December, 2013

article thumbnail

Apple+Topsy: It’s Not About Twitter (And Twitter Is Probably Cool With That)

John Battelle's Searchblog

'The post Apple+Topsy: It’s Not About Twitter (And Twitter Is Probably Cool With That) appeared first on John Battelle's Search Blog. I’m going out on a limb, but a fairly stout one: Like Azeem , I think Apple bought Topsy for its search chops. But Azeem, who I admire greatly, says Topsy could become the search engine “for iOS… to index both the social Web, but also the best bits of the Web that power Siri and Apple Maps, [and] reduce the reliance on Google and reduc

IT 110
article thumbnail

French Data Protection Authority Issues Guidance on Cookie Consent and Expiration

Hunton Privacy

On December 16, 2013, the French Data Protection Authority (“CNIL”) released a set of practical FAQs (plus technical tools and relevant source code) providing guidance on how to obtain consent for the use of cookies and similar technologies in compliance with EU and French data protection requirements (the “CNIL’s Guidance”). Article 5.3 of the revised e-Privacy Directive 2002/58/EC imposes an obligation to obtain prior consent before placing or accessing cookies and similar technologies on web

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Want to use High-Performance DBATs? Check your MAXDBAT Value

Robert's Db2

Of the features introduced with DB2 10 for z/OS, high-performance DBATs is one of my favorites. It enabled (finally) DDF-using applications to get the CPU efficiency benefit that comes from combining thread reuse with the RELEASE(DEALLOCATE) package bind option -- a performance tuning action that has long been leveraged for CICS-DB2 workloads. Implementing high-performance DBATs is pretty easy: in a DB2 10 (or 11) environment, when a package bound with RELEASE(DEALLOCATE) is executed by way of a

IT 48
article thumbnail

DC SEO 3.0 & Internet Marketing Top 10 2014 Tips for Local or Small Businesses

Interactive Information Management

At KME (a DC SEO Company and Digital Technology Agency ), we cover a lot of ground among client types, industry segments and technology services, with a heavy emphasis on area DC SEO business requirements for online, interactive marketing and advertising. As a local or regional small business near Washington DC, including Northern Virginia, Suburban and Southern Maryland, there's an almost bewildering array of online marketing services, tools, channels and opportunities to sift through - plenty

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Star Award: Employee of the Year

JKevinParker

I was honored by my current employer, T. White Parker (no relation), to be given their "Star Award" as employee of the year for 2013. This award is for "dedication and outstanding contribution". This firm has taught me a lot about management consulting and federal contracting. I feel I have taught them some things, also, about information management and technology.

More Trending

article thumbnail

Facebook Must Win The Grownup Vote

John Battelle's Searchblog

'The post Facebook Must Win The Grownup Vote appeared first on John Battelle's Search Blog. It’s all over the media these days: Facebook is no longer cool , Facebook has lost its edge with teenagers , Facebook is now establishment. Well duh. Teenagers aren’t loyal to much of anything, especially Internet stuff. Tonight I had four of them at my table, ranging in age from 15 to 17.

IT 103
article thumbnail

Recent Data Breach Events in China

Hunton Privacy

In recent months, the Chinese government has devoted attention to the protection of personal information with, as we previously reported , the promulgation of a number of new data protection regulations. This focus is also illustrated by recent actions related to crimes involving personal information. Gang Selling Personal Information Busted. Police apprehended a 10-member gang in Beijing and Shanghai for illegally obtaining and selling nearly one million pieces of personal information.

article thumbnail

DB2 for z/OS: Monitoring Prefetch Read Activity

Robert's Db2

Not long ago, a colleague sent to me some DB2 for z/OS buffer pool activity data that a DB2-using organization had sent to him. The DB2 people at this site were alarmed by some of the prefetch-related numbers in the data, and they had requested a review of the information. My analysis of the figures suggested that the system administrators were concerned by numbers that were in fact positive in nature; however, I also saw prefetch items that really were troublesome, and I subsequently learned th

article thumbnail

Meaningful Outcomes

CGI

Meaningful Outcomes. shobana.lv@cgi.com. Tue, 12/17/2013 - 05:45. It’s long been fashionable for us to knowingly advise each other to focus on outcomes. This is just common sense, so it’s hard to fault. But there’s an angle on outcomes which is usually overlooked. What constitutes an outcome to him, might not constitute one to her. It’s all down to our personal motivations.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

vtable protections: fast and thorough?

Scary Beasts Security

Recently, there's been a reasonable amount of activity in the vtable protection space. Most of it is compiler-based. For example, there's the GCC-based virtual table verification, aka. VTV. There are also multiple experiments based on clang / LLVM and of course MSVC's vtguard. In the non-compiler space, there's Blink's heap partitioning, enabled by PartitionAlloc.

IT 20
article thumbnail

Wave of recent Massachusetts ZIP code cases following change in law and California’s lead

Privacy and Cybersecurity Law

As anticipated, in the wake of the Supreme Judicial Court ruling on March 11, 2013, in Tyler v. Michaels Stores, […].

Privacy 40
article thumbnail

Traffic of Good Intent: We Beat Fraud By Working Together

John Battelle's Searchblog

'The post Traffic of Good Intent: We Beat Fraud By Working Together appeared first on John Battelle's Search Blog. Earlier this year I wrote a post titled It’s Time To Call Out Fraud In The Adtech Ecosystem. The overwhelming response to that riposte led to a lunch at this year’s IAB annual meeting, which then led to the formation of the Traffic of Good Intent task force (TOGI), an IAB-sanctioned working group composed of leaders from nearly every major player in the media and adtech

Paper 102
article thumbnail

State Post Bureau of China Releases Draft Normative Rules Involving Personal Information Protection for Public Comment

Hunton Privacy

On November 27, 2013, the State Post Bureau of the People’s Republic of China (the “SPBC”) released five draft normative rules for solicitation of public comment. Three of these rules, respectively entitled Provisions on the Management of the Security of Personal Information of Postal and Delivery Service Users (the “Draft Provisions”), Provisions on the Reporting and Handling of Security Information in the Postal Sector (the “Reporting and Handling Provisions”), and Provisions on the Management

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Google’s Year End Zeitgeist: Once Again, Insights Lacking

John Battelle's Searchblog

'The post Google’s Year End Zeitgeist: Once Again, Insights Lacking appeared first on John Battelle's Search Blog. Great photo, but not one we searched for… It’s become something of a ritual – every year Google publishes its year-end summary of what the world wants , and every year I complain about how shallow it is, given what Google *really* knows about what the world is up to.

IT 94
article thumbnail

else 12.2: “Anchoring digital existence in the physical world”

John Battelle's Searchblog

'The post else 12.2: “Anchoring digital existence in the physical world” appeared first on John Battelle's Search Blog. This week we get creative with 3D self-portraits, drones deliver in 30 minutes or less, we play Moneyball with job performance, 23andMe’s FDA troubles point to emerging data literacy problems, and language artifacts emerge.

article thumbnail

else 12.16: “It’s not entirely rational”

John Battelle's Searchblog

'The post else 12.16: “It’s not entirely rational” appeared first on John Battelle's Search Blog. This week, Google is on our minds and in the news, cookies are used for surveillance, the ephemeral web isn’t so ephemeral, and we’ve got more friends thinking about our emerging Data Society. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or thr

Privacy 83
article thumbnail

Playing With Infomous

John Battelle's Searchblog

'The post Playing With Infomous appeared first on John Battelle's Search Blog. Getting a live demo of this new approach to content discovery/display and potential monetization. Anyone out there played with it too? The post Playing With Infomous appeared first on John Battelle's Search Blog.

IT 78
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

12.9 else: “The most mericful thing in the world”

John Battelle's Searchblog

'The post 12.9 else: “The most mericful thing in the world” appeared first on John Battelle's Search Blog. This week, the tension between industry, governments, and regulation gets hashed out over the NSA, drones, bitcoins, and DNA databases; bots are running research on our behalf, and I became “postdigital.” As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an emai

article thumbnail

White House Publishes Report on Government Surveillance Programs

Hunton Privacy

On December 18, 2013, the White House published a report recommending reforms to the federal government’s wide-ranging surveillance programs. The voluminous report, entitled “Liberty and Security in a Changing World,” was authored by The Review Group on Intelligence and Communications Technologies, an advisory panel that includes experts in national security, intelligence gathering and civil liberties.

article thumbnail

Federal District Judge Ruling Casts Cloud Over NSA Data Collection

Hunton Privacy

On December 16, 2013, the United States District Court for the District of Columbia granted a preliminary injunction barring the federal government from collecting and analyzing metadata related to two consumers’ mobile phone accounts. The court held that the two individual plaintiffs were entitled to a preliminary injunction because they had standing to challenge the government’s data collection practices and were substantially likely to succeed on the merits of their claim.

article thumbnail

State “Ban the Box” Legislation Gains Momentum

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog , the “ban the box” movement continues to sweep through state legislatures. “Ban the box” laws, which vary in terms of scope and detail, generally prohibit employers from requesting information about job applicants’ criminal histories. Recent legislation in two states applies “ban the box” prohibitions to private employers in those states: On December 1, 2013, a new North Carolina law went into effect that prohibits employers fro

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Fred Cate of the Centre Submits Comments to NIST on Preliminary Cybersecurity Framework

Hunton Privacy

On December 12, 2013, Fred H. Cate , Senior Policy Advisor in the Centre for Information Policy Leadership at Hunton & Williams LLP (the “Centre”), submitted comments in response to the National Institute of Standards and Technology’s (“NIST’s”) Preliminary Cybersecurity Framework (the “Preliminary Framework”). On October 22, NIST issued the Preliminary Framework , as required by the Obama Administration’s February 2013 executive order, Improving Critical Infrastructure Cybersecurity (“Execu

article thumbnail

EU Court of Justice Advocate-General Finds Data Retention Directive Incompatible with Charter of Fundamental Rights

Hunton Privacy

On December 12, 2013, Advocate-General Cruz Villalón of the European Court of Justice (“ECJ”) issued his Opinion on the compatibility of the EU Data Retention Directive 2006/24/EC (the “Data Retention Directive”) with the Charter of Fundamental Rights of the European Union (the “EU Charter”). Background. The Data Retention Directive requires EU Member States to ensure that telecommunications service providers collect and retain traffic and location data (but not the substantive content of those

Privacy 40
article thumbnail

Turning Content Inside Out

CGI

Turning Content Inside Out. ravi.kumarv@cgi.com. Thu, 12/12/2013 - 10:00. Content is changing - from author-controlled to consumer and collaboration-led. We review why this is happening and what an organisation can do to gain the benefits, cost and efficiency savings that will start to follow. The problem with 'old' Content. Content is produced today by most organisations in the same way since the 1980's when personal computers were introduced and 'personal productivity' software became availabl

ECM 40
article thumbnail

People’s Bank of China Issues Administrative Measures for Credit Reference Agencies

Hunton Privacy

On November 15, 2013, the People’s Bank of China (the “PBOC”) issued its Administrative Measures for Credit Reference Agencies (the “Measures”) – eight months after the Administrative Regulations on the Credit Information Collection Sector (the “Regulations”) became effective on March 15, 2013. The Measures, which will take effect on December 20, 2013, were formulated to enhance the supervision and regulation of credit reference agencies and to promote positive developments in the credit informa

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Hunton Publishes Final Paper in its Series of Executive Briefings on the Proposed EU Data Protection Regulation

Hunton Privacy

As we previously reported , on October 21, 2013, the European Parliament approved its Compromise Text of the proposed EU General Data Protection Regulation (the “Proposed Regulation”). Hunton & Williams has now published an analysis of these proposals. This latest analysis is the last installment in our series of Executive Briefings on the Proposed Regulation.

Paper 40
article thumbnail

China’s Supreme People’s Court Releases Provisions on the Online Issuance of Judgment Documents by People’s Courts

Hunton Privacy

On November 21, 2013, the Supreme People’s Court of China passed the Provisions on the Online Issuance of Judgment Documents by People’s Courts (the “Provisions”), which will take effect on January 1, 2014. The Provisions replace earlier rules (of the same title) enacted by the Supreme People’s Court on November 8, 2010, and generally focus on improved implementation of the principles of standardizing the online issuance of judgment documents, promoting judicial justice and enhancing the public

article thumbnail

FTC Announces Seminars on Mobile Device Tracking, Predictive Scoring and Consumer-Generated Health Data

Hunton Privacy

On December 2, 2013, the Federal Trade Commission announced that it will host a series of seminars to examine the privacy implications of three new areas of technology used to track, market to and analyze consumers: mobile device tracking, predictive scoring and consumer-generated health data. The seminars will address (1) businesses tracking consumers using signals from the consumers’ mobile devices, (2) the use of predictive scoring to determine consumers’ access to products and offers, and (3

Privacy 40