June, 2013

article thumbnail

Excellent Content Marketing: Dear NSA…

John Battelle's Searchblog

'The post Excellent Content Marketing: Dear NSA… appeared first on John Battelle's Search Blog. This short Slideshare deck , an extremely clever satire of the now infamous NSA slide deck , should be Slideshare’s marketing calling card. Echoes of the Tide and Oreo executions that are getting such plaudits recently. Love it. Dear NSA, let me take care of your slides. from Emiland.

Marketing 110
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Does technology-led social innovation in Australia have to be blue-sky?

ChiefTech

'I''ll get to the point of this blog post in a moment… but first: I blogged about FutureGov''s Australian Patchwork pilot back in March. This is a recording of FutureGov''s Dominic Campbell presenting at a "BlueSky" session hosted by The Australian Centre for Social Innovation (TACSI): TACSI - BlueSky FutureGov from TACSI on Vimeo. Its well worth listening to the whole ~40 minutes of Dominic''s presentation.

article thumbnail

DB2 for z/OS Business Analytics: Moving the Queries to the Data

Robert's Db2

In the world of business, data has become the coin of the realm. Organizations that effectively leverage their informational assets tend to outperform peers and rivals. Given the value of data in today's marketplace, it's no wonder that companies are keenly focused on data security and availability, and on data delivery mechanisms that will keep pace with business growth.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hunton and Williams Hosts Cornell University’s Privacy and Data Security Symposium

Hunton Privacy

On June 18, 2013, the New York office of Hunton & Williams LLP office hosted Cornell University’s Privacy and Data Security Symposium, Privacy, Security & Your Data – Concerns in a Changing World. The program focused on global privacy and cybersecurity issues, including protecting the personal information of Internet users, balancing user privacy with law enforcement concerns, and implementing responsible data stewardship and governance.

Privacy 40

More Trending

article thumbnail

Hasta La Alta Vista, Baby.

John Battelle's Searchblog

'The post Hasta La Alta Vista, Baby. appeared first on John Battelle's Search Blog. I just saw the news that Yahoo! is “sunsetting” Alta Vista , one of the first “good” search engines. This makes me a little misty, as Alta Vista was the search engine I used BG – Before Google – and it had a real shot at *being* Google, had its various owners not utterly screwed it up over the years.

IT 109
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

article thumbnail

Social innovation with purposeful mobile apps

ChiefTech

'Yes, yes, I know this is just marketing. But even so, its nice to see social innovation enabled by mobile apps being highlighted. This 10 minute video highlights the following apps: Skyscape - a clinical decision-support tool. galileo - a clinical app, for amputees. Thornton Media - apps to help save endangered North American indigenous languages. It interesting to consider these examples in the light of the just released Australian Federal government''s mobile roadmap (PDF).

article thumbnail

DB2 10 for z/OS and Enterprise Identity Mapping

Robert's Db2

You've probably seen this type of commercial many times on television: a frazzled individual vents his or her frustration over the difficulty of accomplishing some task, and finally cries out, "There must be a better way!" At which point the announcer chimes in, with a smooth and confident voice, "There is!" And then you get the product pitch (and it all concludes with the smiling, nodding approval of the formerly rattled, now happy-in-accomplishment user of the promoted product or service).

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

German DPA Assesses Data Protection Compliance of Adobe Analytics

Hunton Privacy

The Bavarian data protection authority recently updated its compliance initiative regarding online tracking tools to include Adobe’s online tracking product ( Adobe Analytics (Omniture) ). As with previous initiatives of this nature , the underlying analyses were carried out in an automated manner, using a program specifically developed by the Bavarian data protection authority to verify compliance.

article thumbnail

IRMS 2013 – Brighton – Thanks

Preservica

Thanks to all those who made IRMS 2013 such a great event, to those who dropped by the stand and everyone who participated in our survey. Reading the survey responses I was really struck by the diversity of retention schedules being managed and the challenge of archival records in operational systems. Clearly there is no one size fits all for keeping records.

article thumbnail

The Book Lives On

John Battelle's Searchblog

'The post The Book Lives On appeared first on John Battelle's Search Blog. Faithful readers will recall that about three months ago, I announced my return to FM as CEO. I also mentioned that the projects I’d been working on – notably OpenCo and The Book , would have to be retooled given my new commitment to the company I started back in 2005 (when I last wrote a book).

Mining 102
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Cloud 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

HHS Publishes Technical Corrections to January 25, 2013, HIPAA Privacy, Security, and Enforcement Rules

HIPAA

June 7, 2013. Today, HHS published in the Federal Register “ Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules ” that were published on January 25, 2013, as the Final Rule: “ Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.” Acc

Privacy 28
article thumbnail

Mary’s Annual Internet Trends

John Battelle's Searchblog

'The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog. Waaay back in the late 1990s, I started a conference called the Internet Summit. My co-producers were Bill Gurley, who remains one of the giants in venture over at Benchmark, and Mary Meeker, who was at that point the best analyst in the Internet space, at Morgan Stanley.

IT 100
article thumbnail

Bojana Bellamy to Assume Presidency of the Centre for Information Policy Leadership at Hunton and Williams LLP

Hunton Privacy

The Centre for Information Policy Leadership at Hunton & Williams LLP is pleased to announce that Bojana Bellamy, global director of data privacy for Accenture, will be joining the firm as president of the Centre, effective September 2, 2013. Current Centre President, Marty Abrams, who is retiring on September 1, will stay on as an advisor to the Centre.

article thumbnail

Belgian Privacy Commission’s New Guidance on Information Security

Hunton Privacy

In recent months, the Belgian media has reported on a significant increase in data breaches. In December 2012, the National Belgian Railway Company inadvertently published 1.46 million sets of customer data online. The rise in data security incidents has caught the attention of the Belgian Privacy Commission, which has the authority to make recommendations on any matter relating to the application of the fundamental data protection principles in the Belgian Data Protection Act of December 8, 199

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

European Commission Issues Technical Implementing Measures for Data Breach Notification by Telecom Operators and ISPs

Hunton Privacy

On June 24, 2013, the European Commission announced new technical implementing measures that address the EU data breach notification requirement for telecom operators and internet service providers (“ISPs”). Based on a Commission Regulation , these companies must: notify the competent national authority of the incident (or at least provide an initial description thereof) within 24 hours after detection of the breach; outline which data are affected and what measures have been or will be taken by

article thumbnail

Hunton and Williams LLP Global Privacy and Cybersecurity Practice Top Ranked in Legal 500 United States, EMEA Guides

Hunton Privacy

Hunton & Williams LLP proudly announces that the firm’s global Privacy and Cybersecurity practice was top-ranked in both The Legal 500 United States and EMEA 2013 guides. This is the fourth consecutive year that the practice has been listed in “Tier 1” by The Legal 500 United States. “We are very pleased that our global Privacy and Cybersecurity practice has maintained its position as one of the top practices in the world,” said firm Managing Partner Wally Martinez.

Privacy 40
article thumbnail

PLI Cybersecurity Program on July 1, 2013

Hunton Privacy

On July 1, 2013, Practising Law Institute (“PLI”) hosts its first symposium on Cybersecurity 2013: Managing the Risk in New York. Hunton & Williams partner Lisa J. Sotto is the Chair of the event. The program features timely cybersecurity topics, including the threat landscape, the legal environment (such as the Obama Administration’s Executive Order on Cybersecurity ), and how companies can manage cybersecurity incidents when they occur and seek to prevent cyber attacks before they occur.

article thumbnail

UK ICO Launches 2012/13 Annual Report

Hunton Privacy

On June 20, 2013, the UK Information Commissioner’s Office (“ICO”) launched its Annual Report and Financial Statements for 2012/13 (the “Report”). Introducing the Report , Information Commissioner Christopher Graham strongly emphasized that, as consumers become increasingly aware of their information rights, good privacy practices will become a commercial benefit and a business differentiator.

FOIA 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

European Data Protection Supervisor Issues Opinion on EU Cybersecurity Strategy

Hunton Privacy

On June 14, 2013, the European Data Protection Supervisor (the “EDPS”) issued an Opinion regarding a joint communication by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, Cyber Security Strategy of the European Union: an Open, Safe and Secure Cyberspace (the “Strategy”), as well as the European Commission’s proposed draft directive to ensure uniformly high security measures for network and information security across the EU (the “NIS Dir

article thumbnail

Texas Enacts Law Requiring Warrants to Search Emails

Hunton Privacy

On June 14, 2013, Texas Governor Rick Perry signed a bill requiring law enforcement agencies to obtain warrants before accessing customer electronic data held by email service providers. Introduced on March 4, 2013, the bill passed unanimously in both the Texas House and Senate on May 7 and May 22, respectively. The law takes effect immediately. The law amends the Texas Code of Criminal Procedure to require a warrant for the search and seizure of electronic customer data held in electronic stora

article thumbnail

Jessica Rich Named FTC Director of Consumer Protection

Hunton Privacy

On June 17, 2013, the Federal Trade Commission announced that FTC Chair Edith Ramirez has appointed Jessica Rich as Director of the Bureau of Consumer Protection. Rich has served in several leadership roles in the FTC’s Bureau of Consumer Protection during her 20-year tenure with the agency. Most recently, she served as Associate Director of the Division of Financial Practices.

Privacy 40
article thumbnail

HHS Settles with Shasta Regional Medical Center

Hunton Privacy

On June 13, 2013, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $275,000 settlement with Shasta Regional Medical Center (“Shasta”) that pertained to impermissible disclosures of protected health information (“PHI”) by Shasta officials to the media, as well as to Shasta’s entire workforce. In late 2011, Shasta officials disclosed detailed information about a patient’s medical treatment to three separate media outlets without the patient’s authorization.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Massive Online Data Collection Class Action Lawsuit Moves Forward

Hunton Privacy

On June 11, 2013, the United States Court of Appeals for the Seventh Circuit denied software maker comScore, Inc.’s petition to appeal class certification in a litigation related to comScore software that allegedly collected extensive data from consumers’ computers without authorization. The plaintiffs alleged that comScore (an online analytics company) gathered data from consumers’ computers through software that it bundled with third-party software, such as free screensavers, games, music-copy

article thumbnail

The Consideration of Arrest and Conviction Records in Employment Decisions: A Critique of the EEOC Guidance

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : In an article to be published this month in the Seton Hall University Law Review , Hunton & Williams partners Terry Connor and Kevin White question whether the Equal Employment Opportunity Commission (“EEOC”) had the statutory authority to publish its April 2012 Guidance interpreting Title VII to impose disparate impact liability on employers who consider applicants’ criminal backgrounds as part of the hiring process.

Retail 40
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Cloud 40