This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post Remember the Internet When Considering The Things appeared first on John Battelle's Search Blog. Last month I sat down with my old pal Jay Adelson (Digg, Revision 3, Equinix, SimpleGeo) who together with his partner Andy Smith is raising a new fund focused on the Internet of Things. Our goal was to get caught up – I’d tell him about my plans for NewCo , and they’d update me on Center Electric, the fund’s new name.
A few days ago I received a note in which a DBA reported strange and inconsistent information in some DSNL030I messages that were generated periodically by a DB2 for z/OS subsystem in his charge. The messages in question were tied to authentication failures associated with DDF-using applications (i.e., applications that access DB2 via network connections).
George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.
On February 12, 2015, the Office of the Privacy Commissioner of Canada released a research report entitled Privacy and Cyber Security – Emphasizing privacy protection in cyber security activities (the “Report”). The Report explores the interconnected relationship among cybersecurity, privacy and data protection, including common interests and challenges.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
What happens when yesterday's digital natives are tomorrow's leaders? p.butler@cgi.com. Thu, 02/26/2015 - 05:38. The term Digital Native was originally used by Marc Prensky in his seminal article, " Digital Natives , Digital Immigrants", where he applies the term digital native to a new group of students enrolling in educational establishments referring to the young generation as “native speakers” of the digital language of computers, and social media etc.
It’s easy to get lost in the LegalTech glitz. There are sumptuous breakfasts, hosted Happy Hours, and late night parties. On the show floor, there is flashy signage, free cappuccinos, beauteous bootblacks, and ingenious swag.* The conference sessions, despite a penchant for hyperbole, are where the rubber meets the road (to coin a phrase). At the very end of LegalTech New York, on Feb. 6, ARMA International delivered a three session track on Information Governance (IG).
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
It’s easy to get lost in the LegalTech glitz. There are sumptuous breakfasts, hosted Happy Hours, and late night parties. On the show floor, there is flashy signage, free cappuccinos, beauteous bootblacks, and ingenious swag.* The conference sessions, despite a penchant for hyperbole, are where the rubber meets the road (to coin a phrase). At the very end of LegalTech New York, on Feb. 6, ARMA International delivered a three session track on Information Governance (IG).
'The post Maybe The Best Way To Change the World Is To Start a Company appeared first on John Battelle's Search Blog. ( image ) This piece from Smithsonian caught my eye today – Young People Mistrust Government So Much They Aren’t Running for Office. It covers a Rutgers professor who studies millennial attitudes towards politics, and concludes that the much-scrutinized generation abhors politics – logging a ten point decrease in sentiment toward government in just the past dec
Last month, IBM announced the z13 -- the latest generation of the mainframe computer. The z13 is chock full of great technical features, and there are already plenty of presentations, white papers, and "redbooks" in which you can find a large amount of related information. Going through all that information is an option, but you might be thinking, "I'm a DB2 for z/OS person.
George Despres. University Records Manager, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Shortly after joining Brandeis to establish a records program, and being new to RIM as it applies to academia, I realized that it might be a good idea to review retention schedules from other colleges and universities (CUs) as part of my research.
On February 23, 2015, the Wyoming Senate approved a bill (S.F.36) that adds several data elements to the definition of “personal identifying information” in the state’s data breach notification statute. The amended definition will expand Wyoming’s breach notification law to cover certain online account access credentials, unique biometric data, health insurance information, medical information, birth and marriage certificates, certain shared secrets or security tokens used for authentication pur
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Finding diamonds in data. ravi.kumarv@cgi.com. Thu, 02/19/2015 - 23:24. The right data can help cure diseases, make streets safer, improve customer service and create cost savings. It can help win battles and win ball games. It seems there’s nothing we can’t do better with the right data, along with the tools and skills to analyze it. To explore the world of big data and analytics, CGI is launching this blog to talk about new applications where people are getting value from data.
At the New York City LegalTech Feb. 3-6, Information Governance (IG) could be seen as an incidental tag line or a rising star. I say “incidental tag line” because many exhibitors added IG to their signage in a list of bulleted items. It was as if they wanted to be sure not to exclude someone because they didn't have a requisite buzz word.kind of like Burger King adding a vegetarian patty to their menu so a single herbivore in a group would not 86 the idea of going to Whopperland.
'The post Your Network Transcends Time – Care For It appeared first on John Battelle's Search Blog. Every year around this year I fly to Arizona and attend the IAB Annual Meeting , a confab of 1000+ executives in the interactive media business. Yes, it’s a rubber-chicken boondoggle – what ballroom-based warm-climated event in February isn’t?
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
The massive fire last week in Brooklyn’s CitiStorage Document Storage warehouse was not the first time a document storage facility has been destroyed. To name a few, 1997 South Brunswick, NJ, USA, 2006 London, England, 2006 Ottawa, Canada, 2011 Aprilia, Italy, and 2014 Buenos Aires, Argentina. With 1.1 Million Cubic Feet of records potentially destroyed at CitiStorage, including that of legal firms, financial intuitions, medical practices and hospitals ( Mount Sinai Health System, New York-Presb
On February 3, 2015, the Article 29 Working Party (“Working Party”) published a report on a sweep of 478 websites across eight EU Member States (Czech Republic, Denmark, France, Greece, the Netherlands, Slovenia, Spain and the United Kingdom). The sweep was conducted to assess compliance with Article 5.3 of the e-Privacy Directive 2002/58/EC , as amended by 2009/136/EC.
Riding the IoT Hype Cycle. Anonymous. Thu, 02/05/2015 - 07:08. As you may have seen from recent coverage, there is a huge amount of hype surrounding the Internet of Things (IoT). The July 2014 Gartner Hype Cycle for the Internet of Things states that ‘Overall, the IoT Hype Cycle is particularly light on the mature side of the Hype Cycle. This is fully expected, because it reflects the fact that many of the IoT technologies are in the early part of their life cycle and adoption’1.
On February 15, 2015, the White House released a Presidential Memorandum entitled “ Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems ” (the “Memorandum”) to address the privacy, civil rights and civil liberties concerns associated with the federal government’s use of Unmanned Aircraft Systems (“UAS”).
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
On February 5, 2015, the Federal Trade Commission sent a letter to the Consumer Financial Protection Bureau (“CFPB”) summarizing the agency’s efforts in the debt collection arena in 2014. The letter is intended to assist the CFPB with preparing its annual report to Congress on the enforcement of the Fair Debt Collection Practices Act, which must be submitted pursuant to the Dodd-Frank Wall Street Reform and Consumer Protection Act.
On February 5, 2015, the Article 29 Working Party (the “Working Party”) published a letter that responds to a request of the European Commission to clarify the scope of the definition of health data in connection with lifestyle and wellbeing apps. In the annex to this letter, the Working Party identifies criteria to determine when personal data qualifies as “health data,” a special category of data receiving enhanced protection under the EU Data Protection Directive 95/46/EC (the “Directive”).
On January 28, 2015, the Brazilian government issued the Preliminary Draft Bill for the Protection of Personal Data ( Anteprojeto de Lei para a Proteção de Dados Pessoais ) on a website specifically created for public debate on the draft bill. The text of the bill (in Portuguese) is available on the website. ([link]. The draft bill applies to individuals and companies that process personal data via automated means, provided that the (1) processing occurs in Brazil or (2) personal data was collec
On February 3, 2015, the Securities and Exchange Commission (“SEC”) released a Risk Alert , entitled Cybersecurity Examination Sweep Summary, summarizing observations from the recent round of cybersecurity examinations of registered broker-dealers and investment advisers under the Cybersecurity Examination Initiative. Conducted by the SEC Office of Compliance Inspections and Examinations (“OCIE”) from 2013 through April 2014, the examinations inspected the cybersecurity practices of 57 registere
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On February 4, 2015, the German government adopted a draft law to improve the enforcement of data protection provisions that are focused on consumer protection. As reported earlier , the new law would bring about a fundamental change in how German data protection law is enforced. The draft law enables consumer protection organizations, trade associations and certain other associations to enforce cease-and desist letters and file interim injunctions in cases where companies violate the newly defi
On February 12, 2015, the International Association of Privacy Professionals (“IAPP”) will host a web conference on The Role of Risk Management in Data Protection – From Theory to Practice. Panelists will include Bojana Bellamy , President of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”), Fred Cate , Senior Policy Advisor of CIPL, and Hilary Wandall, Associate Vice President, Compliance and Chief Privacy Officer of Merck & Co., Inc.
From January 30 to February 3, 2015, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Subic Bay, Philippines, for another round of negotiations and meetings. The Centre for Information Policy Leadership at Hunton & Williams participated as part of the U.S. delegation. The principal focus of the meetings was implementing the APEC Cross-Border Privacy Rules (“CBPR”) system, developing a corollary APEC recognition mechanism
On January 20, 2015, a group of public officials and industry representatives met in a public discussion panel in Brussels to debate the progress of the proposed EU General Data Protection Regulation (the “ Proposed Regulation”) and the major themes that are yet to be resolved. The panelist included Paul Nemitz, Director for the Fundamental Rights and Union Citizenship of the European Commission, Jan Philipp Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties,
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On February 13, 2015, at the White House’s Cybersecurity and Consumer Protection Summit at Stanford University, President Obama signed an executive order promoting private sector cybersecurity information sharing (“Executive Order”). Building on the current cybersecurity information sharing efforts of Information Sharing and Analysis Centers and groups such as the National Cyber-Forensics and Training Alliance, the new Executive Order emphasizes the need for private companies, non-profit organiz
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content