September, 2014

article thumbnail

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

'The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up. Recently I began a walkabout of sorts, with a goal of ameliorating my rather thin understanding of the mobile marketplace. If you read me closely, you know I’ve been more than frustrated with what I call the “ chicletized world ” of disconnected mobile apps.

Marketing 112
article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: DDF, Stored Procedures, and SET CURRENT PACKAGESET

Robert's Db2

Recently, I was talking with people from a company's IT department about modernizing their mainframe application architecture.Among other things, we discussed increasing the company's use of stored procedures for DB2 for z/OS data access. That prompted some questions around the use of the DB2 SQL statement SET CURRENT PACKAGESET in stored procedures called by DRDA requesters (these being calls that would get to DB2 via the distributed data facility, or DDF).

Access 48
article thumbnail

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Article 29 Working Party States Principles in EU Data Protection Law Apply to Big Data

Hunton Privacy

On September 16, 2014, the Article 29 Working Party (the “Working Party”) adopted a Statement on the impact of the development of big data on the protection of individuals with regard to the processing of their personal data in the EU (“Statement”). This two-page Statement sets forth a number of “key messages” by the Working Party on how big data impacts compliance requirements with EU privacy law, with the principal message being that big data does not impact or change basic EU data protection

More Trending

article thumbnail

Every Company Is An Experience Company

John Battelle's Searchblog

'The post Every Company Is An Experience Company appeared first on John Battelle's Search Blog. Illustration by Craig Swanson and idea by James Cennamo. Some years ago while attempting to explain the thinking behind my then-startup Federated Media, I wrote that all brands are publishers (it was over on the FM blog, which the new owners apparently have taken down – a summary of my thinking can be found here ).

Retail 106
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 97
article thumbnail

DB2 for z/OS: Avoiding zIIP Engine Contention Issues

Robert's Db2

In an entry posted a few months ago to this blog, I touched on several matters pertaining to mainframe zIIP engines and the use of these processors by DB2 for z/OS. Based on recent experience, I feel that it's important to further highlight a particular zIIP-related issue: zIIP engine contention. Through this post, I want to explain what zIIP contention is, why you want to avoid it, how you can spot it, and what you can do about it.

IT 48
article thumbnail

Speaking at SUGDC Tonight

JKevinParker

I am excited to be speaking at SUGDC (SharePoint Users Group of DC) tonight. I am presenting on "How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information". This is material adapted from an AIIM course I developed that is available in the AIIM Resource Center for professional members.

40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Appeals Court Holds User Consent Required to Enforce Website Terms of Use

Hunton Privacy

A recent decision by the United States Court of Appeals for the Ninth Circuit reinforces the importance of obtaining affirmative user consent to website Terms of Use for website owners seeking to enforce those terms against consumers. In Nguyen v. Barnes & Noble Inc. , the Ninth Circuit held that Barnes & Noble’s website Terms of Use (“Terms”) were not enforceable against a consumer because the website failed to provide sufficient notice of the Terms, despite having placed conspicuous hy

Retail 40
article thumbnail

Transformation strategies for building a “cloud-enabled” enterprise

CGI

Transformation strategies for building a “cloud-enabled” enterprise. shobana.lv@cgi.com. Fri, 09/12/2014 - 08:00. Cloud-enabled enterprises take a “cloud-first” approach to IT service delivery, taking advantage of cloud capabilities offered by external suppliers instead of building them in house. However, purchasing many different types of cloud services from multiple suppliers in an ad-hoc fashion leads to a highly fragmented IT environment, which, in turn, will negate the many benefits of clou

Cloud 40
article thumbnail

We’re Innumerate, Which Is Why We Love Visualizations

John Battelle's Searchblog

'The post We’re Innumerate, Which Is Why We Love Visualizations appeared first on John Battelle's Search Blog. This weekend I reviewed my notes from a few weeks of late summer meetings, and found this gem from a conversation with Mike Driscoll, the CEO and co-founder of data analytics firm MetaMarkets. MetaMarkets helps adtech firms make sense of the reams of data they collect each day (hour, minute, second…).

Analytics 104
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 55
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

DC, Northern Virginia Digital Strategy - for Businesses, Agencies, Nonprofits - Upcoming NVTC.org Committee Meetings 2014-2015

Interactive Information Management

Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015. Or join the NVTC now to participate! Hear from other #NVTC business and government members, sharing information regarding the approach to a Digital Strategy, executing and sustaining it for innovative business value.

article thumbnail

Managing SharePoint User Access

JKevinParker

What is the best way to manage individual users' access to SharePoint sites? Through AD security groups inside corresponding SharePoint groups. I prefer to keep the names consistent between SharePoint and AD security groups. Example Permission Groups for SharePoint. AD Security Group SharePoint Group SharePoint Permission Level. WebApp1_Site1_InfoManagers WebApp1_Site1_InfoManagers Manage Information.

Access 40
article thumbnail

Article 29 Working Party Issues an Opinion on Internet of Things

Hunton Privacy

On September 22, 2014, the Article 29 Working Party (the “Working Party”) released an Opinion on the Internet of Things (the “Opinion”) that was adopted during the last plenary session of the Working Party in September 2014. With this Opinion, the Working Party intends to draw attention to the privacy and data protection challenges raised by the Internet of Things and to propose recommendations for the stakeholders to comply with the current EU data protection legal framework.

article thumbnail

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing

John Battelle's Searchblog

'The post Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing appeared first on John Battelle's Search Blog. ( image ) This past week’s links are rife with people asking hard questions of Google and Facebook, and so much the better, I’d warrant. You don’t get to the lead position without raising questions.

Marketing 103
article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

article thumbnail

Life Break: Go See “Take Me To The River”

John Battelle's Searchblog

'The post Life Break: Go See “Take Me To The River” appeared first on John Battelle's Search Blog. It’s rare I write about things not directly related to the Internet industry, but the film Take Me To The River , a multi-year project helmed by my friend and colleague Martin Shore, is certainly worthy of a detour. If you love music, any kind of music, this film is a must.

IT 97
article thumbnail

A Print Magazine Launch? What?!!! California Sunday Is Coming

John Battelle's Searchblog

'The post A Print Magazine Launch? What?!!! California Sunday Is Coming appeared first on John Battelle's Search Blog. A year or so ago Chas Edwards, a colleague, pal, and member of the founding team at Federated Media, came to my office for a catch up. I had heard he was cooking up a new venture, but I didn’t know the details. Little did I know what Chas and his new partner Douglas McGray had up their sleeve – a new *print* magazine built specifically for California.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

A Big Day For The Internet

John Battelle's Searchblog

'The post A Big Day For The Internet appeared first on John Battelle's Search Blog. Today scores of big companies are taking symbolic action to defend the essential principles of an open Internet, and I support them. That’s why, on your first visit here today, you’ll see the “spinning ball of death” up on the right. For more information about the Internet Slowdown, head here.

79
article thumbnail

Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft

John Battelle's Searchblog

'The post Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft appeared first on John Battelle's Search Blog. I’m easing back into this weekly Else column, or put another way, I missed last week’s Else due to preparations for NewCo SF , which I’m proud to say was a huge success. This week is Detroit, then New York, London, Boulder, LA, Palo Alto, but I get ahead of myself.

Privacy 72
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 40
article thumbnail

FTC Settles COPPA Violation Charges Against Yelp and TinyCo

Hunton Privacy

On September 17, 2014, the Federal Trade Commission announced that the online review site Yelp, Inc., and mobile app developer TinyCo, Inc., have agreed to settle separate charges that they collected personal information from children without parental consent, in violation of the Children’s Online Privacy Protection Rule (the “COPPA Rule”). Yelp. According to the FTC’s complaint against Yelp, from 2009 to 2013, Yelp app users had to provide information such as their name, email address, ZIP code

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

French Data Protection Authority Reviews 100 Websites During EU Cookies Sweep Day

Hunton Privacy

On September 18, 2014, the French Data Protection Authority (the “CNIL”) announced plans to review 100 French websites on September 18-19, 2014. This review is being carried out in the context of the European “cookies sweep day” initiative, an EU online compliance audit. The Article 29 Working Party organized this joint action, which runs from September 15-19, 2014, to verify whether major EU websites are complying with EU cookie law requirements.

article thumbnail

Article 29 Working Party to Establish a Common Approach on the Right to be Forgotten for All EU Data Protection Authorities

Hunton Privacy

On September 18, 2014, the Article 29 Working Party (the “Working Party”) announced its decision to establish a common approach to the right to be forgotten (the “tool-box”). This tool-box will be used by all EU data protection authorities (“DPAs”) to help address complaints from search engine users whose requests to delete their search result links containing their personal data were refused by the search engines.

article thumbnail

Hunton Global Privacy Update – September 2014

Hunton Privacy

On September 16, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program covered a number of privacy and data protection topics, including updates in the EU and Germany, highlights on the UK Information Commissioner’s Office annual report and an APEC update.

Privacy 40