebook, Google, and other large platforms are as well.

article thumbnail

Else 4.21.14: It’s (Almost) All Google

John Battelle's Searchblog

'The post Else 4.21.14: It’s (Almost) All Google appeared first on John Battelle's Search Blog. Welcome back to Else – I took a week off for Spring break, so this covers two weeks of the best stories related to the work I’m doing on the book. Reflecting an increased focus on Google, this edition of Else is flush with Google news, from its purchase of Titan Aerospace to its unusual willingness to show us a peek behind the curtain of Google X.

article thumbnail

French Data Protection Authority Discloses Its 2014 Inspection Program

Hunton Privacy

On April 29, 2014, the French Data Protection Authority (“CNIL”) disclosed its annual inspections program, providing an overview of its inspections in 2013 and a list of the inspections it plans to conduct in 2014. Under French data protection law, the CNIL is authorized to collect any useful information in connection with its investigations and access data controllers’ electronic data and data processing programs.

IT 40
article thumbnail

HHS Settles Potential HIPAA Violations with Concentra Health Services and QCA Health Plan Inc.

Hunton Privacy

On April 23, 2014, the Department of Health and Human Services (“HHS”) announced settlements with two health care companies stemming from allegations of inadequate information security practices in the wake of investigations involving stolen laptop computers. Concentra Health Services (“Concentra”) and QCA Health Plan Inc. (“QCA”) will collectively pay nearly $2 million to settle the claims.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Tiao Discusses Utilities’ Concerns in Sharing Information with the Government

Hunton Privacy

On April 20, 2014, Hunton & Williams partner Paul M. Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. In the feature, “U.S. Utilities Wary of Sharing Grid Risks,” Tiao talked about the recent leak to The Wall Street Journal of a sensitive internal memo at the Federal Energy Regulatory Commission that revealed potential vulnerabilities in the electricity grid.

article thumbnail

Article 29 Working Party Issues Statement on One-Stop-Shop Within Proposed EU General Data Protection Regulation

Hunton Privacy

On April 16, 2014, the Article 29 Working Party (the “Working Party”) sent a letter (the “Letter”) to Lilian Mitrou, Chair of the Working Group on Information Exchange and Data Protection (the “DAPIX”) of the Council of the European Union, to support a compromise position on the one-stop-shop mechanism within the proposed EU General Data Protection Regulation (the “Proposed Regulation”).

Privacy 40
article thumbnail

Brazilian President Signs Internet Bill

Hunton Privacy

On April 23, 2014, Brazilian President Dilma Rousseff enacted the Marco Civil da Internet (“Marco Civil”), Brazil’s first set of Internet regulations. The Marco Civil was approved by the Brazilian Senate on April 22, 2014. President Rousseff signed the law at the NETMundial Internet Governance conference in São Paulo, a global multistakeholder event on the future of Internet governance.

article thumbnail

Article 29 Working Party Issues Guidance on the “Legitimate Interests” Ground in the EU Data Protection Directive

Hunton Privacy

On April 9, 2014, the Article 29 Working Party (the “Working Party”) issued an Opinion on using the “legitimate interests” ground listed in Article 7 of the EU Data Protection Directive 95/46/EC as the basis for lawful processing of personal data. Citing “legitimate interests” as a ground for data processing requires a balancing test, and it may be relied on only if (1) the data processing is necessary for the legitimate interests of the controller (or third parties), and (2) such interests are

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Kentucky Enacts Data Breach Notification Law

Hunton Privacy

On April 10, 2014, Kentucky Governor Steve Beshear signed into law a data breach notification statute requiring persons and entities conducting business in Kentucky to notify individuals whose personally identifiable information was compromised in certain circumstances. The law will take effect on July 14, 2014. Kentucky’s data breach notification law covers “personally identifiable information,” which is defined as an individual’s first name or first initial and last name in combination with an

article thumbnail

Article 29 Working Party Issues Opinion on Surveillance of Electronic Communications for Intelligence and National Security Purposes

Hunton Privacy

On April 10, 2014, the Article 29 Working Party (the “Working Party”) adopted Opinion 04/2014. The Opinion analyzes the implications of electronic surveillance programs on the right to privacy and provides several recommendations for protecting EU personal data in the surveillance context. Since the Snowden revelations began last year, the Working Party has been expected to release its official point of view on surveillance activities of intelligence services, both in the United States and in th

article thumbnail

Law and Technology Move Center Stage

Positively RIM

Day 2 of the first ARMA/Sedona Executive Conference on Information Governance turned toward technology and law. Tech featured the world of Big Data, while a mock trial and an exploration of IG in the public sector excited the legal eagles. RIM features, like The Principles, took backstage until brief appearances at the concluding “town hall” forum. Both presenters and attendees agreed: Big Data is ignored at one’s own peril, and it raises a multitude of questions and ethical dilemmas.