July, 2015

article thumbnail

NewCo Cincinnati Is Next Week. Here Are The Companies I’m Getting Inside

John Battelle's Searchblog

The post NewCo Cincinnati Is Next Week. Here Are The Companies I’m Getting Inside appeared first on John Battelle's Search Blog. I know I rave about all the NewCo cities, but once again I am picking my companies from a new festival lineup – and once again, I’m blown away. Next week is NewCo Cincinnati , and wow – what a stellar group of companies to chose from.

IT 97
article thumbnail

Has Microsoft blown it? Part II

Collaboration 2.0

I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices.

IT 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

article thumbnail

States Writing Biometric-Capture Laws May Look to Illinois

Hunton Privacy

Recent class actions filed against Facebook and Shutterfly are the first cases to test an Illinois law that requires consent before biometric information may be captured for commercial purposes. Although the cases focus on biometric capture activities primarily in the social-media realm, these cases and the Illinois law at issue have ramifications for any business that employs biometric-capture technology, including those who use it for security or sale-and-marketing purposes.

Sales 49
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS Group Buffer Pools: ALLOWAUTOALT, Directory Entries, and GBP Size

Robert's Db2

So, I've seen something interesting lately in reviewing some DB2 for z/OS data sharing systems, and as is often the case in such situations, when I see something interesting I want to write about it. Thus this blog entry. Hope you find it to be useful. What has caught my eye recently in looking over DB2 data sharing configuration information? Big group buffer pool (GBP) directory to data entry ratios.

IT 48

More Trending

article thumbnail

Visualizing better healthcare

CGI

Visualizing better healthcare. kathy.jacquay@…. Wed, 07/29/2015 - 05:20. Graphical displays of data have been with us since the 1700s, according to visualization guru Edward Tufte. People are visual creatures, so if we want to really understand a set of data, it’s of great value to be able to see points of comparison, say in a timeline, graph or diagram.

40
article thumbnail

Have Microsoft blown it? Part II

Collaboration 2.0

I suggested last week that Microsoft Office was approaching obsolescence, rooted in archaic paper Victorian work practices. In response to some of the comments and debate last week here are some further thoughts on my rationale.

IT 72
article thumbnail

What We Can Learn From the Hacking Team Hack

Productivity Bytes

There is one word that strikes fear into the heart of government agencies and firms engaged in dealings of a secretive and questionable nature. “Hacktivism” has inspired decentralized groups of hackers dedicated to routing out unlawful espionage, corporate greed and human rights violations wherever they occur. And sometimes other hackers are the target of such … + Read More.

article thumbnail

Connecticut Passes New Data Protection Measures into Law

Hunton Privacy

On July 1, 2015, Connecticut’s governor signed into law Public Act No. 15-142, An Act Improving Data Security and Agency Effectiveness (the “Act”), that (1) amends the state’s data breach notification law to require notice to affected individuals and the Connecticut Attorney General within 90 days of a security breach and expands the definition of personal information to include biometric data such as fingerprints, retina scans and voice prints; (2) affirmatively requires all businesses, includi

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Will You Use DB2 for z/OS Global Variables?

Robert's Db2

About seven years ago, in an entry posted to the blog I maintained while working as an independent DB2 consultant (prior to rejoining IBM), I wrote of the evolution of DB2 for z/OS SQL from merely a data manipulation language to a programming language. That evolution continues with DB2 Version 11, in part through the introduction in that DB2 release of global variable functionality.

article thumbnail

Article on Document-Level Redaction of Electronic Documents

Positively RIM

On June 30 online , KM World published an article I wrote on Document-Level Redaction of Electronic Documents. While this is not everyone's cup of tea, it is an important tool for many RIMmers. [As it has fallen out of use a bit, I remind my gentle readers that RIM is an acronym for Records & Information Management.] The article can be found at [link].

IT 40
article thumbnail

Open Innovation 2.0 for future cities

CGI

Open Innovation 2.0 for future cities. ravi.kumarv@cgi.com. Wed, 07/29/2015 - 22:49. Open Innovation 2.0 (OI2.0) is a new paradigm where government, industry, academia and citizens work together to co-create the future and drive structural changes far beyond the scope of what any one organization or person could do alone. It is about sharing ideas, results and intellectual creativity to maximize economic and social impact.

article thumbnail

Office productivity: Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 72
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Everything you Always Wanted to Know About Capture

JKevinParker

On 7/8/2015, I was the featured speaker for an AIIM Webinar on Capture called "Everything you Always Wanted to Know About Capture into Process". View the presentation recording on the AIIM site , or browse the slide deck below. Everything you Always Wanted to Know About Capture into Process from AIIM Webinar Description Capture today is far more than scanning and mailroom automation; more than being a trigger for workflows and processes in the organization.

40
article thumbnail

House of Representatives Passes Bill to Permit Broader Use and Disclosure of Protected Health Information for Research Purposes

Hunton Privacy

On July 10, 2015, the United States House of Representatives passed the 21st Century Cures Act (the “Act”), which is intended to ease restrictions on the use and disclosure of protected health information (“PHI”) for research purposes. Currently, the HIPAA Privacy Rule permits the use and disclosure of PHI for research purposes without requiring authorization from an individual but does require that any waiver of the authorization requirement be approved by an institutional review board or a pri

article thumbnail

vsftpd-3.0.3 released. and the horrors of FTP over SSL

Scary Beasts Security

I just released vsftpd-3.0.3, as noted on the vsftpd home page. It's actually been almost three years(!) since vsftpd-3.0.2, so things do seem to be getting very stable and calming down. The exception to things getting very stable and calming down seems to be SSL over FTP, which has been a constant source of, uh, joy, for some time now. Some issues fixed relate to security and warrant describing here because I think they are interesting.

article thumbnail

Office productivity: Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 72
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Has Microsoft blown it?

Collaboration 2.0

Microsoft has dominated the 'office productivity' tools market for decades and is a de facto way of working in most companies. Having significantly held back innovation in the last 10 years, Office is arguably reaching the end of its useful life as modern digital tools make it look like an old bureaucratic anachronism.

IT 72
article thumbnail

CIPL Urges Expansion of Privacy Toolkit Beyond Consent

Hunton Privacy

How do we focus on individuals and ensure meaningful control and the empowerment of individuals in the modern information age? What data privacy tools would drive empowerment in the digital world of today and tomorrow, perhaps more effectively and more nimbly than traditional individual consent? At a time when many countries are legislating or revising their data privacy laws and organizations are searching for best practices to embed in their business models, these questions are more relevant t

Privacy 49
article thumbnail

Draft Cybersecurity Law Published for Comment in China

Hunton Privacy

On July 6, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published a draft of the country’s proposed Network Security Law (the “Draft Cybersecurity Law”). A public comment period on the Draft Cybersecurity Law is now open until August 5, 2015. At this point, the Draft Cybersecurity Law has not yet been finalized.

article thumbnail

Hunton Webinar on the Proposed EU General Data Protection Regulation: Preparing for Change

Hunton Privacy

On July 9, 2015, Hunton & Williams LLP hosted a webinar on the Proposed EU General Data Protection Regulation: Preparing for Change (Part 1). Hunton & Williams partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto moderated the session, which was led by speakers Bridget Treacy , managing partner of the firm’s London office; Wim Nauwelaerts, managing partner of the firm’s Brussels office; and Jörg Hladjk, counsel in the firm’s Brussels office.

Privacy 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

EDPS Issues Opinion and Launches Regulation App for Mobile Devices

Hunton Privacy

On July 27, 2015, Giovanni Buttarelli, the European Data Protection Supervisor (“EDPS”), published Opinion 3/2015 on the reform of Europe’s data protection laws, intended to “assist the participants in the trilogue in reaching the right consensus on time.” The Opinion sets out the EDPS’ vision for the regulation of data protection, re-stating the case for a framework that strengthens the rights of individuals and noting that “the time is now to safeguard individuals’ fundamental rights and freed

GDPR 40
article thumbnail

Federal Court: Seventh Circuit States Data Breach Class’ Allegations Against Neiman Marcus Satisfy Article III Standing

Hunton Privacy

On July 20, 2015, the United States Court of Appeals for the Seventh Circuit reversed a previous decision that dismissed a putative data breach class action against Neiman Marcus for lack of Article III standing. Remijas et al. v. Neiman Marcus Group, LLC , No. 14-3122. The litigation arose from a 2013 data breach in which approximately 350,000 customers’ cards were exposed.

article thumbnail

Hunton Publishes Several Chapters in International Comparative Legal Guide to Data Protection

Hunton Privacy

Hunton & Williams is pleased to announce its participation with the Global Legal Group in the publication of the second edition of the book The International Comparative Legal Guide to: Data Protection 2015. Members of the Hunton & Williams Global Privacy and Cybersecurity team prepared several chapters in the guide, including the opening chapter on “Legislative Change: Assessing the European Commission’s Proposal for a Data Protection Regulation,” and chapters on Belgium, China, France,

Privacy 40
article thumbnail

FERC Proposes to Accept Updated CIP Standards and Calls for New Cybersecurity Controls

Hunton Privacy

On July 16, 2015, the Federal Energy Regulatory Commission (“FERC”) issued a new Notice of Proposed Rulemaking (“NOPR”) addressing the critical infrastructure protection (“CIP”) reliability standards. The NOPR proposes to accept with limited modifications seven updated CIP cybersecurity standards. The NOPR also proposes that new requirements be added to the CIP standards to protect supply chain vendors against evolving malware threats and addresses risks to utility communications networks.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Shared services are an effective means to innovation and savings

CGI

Les services partagés : un modèle efficace pour réaliser des économies et stimuler l’innovation. narmada.devarajan. Tue, 07/21/2015 - 01:29. Dans le secteur privé, les services partagés sont courants et généralement admis. Il convient même aux entreprises de très grande envergure d’utiliser des processus et systèmes administratifs uniques pour la facturation, l’approvisionnement, les ressources humaines, la formation et les finances ainsi que pour le soutien en matière de communications, de mark

article thumbnail

Indonesia Publishes Proposed Data Protection Rule

Hunton Privacy

On July 14, 2015, pursuant to an implementation requirement of Government Regulation 82 of 2012, the Indonesian government published the Draft Regulation of the Minister of Communication and Information (RPM) of the Protection of Personal Data in Electronic Systems (“Proposed Regulation”). The Proposed Regulation addresses the protection of personal data collected by a variety of government agencies, enumerates the rights of those whose personal data is collected and the obligations of users of

article thumbnail

FCC Issues Clarifications Regarding the Telephone Consumer Protection Act

Hunton Privacy

On July 10, 2015, the Federal Communications Commission (“FCC”) released a Declaratory Ruling and Order that provides guidance with respect to several sections of the Telephone Consumer Protection Act (“TCPA”). The Declaratory Ruling and Order responds to 21 separate requests from industry, government and others seeking clarifications regarding the TCPA and related FCC rules.