February, 2015

article thumbnail

Remember the Internet When Considering The Things

John Battelle's Searchblog

'The post Remember the Internet When Considering The Things appeared first on John Battelle's Search Blog. Last month I sat down with my old pal Jay Adelson (Digg, Revision 3, Equinix, SimpleGeo) who together with his partner Andy Smith is raising a new fund focused on the Internet of Things. Our goal was to get caught up – I’d tell him about my plans for NewCo , and they’d update me on Center Electric, the fund’s new name.

IoT 111
article thumbnail

Of DB2 Connect "Gateway" Servers and DB2 for z/OS DSNL030I Authentication Messages

Robert's Db2

A few days ago I received a note in which a DBA reported strange and inconsistent information in some DSNL030I messages that were generated periodically by a DB2 for z/OS subsystem in his charge. The messages in question were tied to authentication failures associated with DDF-using applications (i.e., applications that access DB2 via network connections).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

article thumbnail

Office of the Privacy Commissioner of Canada Releases Research Report on Privacy and Cybersecurity

Hunton Privacy

On February 12, 2015, the Office of the Privacy Commissioner of Canada released a research report entitled Privacy and Cyber Security – Emphasizing privacy protection in cyber security activities (the “Report”). The Report explores the interconnected relationship among cybersecurity, privacy and data protection, including common interests and challenges.

Privacy 45
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What happens when yesterday's digital natives are tomorrow's leaders?

CGI

What happens when yesterday's digital natives are tomorrow's leaders? p.butler@cgi.com. Thu, 02/26/2015 - 05:38. The term Digital Native was originally used by Marc Prensky in his seminal article, " Digital Natives , Digital Immigrants", where he applies the term digital native to a new group of students enrolling in educational establishments referring to the young generation as “native speakers” of the digital language of computers, and social media etc.

More Trending

article thumbnail

Maybe The Best Way To Change the World Is To Start a Company

John Battelle's Searchblog

'The post Maybe The Best Way To Change the World Is To Start a Company appeared first on John Battelle's Search Blog. ( image ) This piece from Smithsonian caught my eye today – Young People Mistrust Government So Much They Aren’t Running for Office. It covers a Rutgers professor who studies millennial attitudes towards politics, and concludes that the much-scrutinized generation abhors politics – logging a ten point decrease in sentiment toward government in just the past dec

article thumbnail

The New IBM z13 Mainframe: A DB2 for z/OS Perspective

Robert's Db2

Last month, IBM announced the z13 -- the latest generation of the mainframe computer. The z13 is chock full of great technical features, and there are already plenty of presentations, white papers, and "redbooks" in which you can find a large amount of related information. Going through all that information is an option, but you might be thinking, "I'm a DB2 for z/OS person.

article thumbnail

Snapshot: College and University Retention Schedules

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Shortly after joining Brandeis to establish a records program, and being new to RIM as it applies to academia, I realized that it might be a good idea to review retention schedules from other colleges and universities (CUs) as part of my research.

article thumbnail

Two Wyoming Bills Amending the State’s Breach Notification Statute Are Headed to the Governor

Hunton Privacy

On February 23, 2015, the Wyoming Senate approved a bill (S.F.36) that adds several data elements to the definition of “personal identifying information” in the state’s data breach notification statute. The amended definition will expand Wyoming’s breach notification law to cover certain online account access credentials, unique biometric data, health insurance information, medical information, birth and marriage certificates, certain shared secrets or security tokens used for authentication pur

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Finding diamonds in data

CGI

Finding diamonds in data. ravi.kumarv@cgi.com. Thu, 02/19/2015 - 23:24. The right data can help cure diseases, make streets safer, improve customer service and create cost savings. It can help win battles and win ball games. It seems there’s nothing we can’t do better with the right data, along with the tools and skills to analyze it. To explore the world of big data and analytics, CGI is launching this blog to talk about new applications where people are getting value from data.

article thumbnail

The Curious State of Information Governance at LegalTech: Contradictions Abound

Positively RIM

At the New York City LegalTech Feb. 3-6, Information Governance (IG) could be seen as an incidental tag line or a rising star. I say “incidental tag line” because many exhibitors added IG to their signage in a list of bulleted items. It was as if they wanted to be sure not to exclude someone because they didn't have a requisite buzz word.kind of like Burger King adding a vegetarian patty to their menu so a single herbivore in a group would not 86 the idea of going to Whopperland.

article thumbnail

Your Network Transcends Time – Care For It

John Battelle's Searchblog

'The post Your Network Transcends Time – Care For It appeared first on John Battelle's Search Blog. Every year around this year I fly to Arizona and attend the IAB Annual Meeting , a confab of 1000+ executives in the interactive media business. Yes, it’s a rubber-chicken boondoggle – what ballroom-based warm-climated event in February isn’t?

IT 101
article thumbnail

First Data gains approval for its Processor BCRs

Privacy and Cybersecurity Law

Dentons has advised First Data Corporation (“First Data“), a global leader in payment technology and service solutions, in successfully obtaining […].

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Recent Brooklyn Document Storage Warehouse Fire, and Many Other Tragedies, Point Out Why Digitizing Paper Documents Should Be Considered.

Shoreline Records Management

The massive fire last week in Brooklyn’s CitiStorage Document Storage warehouse was not the first time a document storage facility has been destroyed. To name a few, 1997 South Brunswick, NJ, USA, 2006 London, England, 2006 Ottawa, Canada, 2011 Aprilia, Italy, and 2014 Buenos Aires, Argentina. With 1.1 Million Cubic Feet of records potentially destroyed at CitiStorage, including that of legal firms, financial intuitions, medical practices and hospitals ( Mount Sinai Health System, New York-Presb

Paper 24
article thumbnail

Article 29 Working Party Reports on Cookie Sweep Results

Hunton Privacy

On February 3, 2015, the Article 29 Working Party (“Working Party”) published a report on a sweep of 478 websites across eight EU Member States (Czech Republic, Denmark, France, Greece, the Netherlands, Slovenia, Spain and the United Kingdom). The sweep was conducted to assess compliance with Article 5.3 of the e-Privacy Directive 2002/58/EC , as amended by 2009/136/EC.

Privacy 40
article thumbnail

Riding the IoT Hype Cycle

CGI

Riding the IoT Hype Cycle. Anonymous. Thu, 02/05/2015 - 07:08. As you may have seen from recent coverage, there is a huge amount of hype surrounding the Internet of Things (IoT). The July 2014 Gartner Hype Cycle for the Internet of Things states that ‘Overall, the IoT Hype Cycle is particularly light on the mature side of the Hype Cycle. This is fully expected, because it reflects the fact that many of the IoT technologies are in the early part of their life cycle and adoption’1.

IoT 40
article thumbnail

White House Sets Privacy Expectations for the Federal Government’s Use of Unmanned Aircraft Systems

Hunton Privacy

On February 15, 2015, the White House released a Presidential Memorandum entitled “ Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems ” (the “Memorandum”) to address the privacy, civil rights and civil liberties concerns associated with the federal government’s use of Unmanned Aircraft Systems (“UAS”).

Privacy 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

President Obama Signs Executive Order on Cybersecurity Information Sharing

Hunton Privacy

On February 13, 2015, at the White House’s Cybersecurity and Consumer Protection Summit at Stanford University, President Obama signed an executive order promoting private sector cybersecurity information sharing (“Executive Order”). Building on the current cybersecurity information sharing efforts of Information Sharing and Analysis Centers and groups such as the National Cyber-Forensics and Training Alliance, the new Executive Order emphasizes the need for private companies, non-profit organiz

article thumbnail

FTC Highlights Debt Collection and Data Protection Issues in Letter to CFPB

Hunton Privacy

On February 5, 2015, the Federal Trade Commission sent a letter to the Consumer Financial Protection Bureau (“CFPB”) summarizing the agency’s efforts in the debt collection arena in 2014. The letter is intended to assist the CFPB with preparing its annual report to Congress on the enforcement of the Fair Debt Collection Practices Act, which must be submitted pursuant to the Dodd-Frank Wall Street Reform and Consumer Protection Act.

article thumbnail

Article 29 Working Party Clarifies Scope of Health Data Processed by Lifestyle and Wellbeing Apps

Hunton Privacy

On February 5, 2015, the Article 29 Working Party (the “Working Party”) published a letter that responds to a request of the European Commission to clarify the scope of the definition of health data in connection with lifestyle and wellbeing apps. In the annex to this letter, the Working Party identifies criteria to determine when personal data qualifies as “health data,” a special category of data receiving enhanced protection under the EU Data Protection Directive 95/46/EC (the “Directive”).

article thumbnail

Brazil Releases Draft Personal Data Protection Bill

Hunton Privacy

On January 28, 2015, the Brazilian government issued the Preliminary Draft Bill for the Protection of Personal Data ( Anteprojeto de Lei para a Proteção de Dados Pessoais ) on a website specifically created for public debate on the draft bill. The text of the bill (in Portuguese) is available on the website. ([link]. The draft bill applies to individuals and companies that process personal data via automated means, provided that the (1) processing occurs in Brazil or (2) personal data was collec

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

SEC Releases Observations from Recent Cybersecurity Examinations of Broker-Dealers and Advisers

Hunton Privacy

On February 3, 2015, the Securities and Exchange Commission (“SEC”) released a Risk Alert , entitled Cybersecurity Examination Sweep Summary, summarizing observations from the recent round of cybersecurity examinations of registered broker-dealers and investment advisers under the Cybersecurity Examination Initiative. Conducted by the SEC Office of Compliance Inspections and Examinations (“OCIE”) from 2013 through April 2014, the examinations inspected the cybersecurity practices of 57 registere

article thumbnail

German Government Adopts Draft Law Regarding the Enforcement of Data Protection Law by Consumer Protection Associations

Hunton Privacy

On February 4, 2015, the German government adopted a draft law to improve the enforcement of data protection provisions that are focused on consumer protection. As reported earlier , the new law would bring about a fundamental change in how German data protection law is enforced. The draft law enables consumer protection organizations, trade associations and certain other associations to enforce cease-and desist letters and file interim injunctions in cases where companies violate the newly defi

article thumbnail

The Role of Risk Management in Data Protection – From Theory to Practice

Hunton Privacy

On February 12, 2015, the International Association of Privacy Professionals (“IAPP”) will host a web conference on The Role of Risk Management in Data Protection – From Theory to Practice. Panelists will include Bojana Bellamy , President of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”), Fred Cate , Senior Policy Advisor of CIPL, and Hilary Wandall, Associate Vice President, Compliance and Chief Privacy Officer of Merck & Co., Inc.

Risk 40
article thumbnail

Debate Over the Progress of the EU General Data Protection Regulation

Hunton Privacy

On January 20, 2015, a group of public officials and industry representatives met in a public discussion panel in Brussels to debate the progress of the proposed EU General Data Protection Regulation (the “ Proposed Regulation”) and the major themes that are yet to be resolved. The panelist included Paul Nemitz, Director for the Fundamental Rights and Union Citizenship of the European Commission, Jan Philipp Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties,

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

APEC Privacy Committee Meets to Discuss CBPR System and EU Cooperation

Hunton Privacy

From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. The Centre for Information Policy Leadership at Hunton & Williams participated as part of the U.S. delegation. The principal focus of the meetings was implementing the APEC Cross-Border Privacy Rules (“CBPR”) system, developing a corollary APEC recognition mechanism

Privacy 40