May, 2014

article thumbnail

The End of 'Social'

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world.

109
109
article thumbnail

Do You Have a Mission or…Are You *On* A Mission? On Being a NewCo

John Battelle's Searchblog

'The post Do You Have a Mission or…Are You *On* A Mission? On Being a NewCo appeared first on John Battelle's Search Blog. A sampling of NewCos from our 2013 NYC festival. (Cross posted from the NewCo blog …). About a year ago I wrote a piece outlining the kinds of companies we were looking for as we began the first full year of the NewCo festival circuit.

Marketing 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using big data to understand users' privacy concerns

Elie

Worries about big data and privacy are all over the news, but our new research shows that big data can also help better understand users' privacy concerns.

article thumbnail

DB2 for z/OS: Some Matters Pertaining to Nested DB2 Stored Procedures

Robert's Db2

I worked recently with some IT people who were themselves engaged in the development and enhancement of a high-volume application that accesses DB2 for z/OS data by way of stored procedures (the client side of the application communicates with the target DB2 system via the distributed data facility, also known as DDF). Various actions implemented and plans formulated by this IT team serve to effectively illustrate some important points regarding the nesting of DB2 stored procedures ("nesting," i

IT 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google to Give Effect to Right to Remove Personal Data from Search Results

Hunton Privacy

On May 30, 2014, Google posted a web form that enables individuals to request the removal of URLs from the results of searches that include that individual’s name. The web form acknowledges that this is Google’s “initial effort” to give effect to the recent and controversial decision of the Court of Justice of the European Union in Costeja , widely described as providing a “right to be forgotten.

More Trending

article thumbnail

The end of 'social': Is the digital enterprise leaving you behind?

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.

45
article thumbnail

Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web?

John Battelle's Searchblog

'The post Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web? appeared first on John Battelle's Search Blog. Viacom’s rather one-sided POV on why its blocked web access for Cable One providers. Image via @TheLadyH86. So it’s come to this. We’re all familiar with disputes between cable providers and their content partners – it happens all the time.

Access 100
article thumbnail

Programmatic Needs Context

John Battelle's Searchblog

'The post Programmatic Needs Context appeared first on John Battelle's Search Blog. Today Digiday published a piece I wrote about the lack of context in the display advertising marketplace. Check it out, I’ve posted it below as well for posterity. — Before the rise of programmatic buying and “audience retargeting,” most quality brand media was purchased based on a very particular contextual signal –- even if the market didn’t really call it that.

article thumbnail

Else 5.19.14: I Too, Shall Be Forgotten (At Least By Europe)

John Battelle's Searchblog

'The post Else 5.19.14: I Too, Shall Be Forgotten (At Least By Europe) appeared first on John Battelle's Search Blog. ( image ) If ever you wanted proof we are renegotiating our social contract in the Internet age, this week’s roundup of the best links provides plenty of fodder. Onwards… The Myths & Realities Of How Of The EU’s New “Right To Be Forgotten” In Google Works - MarketingLand Google and other search engines will have to hew to new EU rules.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Else 5.5.14: Stay Sober, My Friend (And Watch Your F8)

John Battelle's Searchblog

'The post Else 5.5.14: Stay Sober, My Friend (And Watch Your F8) appeared first on John Battelle's Search Blog. ( image ) Cinco de Mayo on a Monday? What fresh hell is this? Just another week of links worth reading, if you care about the most muscular narrative in our beer-goggled world. Facebook (and Wired) dominated thanks to news from it F8 developer conference, but policy and politics were not far behind.

IT 81
article thumbnail

Some zIIP Things of Which DB2 for z/OS People Should be Aware

Robert's Db2

zIIP is short for System z Integrated Information Processor. It's a so-called specialty engine for an IBM mainframe server. The zIIP raison d'etre is reduced cost of computing on the System z platform, accomplished in two ways: 1) zIIP engines cost less than general-purpose processors (often referred to as CPs -- short for central processors), and 2) zIIP engines do not factor into the cost of software that runs in z/OS LPARs. zIIP engines aren't new (they were introduced in 2006), but there are

IT 48
article thumbnail

FTC Issues Report on Data Broker Industry, Recommends Legislation

Hunton Privacy

On May 27, 2014, the Federal Trade Commission announced the release of a new report entitled Data Brokers: A Call for Transparency and Accountability , detailing the findings of an FTC study of nine data brokers, representing a cross-section of the industry. The Report concludes that the data broker industry needs greater transparency and recommends that Congress consider enacting legislation that would make data brokers’ practices more visible and give consumers more control over the collection

article thumbnail

Hunton’s Global Privacy and Cybersecurity Practice Tops Chambers USA 2014 Rankings

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Chambers and Partners has listed the firm’s Global Privacy and Cybersecurity practice in Band 1 in the 2014 Chambers USA guide. This is the seventh consecutive year the firm was top ranked in this category. In addition, partner and chair of the firm’s Global Privacy and Cybersecurity practice group Lisa Sotto again was recognized as a “Star” performer (the guide’s highest ranking) for privacy and data security.

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Hunton Global Privacy Update – May 2014

Hunton Privacy

On May 14, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program provided a global overview of some of the most debated topics in data protection and privacy, including cross-border data flows, global data breach issues and the EU Cybersecurity Directive.

Privacy 40
article thumbnail

Virginia Governor McAuliffe Appoints Paul Tiao to Virginia Cyber Security Commission

Hunton Privacy

On May 16, 2014, Virginia Governor Terry McAuliffe announced the members of the Virginia Cyber Security Commission, including the appointment of Hunton & Williams LLP’s Paul M. Tiao. Tiao, one of eleven citizen members elected to the group, is a partner in the firm’s Global Privacy and Cybersecurity Practice Group. “The cybersecurity issues facing both the Commonwealth and the nation are substantial,” said Tiao.

article thumbnail

FTC Seeks Privacy Protection for Personal Information in Bankruptcy Proceeding

Hunton Privacy

On May 23, 2014, the Federal Trade Commission announced that the FTC’s Bureau of Consumer Protection sent a letter to the court overseeing the bankruptcy proceedings for ConnectEDU Inc. (“ConnectEDU”), an education technology company, warning that the proposed sale of the company’s assets raises privacy concerns. ConnectEDU’s assets include personal information collected from students, high schools and community colleges in connection with the company’s website and affiliated services.

Privacy 40
article thumbnail

EU Court of Justice Upholds Right to Erasure in Google Search Case

Hunton Privacy

On May 13, 2014, the European Court of Justice (the “ECJ”) rendered its judgment in Google Spain S.L. and Google Inc. v Agencia Española de Protección de Datos (Case C-131/12, “ Google v. AEPD ” or the “case”). The case concerns a request made by a Spanish individual, Mr. Costeja, to the Spanish Data Protection Authority (Agencia Española de Protección de Datos or “AEPD”) to order the removal of certain links from Google’s search results.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

FCC Reaches Settlement Over Alleged Do-Not Call Registry Violations

Hunton Privacy

On May 19, 2014, the Federal Communications Commission announced that Sprint Corporation agreed to pay $7.5 million to settle an FCC Enforcement Bureau investigation stemming from allegations that the company failed to honor consumers’ requests to opt out of telemarketing calls and texts. Sprint also agreed to implement a two-year plan to help ensure future compliance with Do-Not-Call registry rules.

article thumbnail

Sotto Speaks on the Importance of Cross-Border Data Transfers to Global Prosperity

Hunton Privacy

Hunton & Williams LLP, in coordination with the U.S. Chamber of Commerce, recently issued a report entitled Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , highlighting the benefits of cross-border data transfers to businesses in the international marketplace. The report underscores the importance of developing data transfer mechanisms that protect privacy and facilitate the free-flow of data, and also explores opportunities for new data transfe

Privacy 40
article thumbnail

French Data Protection Authority Unveils 2013 Annual Activity Report

Hunton Privacy

On May 19, 2014, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2013 (the “Report”) highlighting its main accomplishments in 2013 and outlining some of its priorities for the upcoming year. The Report discusses the proposed EU General Data Protection Regulation , and reiterates the CNIL’s main concerns with the proposal, namely: The one-stop-shop mechanism: according to the CNIL, it needs to provide better protection for individuals and allow for overs

article thumbnail

Singapore Personal Data Protection Commission Publishes Two Advisory Guidelines and Anticipates Promulgation of PDPA Regulations

Hunton Privacy

On May 16, 2014, the Singapore Personal Data Protection Commission (the “Commission”) published advisory guidelines for the implementation of its Personal Data Protection Act (the “PDPA”) for two industry sectors. The guidelines were published on the same day on which the Commission held its well-attended Personal Data Protection Seminar focusing on international perspectives on data governance.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The end of 'social': Is the digital enterprise leaving you behind?

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.

40
article thumbnail

Europe under Review : Part 6 of 8 – International Transfers

Privacy and Cybersecurity Law

This week in our series of “back to privacy basics”, we look at the issue of international transfers of personal […].

Privacy 40
article thumbnail

FTC Approves Consent Orders with Companies that Marketed Genetically Customized Nutritional Supplements

Hunton Privacy

On May 12, 2014, the Federal Trade Commission announced that it has approved final consent orders with two companies that marketed genetically customized nutrition supplements. In addition to charges that the companies’ claims regarding the effectiveness of their products were not sufficiently substantiated, the settlements also allege that the companies misrepresented their privacy and security practices.

article thumbnail

EEOC Suffers Another Loss in Its Crusade Against Employer Background Checks

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On April 9, 2014, the Sixth Circuit of Appeals not only affirmed summary judgment in EEOC v. Kaplan Higher Education Corp., et al. but also chastised the Equal Employment Opportunity Commission (“EEOC”) for applying a flawed methodology in its attempts to prove that using credit checks as a pre-employment screen had an unlawful disparate impact against African-American applicants.

IT 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Sotto Addresses Cybersecurity Threat Preparation and Response

Hunton Privacy

On May 7, 2014, IronBox Secure File Transfer hosted a webinar featuring “Queen of Breach” attorney Lisa Sotto, who shared her top tips in the event of a data breach. Lisa Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, discussed the current cyber risk landscape and led participants through a hypothetical data breach scenario.

article thumbnail

U.S. Chamber of Commerce and Hunton Release Report on the Importance of Cross-Border Data Transfers to Global Prosperity

Hunton Privacy

On May 12, 2014, the U.S. Chamber of Commerce released a report highlighting the benefits of cross-border data transfers across all sectors of the economy. Hunton & Williams LLP’s Global Privacy and Cybersecurity team developed the report with the Chamber of Commerce. The report, Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , presents pragmatic solutions for developing international mechanisms that both protect privacy and facilitate cross-bord

Privacy 40
article thumbnail

French Data Protection Authority Reviews 100 Mobile Apps During Internet Sweep

Hunton Privacy

On May 13, 2014, the French data protection authority (“CNIL”) decided to examine 100 mobile apps most commonly used in France. In particular, the CNIL indicated that it will examine whether the mobile apps properly inform users of: the categories of personal data collected (such as location data, contacts and device identifiers); the purposes for which the data are collected; whether personal data are shared with third parties; and. the right of mobile app users to object to the collection and