September, 2014

article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

article thumbnail

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

'The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up. Recently I began a walkabout of sorts, with a goal of ameliorating my rather thin understanding of the mobile marketplace. If you read me closely, you know I’ve been more than frustrated with what I call the “ chicletized world ” of disconnected mobile apps.

Marketing 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: DDF, Stored Procedures, and SET CURRENT PACKAGESET

Robert's Db2

Recently, I was talking with people from a company's IT department about modernizing their mainframe application architecture.Among other things, we discussed increasing the company's use of stored procedures for DB2 for z/OS data access. That prompted some questions around the use of the DB2 SQL statement SET CURRENT PACKAGESET in stored procedures called by DRDA requesters (these being calls that would get to DB2 via the distributed data facility, or DDF).

Access 48
article thumbnail

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Article 29 Working Party States Principles in EU Data Protection Law Apply to Big Data

Hunton Privacy

On September 16, 2014, the Article 29 Working Party (the “Working Party”) adopted a Statement on the impact of the development of big data on the protection of individuals with regard to the processing of their personal data in the EU (“Statement”). This two-page Statement sets forth a number of “key messages” by the Working Party on how big data impacts compliance requirements with EU privacy law, with the principal message being that big data does not impact or change basic EU data protection

More Trending

article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 233
article thumbnail

Every Company Is An Experience Company

John Battelle's Searchblog

'The post Every Company Is An Experience Company appeared first on John Battelle's Search Blog. Illustration by Craig Swanson and idea by James Cennamo. Some years ago while attempting to explain the thinking behind my then-startup Federated Media, I wrote that all brands are publishers (it was over on the FM blog, which the new owners apparently have taken down – a summary of my thinking can be found here ).

Retail 106
article thumbnail

DB2 for z/OS: Avoiding zIIP Engine Contention Issues

Robert's Db2

In an entry posted a few months ago to this blog, I touched on several matters pertaining to mainframe zIIP engines and the use of these processors by DB2 for z/OS. Based on recent experience, I feel that it's important to further highlight a particular zIIP-related issue: zIIP engine contention. Through this post, I want to explain what zIIP contention is, why you want to avoid it, how you can spot it, and what you can do about it.

IT 48
article thumbnail

Speaking at SUGDC Tonight

JKevinParker

I am excited to be speaking at SUGDC (SharePoint Users Group of DC) tonight. I am presenting on "How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information". This is material adapted from an AIIM course I developed that is available in the AIIM Resource Center for professional members.

40
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Appeals Court Holds User Consent Required to Enforce Website Terms of Use

Hunton Privacy

A recent decision by the United States Court of Appeals for the Ninth Circuit reinforces the importance of obtaining affirmative user consent to website Terms of Use for website owners seeking to enforce those terms against consumers. In Nguyen v. Barnes & Noble Inc. , the Ninth Circuit held that Barnes & Noble’s website Terms of Use (“Terms”) were not enforceable against a consumer because the website failed to provide sufficient notice of the Terms, despite having placed conspicuous hy

Retail 40
article thumbnail

Transformation strategies for building a “cloud-enabled” enterprise

CGI

Transformation strategies for building a “cloud-enabled” enterprise. shobana.lv@cgi.com. Fri, 09/12/2014 - 08:00. Cloud-enabled enterprises take a “cloud-first” approach to IT service delivery, taking advantage of cloud capabilities offered by external suppliers instead of building them in house. However, purchasing many different types of cloud services from multiple suppliers in an ad-hoc fashion leads to a highly fragmented IT environment, which, in turn, will negate the many benefits of clou

Cloud 40
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 132
article thumbnail

We’re Innumerate, Which Is Why We Love Visualizations

John Battelle's Searchblog

'The post We’re Innumerate, Which Is Why We Love Visualizations appeared first on John Battelle's Search Blog. This weekend I reviewed my notes from a few weeks of late summer meetings, and found this gem from a conversation with Mike Driscoll, the CEO and co-founder of data analytics firm MetaMarkets. MetaMarkets helps adtech firms make sense of the reams of data they collect each day (hour, minute, second…).

Analytics 104
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

DC, Northern Virginia Digital Strategy - for Businesses, Agencies, Nonprofits - Upcoming NVTC.org Committee Meetings 2014-2015

Interactive Information Management

Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015. Or join the NVTC now to participate! Hear from other #NVTC business and government members, sharing information regarding the approach to a Digital Strategy, executing and sustaining it for innovative business value.

article thumbnail

Managing SharePoint User Access

JKevinParker

What is the best way to manage individual users' access to SharePoint sites? Through AD security groups inside corresponding SharePoint groups. I prefer to keep the names consistent between SharePoint and AD security groups. Example Permission Groups for SharePoint. AD Security Group SharePoint Group SharePoint Permission Level. WebApp1_Site1_InfoManagers WebApp1_Site1_InfoManagers Manage Information.

Access 40
article thumbnail

Article 29 Working Party Issues an Opinion on Internet of Things

Hunton Privacy

On September 22, 2014, the Article 29 Working Party (the “Working Party”) released an Opinion on the Internet of Things (the “Opinion”) that was adopted during the last plenary session of the Working Party in September 2014. With this Opinion, the Working Party intends to draw attention to the privacy and data protection challenges raised by the Internet of Things and to propose recommendations for the stakeholders to comply with the current EU data protection legal framework.

article thumbnail

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

article thumbnail

Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing

John Battelle's Searchblog

'The post Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing appeared first on John Battelle's Search Blog. ( image ) This past week’s links are rife with people asking hard questions of Google and Facebook, and so much the better, I’d warrant. You don’t get to the lead position without raising questions.

Marketing 103
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 100
article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Life Break: Go See “Take Me To The River”

John Battelle's Searchblog

'The post Life Break: Go See “Take Me To The River” appeared first on John Battelle's Search Blog. It’s rare I write about things not directly related to the Internet industry, but the film Take Me To The River , a multi-year project helmed by my friend and colleague Martin Shore, is certainly worthy of a detour. If you love music, any kind of music, this film is a must.

IT 97
article thumbnail

A Print Magazine Launch? What?!!! California Sunday Is Coming

John Battelle's Searchblog

'The post A Print Magazine Launch? What?!!! California Sunday Is Coming appeared first on John Battelle's Search Blog. A year or so ago Chas Edwards, a colleague, pal, and member of the founding team at Federated Media, came to my office for a catch up. I had heard he was cooking up a new venture, but I didn’t know the details. Little did I know what Chas and his new partner Douglas McGray had up their sleeve – a new *print* magazine built specifically for California.

article thumbnail

A Big Day For The Internet

John Battelle's Searchblog

'The post A Big Day For The Internet appeared first on John Battelle's Search Blog. Today scores of big companies are taking symbolic action to defend the essential principles of an open Internet, and I support them. That’s why, on your first visit here today, you’ll see the “spinning ball of death” up on the right. For more information about the Internet Slowdown, head here.

79
article thumbnail

Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft

John Battelle's Searchblog

'The post Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft appeared first on John Battelle's Search Blog. I’m easing back into this weekly Else column, or put another way, I missed last week’s Else due to preparations for NewCo SF , which I’m proud to say was a huge success. This week is Detroit, then New York, London, Boulder, LA, Palo Alto, but I get ahead of myself.

Privacy 72
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

FTC Settles COPPA Violation Charges Against Yelp and TinyCo

Hunton Privacy

On September 17, 2014, the Federal Trade Commission announced that the online review site Yelp, Inc., and mobile app developer TinyCo, Inc., have agreed to settle separate charges that they collected personal information from children without parental consent, in violation of the Children’s Online Privacy Protection Rule (the “COPPA Rule”). Yelp. According to the FTC’s complaint against Yelp, from 2009 to 2013, Yelp app users had to provide information such as their name, email address, ZIP code

article thumbnail

French Data Protection Authority Reviews 100 Websites During EU Cookies Sweep Day

Hunton Privacy

On September 18, 2014, the French Data Protection Authority (the “CNIL”) announced plans to review 100 French websites on September 18-19, 2014. This review is being carried out in the context of the European “cookies sweep day” initiative, an EU online compliance audit. The Article 29 Working Party organized this joint action, which runs from September 15-19, 2014, to verify whether major EU websites are complying with EU cookie law requirements.

article thumbnail

Article 29 Working Party to Establish a Common Approach on the Right to be Forgotten for All EU Data Protection Authorities

Hunton Privacy

On September 18, 2014, the Article 29 Working Party (the “Working Party”) announced its decision to establish a common approach to the right to be forgotten (the “tool-box”). This tool-box will be used by all EU data protection authorities (“DPAs”) to help address complaints from search engine users whose requests to delete their search result links containing their personal data were refused by the search engines.