This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck.
The post Can Business Get A Conscience? appeared first on John Battelle's Search Blog. This post is a book review, but it starts with a story from my past. Way, way back, before San Francisco begat hip startups with nonsensical names, I found myself on the second floor of a near-abandoned warehouse on South Park, now one of the priciest areas of SF, but then, one of the cheapest.
On December 17, 2015, the German Federal Diet ( Bundestag ) adopted a draft law introducing class action-like claims that will enable consumer protection associations to sue companies for violations of German data protection law. The law amends Germany’s Act on Actions for Injunctions to allow consumer protection associations to bring lawsuits against companies for improper use of consumer data in violation of German data protection law.
What successful chief information security officers are doing right. Anonymous. Mon, 12/21/2015 - 04:39. The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While mandates vary among organizations, the CISO’s role has evolved from being technology focused to one of a business enabler and risk manager.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.
The post Bring Back the Ozone Hole appeared first on John Battelle's Search Blog. Way back in 1985 an unlikely coalition of world governments, business, and enlightened citizens did something extraordinary: Responding to the findings of leading scientists, they united in decisive action to address a looming and existential global climate threat.
On December 17, 2015, after three years of drafting and negotiations, the European Parliament and Council of the European Union reached an informal agreement on the final draft of the EU General Data Protection Regulation (the “Regulation”), which is backed by the Committee on Civil Liberties, Justice and Home Affairs. The Regulation replaces Directive 95/46/EC (the “Directive”), which was enacted in 1995, and will significantly change EU data protection laws.
In the past week, AIIM has killed off and since resurrected the Certified Information Professional (CIP). I'm very excited that they decided to keep it. Read my take: The Certified Information Professional (CIP) Lives Again! Thank you, AIIM, for listening, and keeping this important Information Management certification.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Why ecosystems are so important to the Internet of Things. Anonymous. Thu, 12/17/2015 - 07:59. With a plethora of devices and connectivity, the Internet of Things (IoT) is described by many as all encompassing. With that in mind, the concept that partnerships and ecosystems underpin success within the Internet of Things is no surprise. The potential of IoT paints an ideal where you can connect multiple points both within and outside of your organisation, to create insight and value.
I am delighted to share the great news that today, Preservica has become an independent software business, backed and owned by our original shareholders, and run by the same team of experts who have successfully delivered our digital preservation software to a growing customer base. As we’ve grown and digital preservation has moved up the public and corporate agenda, Preservica have come to realise that we can best serve our customers by creating a corporate model more suitable for our specialis
The post New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship appeared first on John Battelle's Search Blog. Hey Searchblog readers, posting a teaser here of a story I wrote which ran this week on NewCo. We’re doing more and more original reporting and editorial on our site, I invite you to sign up for our daily newsletter , which curates the best stories and insights on the ongoing transformation of business around the world.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
On December 9, 2015, the Federal Trade Commission announced that Wyndham Worldwide Corporation (“Wyndham”) settled charges brought by the FTC stemming from allegations that the company unfairly failed to maintain reasonable data security practices. The case is FTC v. Wyndham Worldwide Corporation, et al. (2:13-CV-01887-ES-JAD) in the U.S. District Court for the District of New Jersey.
The post Predictions 2015: How’d I Do? appeared first on John Battelle's Search Blog. Each January for the past 13 years, I’ve been making predictions on this site. Twelve months later, I pull back and review how those predictions have fared. I’ve already got a running list of predictions for 2016, but in this post, I want to handicap how my prognostications for 2015 turned out.
The post Innovation Happens Everywhere Now: Barcelona-based Typeform Proves It appeared first on John Battelle's Search Blog. Over on the NewCo site, I’ve profiled Typeform , a Barcelona-based NewCo. Below is a short outtake from that piece, if you’d like to read the entire thing, head on over to NewCo , which is publishing more and more pieces on innovative new kinds of companies around the world. .
On December 4, 2015, President Obama signed the Fixing America’s Surface Transportation Act (the ‘‘FAST Act’’) into law. The FAST Act, which is aimed at improving the country’s surface transportation infrastructure, contains a provision that modifies the annual privacy notice requirement under the Gramm-Leach-Bliley Act (“GLBA”). Under the current GLBA Privacy Rule, financial institutions must mail an annual privacy notice to their customers that sets forth how they collect, use and disclose tho
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
On December 21, 2015, the Federal Trade Commission announced software company Oracle Corporation (“Oracle”) has agreed to settle FTC charges that accused the company of misrepresenting the security of its software updates. The proposed Agreement Containing Consent Order (“Consent Order”) stems from an FTC complaint that alleged the company had deceived consumers about the security provided by updates to the Java Platform, Standard Edition software (“Java SE”).
On December 17, 2015, the Federal Trade Commission announced that LifeLock, Inc. (“LifeLock”) has agreed to pay $100 million to settle contempt charges for deceptive advertising. According to the FTC, “[t]his is the largest monetary award obtained by the Commission in an order enforcement action.” Under the terms of the settlement , $68 million of the settlement amount will be paid to class action consumers who were injured by the identity theft protection company’s violation of a 2010 settlemen
On December 17, 2015, the FTC announced a pair of COPPA settlements against operators of child-directed mobile apps available for download in the major app stores. These cases are the FTC’s first COPPA actions involving the collection of persistent identifiers, and no other personal information, from children since the FTC’s updated COPPA Rule went into effect in 2013.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On December 14, 2015, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it had settled potential HIPAA Security Rule violations with the University of Washington on behalf of the university’s medical center, medical school and affiliated labs and clinics (collectively, “UW Medical”). OCR investigated UW Medical after receiving a breach report in November 2013 involving an incident in which almost 100,000 individuals had their protected health inform
On December 16, 2015, leaders in the U.S. House of Representatives and Senate released a $1.1 trillion omnibus spending bill that contained cybersecurity information sharing language that is based on a compromise between the Cybersecurity Information Sharing Act, which passed in the Senate in October, and two cybersecurity information sharing bills that passed in the House earlier this year.
Sharing best practices in our new Data to Diamonds book. shobana.lv@cgi.com. Tue, 12/15/2015 - 07:00. Making effective use of big data has become a top priority for commercial and government organizations. Having worked on many complex data and analytics projects over the years, we have compiled numerous best practices, and developed our Data2Diamonds methodology for the design and implementation of big data analytics solutions.
Today, Jan Philip Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, tweeted the following: “Yes, reports on white smoke are right but press information only to follow after second part of our work tonight is done, too.”. More information is expected to follow later today or tomorrow. View the European Parliament’s press release.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Managing today’s hybrid IT environments through an effective MSI/SIAM framework. kathy.jacquay@…. Mon, 12/14/2015 - 01:14. Governments increasingly are adopting cloud services and transitioning to multi-provider IT delivery models to improve service levels, access specialized technologies and reduce costs. The challenge is that these hybrid environments need a robust governance function to prevent responsibility gaps or overlaps.
Why I believe the Blockchain will transform Government. ravi.kumarv@cgi.com. Fri, 12/11/2015 - 04:23. You may not yet have come across the Blockchain but it is making waves within the financial services community and is heralded as one of the most significant advances in technology for a generation. In essence, it is a new database technology that is based on a distributed ledger, which itself is cryptographically secured.
CEOs: Are You Treading Water or Truly Transforming? ravi.kumarv@cgi.com. Thu, 12/10/2015 - 07:40. Why do so many brilliant companies fail to transform? 150 years ago Western Union was one of the most powerful companies on earth, thanks to its monopoly of the United States’ telegraph network. Gradually, its leaders spotted a threat: a tiny start-up with a breakthrough communications technology.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content