December, 2015

article thumbnail

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck.

Access 85
article thumbnail

Can Business Get A Conscience?

John Battelle's Searchblog

The post Can Business Get A Conscience? appeared first on John Battelle's Search Blog. This post is a book review, but it starts with a story from my past. Way, way back, before San Francisco begat hip startups with nonsensical names, I found myself on the second floor of a near-abandoned warehouse on South Park, now one of the priciest areas of SF, but then, one of the cheapest.

IT 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Germany Adopts Law to Enable Class Actions for Data Protection Violations

Hunton Privacy

On December 17, 2015, the German Federal Diet ( Bundestag ) adopted a draft law introducing class action-like claims that will enable consumer protection associations to sue companies for violations of German data protection law. The law amends Germany’s Act on Actions for Injunctions to allow consumer protection associations to bring lawsuits against companies for improper use of consumer data in violation of German data protection law.

article thumbnail

What successful chief information security officers are doing right

CGI

What successful chief information security officers are doing right. Anonymous. Mon, 12/21/2015 - 04:39. The role of the chief information security officer (CISO) has become increasingly mainstream and strategic in recent years. While mandates vary among organizations, the CISO’s role has evolved from being technology focused to one of a business enabler and risk manager.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Understanding how tls downgrade attacks prevent email encryption

Elie

Over the last two years, the number of encrypted emails received by Gmail has almost doubled, as I reported earlier on the Google security blog. This very encouraging trend is sadly accompanied with an increase of SMTP TLS downgrade attacks, which prevent encryption of emails in transit as discussed in our research paper on the state of email transport security.

More Trending

article thumbnail

AIIM Saves the CIP

JKevinParker

In the past week, AIIM has killed off and since resurrected the Certified Information Professional (CIP). I'm very excited that they decided to keep it. Read my take: The Certified Information Professional (CIP) Lives Again! Thank you, AIIM, for listening, and keeping this important Information Management certification.

IT 40
article thumbnail

Bring Back the Ozone Hole  

John Battelle's Searchblog

The post Bring Back the Ozone Hole appeared first on John Battelle's Search Blog. Way back in 1985 an unlikely coalition of world governments, business, and enlightened citizens did something extraordinary: Responding to the findings of leading scientists, they united in decisive action to address a looming and existential global climate threat.

article thumbnail

The EU General Data Protection Regulation

Hunton Privacy

On December 17, 2015, after three years of drafting and negotiations, the European Parliament and Council of the European Union reached an informal agreement on the final draft of the EU General Data Protection Regulation (the “Regulation”), which is backed by the Committee on Civil Liberties, Justice and Home Affairs. The Regulation replaces Directive 95/46/EC (the “Directive”), which was enacted in 1995, and will significantly change EU data protection laws.

article thumbnail

Why ecosystems are so important to the Internet of Things

CGI

Why ecosystems are so important to the Internet of Things. Anonymous. Thu, 12/17/2015 - 07:59. With a plethora of devices and connectivity, the Internet of Things (IoT) is described by many as all encompassing. With that in mind, the concept that partnerships and ecosystems underpin success within the Internet of Things is no surprise. The potential of IoT paints an ideal where you can connect multiple points both within and outside of your organisation, to create insight and value.

IoT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Preservica celebrates independence!

Preservica

I am delighted to share the great news that today, Preservica has become an independent software business, backed and owned by our original shareholders, and run by the same team of experts who have successfully delivered our digital preservation software to a growing customer base. As we’ve grown and digital preservation has moved up the public and corporate agenda, Preservica have come to realise that we can best serve our customers by creating a corporate model more suitable for our specialis

article thumbnail

The TPP Agreement and Privacy

Privacy and Cybersecurity Law

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries […].

Privacy 52
article thumbnail

New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship

John Battelle's Searchblog

The post New Post On NewCo.Co: Silicon Valley Won’t Always Be The Center of Entrepreneurship appeared first on John Battelle's Search Blog. Hey Searchblog readers, posting a teaser here of a story I wrote which ran this week on NewCo. We’re doing more and more original reporting and editorial on our site, I invite you to sign up for our daily newsletter , which curates the best stories and insights on the ongoing transformation of business around the world.

IT 58
article thumbnail

Predictions 2015: How’d I Do?

John Battelle's Searchblog

The post Predictions 2015: How’d I Do? appeared first on John Battelle's Search Blog. Each January for the past 13 years, I’ve been making predictions on this site. Twelve months later, I pull back and review how those predictions have fared. I’ve already got a running list of predictions for 2016, but in this post, I want to handicap how my prognostications for 2015 turned out.

IT 49
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Wyndham Settles FTC Charges in FTC v. Wyndham

Hunton Privacy

On December 9, 2015, the Federal Trade Commission announced that Wyndham Worldwide Corporation (“Wyndham”) settled charges brought by the FTC stemming from allegations that the company unfairly failed to maintain reasonable data security practices. The case is FTC v. Wyndham Worldwide Corporation, et al. (2:13-CV-01887-ES-JAD) in the U.S. District Court for the District of New Jersey.

article thumbnail

Innovation Happens Everywhere Now: Barcelona-based Typeform Proves It

John Battelle's Searchblog

The post Innovation Happens Everywhere Now: Barcelona-based Typeform Proves It appeared first on John Battelle's Search Blog. Over on the NewCo site, I’ve profiled Typeform , a Barcelona-based NewCo. Below is a short outtake from that piece, if you’d like to read the entire thing, head on over to NewCo , which is publishing more and more pieces on innovative new kinds of companies around the world. .

IT 45
article thumbnail

President Signs Law Providing Exception to Annual Privacy Notice Requirement under the Gramm-Leach-Bliley Act

Hunton Privacy

On December 4, 2015, President Obama signed the Fixing America’s Surface Transportation Act (the ‘‘FAST Act’’) into law. The FAST Act, which is aimed at improving the country’s surface transportation infrastructure, contains a provision that modifies the annual privacy notice requirement under the Gramm-Leach-Bliley Act (“GLBA”). Under the current GLBA Privacy Rule, financial institutions must mail an annual privacy notice to their customers that sets forth how they collect, use and disclose tho

Privacy 45
article thumbnail

FTC Settles with Oracle over Charges of Software Security Misrepresentations

Hunton Privacy

On December 21, 2015, the Federal Trade Commission announced software company Oracle Corporation (“Oracle”) has agreed to settle FTC charges that accused the company of misrepresenting the security of its software updates. The proposed Agreement Containing Consent Order (“Consent Order”) stems from an FTC complaint that alleged the company had deceived consumers about the security provided by updates to the Java Platform, Standard Edition software (“Java SE”).

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

FTC Announces Largest Settlement Ever with LifeLock

Hunton Privacy

On December 17, 2015, the Federal Trade Commission announced that LifeLock, Inc. (“LifeLock”) has agreed to pay $100 million to settle contempt charges for deceptive advertising. According to the FTC, “[t]his is the largest monetary award obtained by the Commission in an order enforcement action.” Under the terms of the settlement , $68 million of the settlement amount will be paid to class action consumers who were injured by the identity theft protection company’s violation of a 2010 settlemen

article thumbnail

FTC Issues COPPA Settlements Against Mobile App Operators

Hunton Privacy

On December 17, 2015, the FTC announced a pair of COPPA settlements against operators of child-directed mobile apps available for download in the major app stores. These cases are the FTC’s first COPPA actions involving the collection of persistent identifiers, and no other personal information, from children since the FTC’s updated COPPA Rule went into effect in 2013.

article thumbnail

HIPAA Settlement Emphasizes Importance of Risk Analyses

Hunton Privacy

On December 14, 2015, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it had settled potential HIPAA Security Rule violations with the University of Washington on behalf of the university’s medical center, medical school and affiliated labs and clinics (collectively, “UW Medical”). OCR investigated UW Medical after receiving a breach report in November 2013 involving an incident in which almost 100,000 individuals had their protected health inform

Risk 40
article thumbnail

U.S. Congress Releases Compromise Bill on Cybersecurity Information Sharing

Hunton Privacy

On December 16, 2015, leaders in the U.S. House of Representatives and Senate released a $1.1 trillion omnibus spending bill that contained cybersecurity information sharing language that is based on a compromise between the Cybersecurity Information Sharing Act, which passed in the Senate in October, and two cybersecurity information sharing bills that passed in the House earlier this year.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Sharing best practices in our new Data to Diamonds book

CGI

Sharing best practices in our new Data to Diamonds book. shobana.lv@cgi.com. Tue, 12/15/2015 - 07:00. Making effective use of big data has become a top priority for commercial and government organizations. Having worked on many complex data and analytics projects over the years, we have compiled numerous best practices, and developed our Data2Diamonds methodology for the design and implementation of big data analytics solutions.

article thumbnail

Deal on EU Data Protection Regulation Imminent

Hunton Privacy

Today, Jan Philip Albrecht, MEP and Vice Chair of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, tweeted the following: “Yes, reports on white smoke are right but press information only to follow after second part of our work tonight is done, too.”. More information is expected to follow later today or tomorrow. View the European Parliament’s press release.

40
article thumbnail

Managing today’s hybrid IT environments through an effective MSI/SIAM framework

CGI

Managing today’s hybrid IT environments through an effective MSI/SIAM framework. kathy.jacquay@…. Mon, 12/14/2015 - 01:14. Governments increasingly are adopting cloud services and transitioning to multi-provider IT delivery models to improve service levels, access specialized technologies and reduce costs. The challenge is that these hybrid environments need a robust governance function to prevent responsibility gaps or overlaps.

IT 40
article thumbnail

Why I believe the Blockchain will transform Government

CGI

Why I believe the Blockchain will transform Government. ravi.kumarv@cgi.com. Fri, 12/11/2015 - 04:23. You may not yet have come across the Blockchain but it is making waves within the financial services community and is heralded as one of the most significant advances in technology for a generation. In essence, it is a new database technology that is based on a distributed ledger, which itself is cryptographically secured.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

CEOs: Are You Treading Water or Truly Transforming?

CGI

CEOs: Are You Treading Water or Truly Transforming? ravi.kumarv@cgi.com. Thu, 12/10/2015 - 07:40. Why do so many brilliant companies fail to transform? 150 years ago Western Union was one of the most powerful companies on earth, thanks to its monopoly of the United States’ telegraph network. Gradually, its leaders spotted a threat: a tiny start-up with a breakthrough communications technology.

article thumbnail

European Negotiators Close Deal on First EU Rules on Cybersecurity

Hunton Privacy

On December 7, 2015, European negotiators reached an agreement on the draft text of the Network and Information Security Directive (the “NIS Directive”), the first pan-EU rules on cybersecurity. The NIS Directive was first proposed by the European Commission on February 7, 2013, as part of its cybersecurity strategy for the European Union and aims to ensure a uniform level of cybersecurity across the EU.

article thumbnail

The need for collaboration across blue light services

CGI

The need for collaboration across blue light services. p.butler@cgi.com. Mon, 12/07/2015 - 04:29. Blue light services – ambulance, police, and fire departments – are built entirely around the premise of working in partnership with the communities they serve to maintain law and order, protect members of the public and their property, prevent crime, and improve quality of life.