October, 2014

article thumbnail

The Next Stage of Mobile Quickening: Links Get Intelligent

John Battelle's Searchblog

'The post The Next Stage of Mobile Quickening: Links Get Intelligent appeared first on John Battelle's Search Blog. How Branch Metrics works…click to enlarge. Early in a conversation with Alex Austin, CEO of mobile startup Branch Metrics , I had to interrupt and ask what seemed like a really dumb question. “So, wait, Alex, you’re telling me that the essence of your company’s solution is that it… makes sure a link works?

Passwords 111
article thumbnail

DB2 for z/OS: Thoughts on Table Space and Index Page Size Selection

Robert's Db2

The other day I got a note, from a DB2 for z/OS DBA, in which I was asked for my thoughts regarding the selection of page size for a table space. I typed out what I hoped would be a useful response, and found myself thinking, as I sometimes do, "Hey -- I could turn this into a blog entry." And so I have. I'll start here by offering some guidelines on page size selection for table spaces, and then I'll shift to the index perspective on the matter.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information

JKevinParker

This presentation is adapted from a tutorial I wrote for AIIM , which is available in their SharePoint Resource Center. I also presented some of this material at the SharePoint Users Group of DC (SUGDC) on 9/11/2014. How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information from Kevin Parker. The AIIM Resource Centers offer lots of tutorials, webinars, publications, perspectives and more on SharePoint and a host of Information Management topics.

article thumbnail

Software Robots – friend or foe?

CGI

Software Robots – friend or foe? p.butler@cgi.com. Fri, 10/31/2014 - 04:00. Robotics are not new. They have existed in manufacturing for many years and their potential has been showcased again by Honda in the form of New ASIMO , which I personally think is a fantastic piece of engineering. But what are software robots? Software Robots, or Robotic Process Automation to use its correct name, is the “application of technology that allows employees in a company to configure computer software or a ‘

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FCC Announces Intended $10 Million Fine in First Data Security Case

Hunton Privacy

On October 24, 2014, the Federal Communications Commission announced that it intends to impose a $10 million fine on TerraCom, Inc. (“TerraCom”) and YourTel America, Inc. (“YourTel”) for violating privacy laws relating to their customers’ personal information. This announcement marks the FCC’s first enforcement action in the data security arena as well as its largest privacy action to date.

More Trending

article thumbnail

My Picks for NewCo Silicon Valley

John Battelle's Searchblog

'The post My Picks for NewCo Silicon Valley appeared first on John Battelle's Search Blog. We’re more than halfway through the NewCo festival season, with Amsterdam, San Francisco, Detroit, New York, and London/UK behind us, and Silicon Valley, Boulder, and Los Angeles coming up. Next up is Silicon Valley , which goes off Oct. 21 – 23, centered on the axis of Palo Alto.

article thumbnail

DB2 for z/OS Stored Procedures: Native SQL, or Java?

Robert's Db2

Recently, a mainframe DB2 DBA put a question to me: when should DB2 for z/OS native SQL procedures be used versus Java stored procedures, and vice versa? Why he asked: the DBA worked with a group of developers who, collectively, could code both of these DB2 stored procedure types. Within this group, individuals tended to go with what they were used to.

Access 48
article thumbnail

Living Systems and The Information First Company

John Battelle's Searchblog

'The post Living Systems and The Information First Company appeared first on John Battelle's Search Blog. A map tracing the information flows within Uber’s San Francisco market. One of the great joys of my career is the chance to speak at gatherings of interesting people. Sometimes it’s an unscripted, wide ranging conversation (like during Advertising Week , for example), but other times it’s a formal presentation, which means many hours of preparation and reportage.

article thumbnail

Around The Kitchen Table, a Better Way To Finance “Secondaries” Is Born

John Battelle's Searchblog

'The post Around The Kitchen Table, a Better Way To Finance “Secondaries” Is Born appeared first on John Battelle's Search Blog. Nearly a decade ago I was two years into starting a new company, one that was growing quickly, but at the same time struggling with all the classic problems of a startup. We needed to raise more capital, we needed to hire more of the right people, and we needed to retain and motivate the people we already had brought onboard.

Sales 99
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

“Peak Google”? Maybe, But Is “Native” The Reason?

John Battelle's Searchblog

'The post “Peak Google”? Maybe, But Is “Native” The Reason? appeared first on John Battelle's Search Blog. From Thompson’s “Peak Google” post. I love Ben Thompson’s Stratechery site, so much in fact that I’m writing a response to his recent “ Peak Google ” post, even though these days most of us limit our bloggy commentary to the 140-character windows of Twitter.

article thumbnail

My NewCo Los Angeles Picks

John Battelle's Searchblog

'The post My NewCo Los Angeles Picks appeared first on John Battelle's Search Blog. I love LA. There, I said it. Yes, I made my entire career and life up here in the Bay Area, and the Dodgers bother me immensely. But I was born in LA, I grew up there, and every time I get back, I get homesick for the light, the warm air, the heady nonsense, and – lately – the extraordinary business culture that’s been brewing these past five or ten years.

IT 86
article thumbnail

Else 10.13.14: Smiling Happy Facebook People (Not Teens, Though)

John Battelle's Searchblog

'The post Else 10.13.14: Smiling Happy Facebook People (Not Teens, Though) appeared first on John Battelle's Search Blog. Now you can buy real, smiling, happy shiny people all over the web, courtesy Facebook. Today’s summary covers the past two weeks of worthy reads, with a strong dose of the Internet’s twin titans Facebook and Google.

IT 83
article thumbnail

Else 10.27.14 – Assange Takes on Google

John Battelle's Searchblog

'The post Else 10.27.14 – Assange Takes on Google appeared first on John Battelle's Search Blog. ( image ) So what are the most powerful, important, noteworthy stories of the past ten or so days? Read on to find out… Assange: Google Is Not What It Seems – Newsweek. Julian Assange veers between wild eyed conspiracy theory and, well, level-headed conspiracy theory in this rather factless but quite compelling read.

IT 83
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

FCC Joins the Global Privacy Enforcement Network

Hunton Privacy

On October 28, 2014, the Federal Communications Commission announced that it has joined the Global Privacy Enforcement Network (“GPEN”), a network of approximately 50 privacy enforcement authorities from around the world. The FCC is the second U.S. privacy enforcement authority to join GPEN. The other U.S. member, the Federal Trade Commission, helped establish the network in 2010.

Privacy 40
article thumbnail

UK Government Seeks Stronger Enforcement Powers Against Nuisance Callers and Texters

Hunton Privacy

The UK government has announced proposals designed to make it easier for the Information Commissioner’s Office (“ICO”) to fine companies responsible for nuisance calls and text messages. Under the proposals, the current maximum fine of £500,000 would remain unchanged, but the threshold for imposing fines would be lowered. The rules regarding nuisance calls and texts in the UK are contained in the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) and are enforced by t

article thumbnail

Council of the European Union Proposes Risk-Based Approach to Compliance Obligations

Hunton Privacy

The Council of the European Union has published proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the forthcoming EU General Data Protection Regulation (“Regulation”). This proposal was led by the current Italian Presidency and the revisions reflect input from representatives of the national governments of the EU Member States.

article thumbnail

Toward Goals

Positively RIM

ARMA 2014 – the conference and expo – met in San Diego this week. Here's my initial impression and a differentiator from past meetings: More devotees of Records & Information Management/Governance now recognize that their efforts must enhance and support movement toward their organizations’ goals. In the private sector, that generally means contributing to black ink on the balance sheet.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

FTC Reaches Settlement with Online Marketers Over Text Message Spamming, Robocalling and Mobile Cramming Charges

Hunton Privacy

On October 22, 2014, the Federal Trade Commission announced that several interrelated online marketing and advertising companies (“Stipulating Defendants”) agreed to pay nearly $10 million to settle allegations that they engaged in a pattern of text message spamming, robocalling and mobile cramming practices in violation of Section 5 of the FTC Act, the Telemarketing and Consumer Fraud and Abuse Prevention Act, and the Telemarketing Sales Rule.

article thumbnail

TD Bank Agrees to Settlement to Resolve Multistate Investigation into 2012 Data Breach

Hunton Privacy

On October 10, 2014, TD Bank, N.A. entered into an assurance of voluntary compliance (“Assurance”) with a multistate group of nine attorneys general to settle allegations that the company violated state consumer protection and personal information safeguards laws in connection with a 2012 data breach. The breach involved the loss of two unencrypted backup tapes containing the personal information of approximately 260,000 customers.

article thumbnail

CFPB Updates GLB Privacy Rule to Allow Online Privacy Notices

Hunton Privacy

On October 20, 2014, the Consumer Financial Protection Bureau (“CFPB”) announced a finalized rule that enables certain financial institutions to comply with the Gramm-Leach-Bliley Act (“GLB”) by publishing their financial privacy notices online instead of mailing them to their customers. The GLB Privacy Rule requires financial institutions to provide privacy notices to their customers on an annual basis.

Privacy 40
article thumbnail

German DPAs Adopt Resolutions Regarding “Connected Cars” and Cooperation with Competition Authorities

Hunton Privacy

On October 9, 2014, the 88th Conference of the German Data Protection Commissioners concluded in Hamburg. This biannual conference provides a private forum for all German state data protection authorities (“DPAs”) and the Federal Commissioner for Data Protection and Freedom of Information to share their views on current data protection issues, discuss relevant cases and adopt resolutions aimed at harmonizing how data protection law is applied across Germany.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Obama’s New Executive Order Focuses on Securing Consumer Payments

Hunton Privacy

On October 17, 2014, the White House announced that the President signed a new executive order focused on cybersecurity. The signed executive order, entitled Improving the Security of Consumer Financial Transactions (the “Order”), is focused on securing consumer transactions and sensitive personal data handled by the U.S. Federal Government. The highlights of today’s Order include: Securing Federal Payments.

article thumbnail

Mauritius Conference Panelists Endorse Coordinated Approach to Net Neutrality and Data Protection

Hunton Privacy

On October 16, 2014, the 36th International Conference of Data Protection and Privacy Commissioners in Mauritius hosted a panel including representatives from the European Data Protection Supervisor (“EDPS”) and Hunton & Williams to discuss the need for a coordinated approach to net neutrality and data protection in the EU. While there are divergent views on what net neutrality should (or should not) entail, net neutrality in the EU typically refers to the principle that all Inte

article thumbnail

Centre Reports on 36th International Conference of Data Protection and Privacy Commissioners

Hunton Privacy

During the October 14, 2014 closed session of the 36th International Conference of Data Protection and Privacy Commissioners (the “Conference”) held in Balaclava, Mauritius, the host, the Data Protection Office of Mauritius, and member authorities of the Conference issued the “Mauritius Declaration on the Internet of Things,” and four new resolutions – a “Resolution on Accreditation” of new members, a “Resolution on Big Data,” a “Resolution on enforcement cooperation,” and a “Resolution on Priva

Privacy 40
article thumbnail

Chinese Supreme People’s Court Issues Interpretations Regarding the Publication of Personal Information on the Internet

Hunton Privacy

In October 2014, the People’s Republic of China Supreme People’s Court issued interpretations regarding the infringement of privacy and personal information on the Internet. The interpretations are entitled Provisions of the Supreme People’s Court on Several Issues concerning the Application of the Rules regarding Cases of the Infringement of Personal Rights over Information Networks (the “Provisions”) and became effective on October 10, 2014.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

California Attorney General Settles Laptop Spying Case with Rent-to-Own Franchisor

Hunton Privacy

On October 14, 2014, rent-to-own retailer Aaron’s, Inc. (“Aaron’s”) entered into a $28.4 million settlement with the California Office of the California Attorney General related to charges that the company permitted its franchised stores to unlawfully monitor their customers’ leased laptops. The settlement stems from a complaint filed on October 7 in the Superior Court of California County of Los Angeles by the Attorney General of California.

Retail 40
article thumbnail

Cybersecurity Incident Highlights Questions about Cyber Insurance Coverage

Hunton Privacy

On October 8, 2014, the Department of Homeland Security reported that over the course of several months, the network of a large critical manufacturing company was compromised. According to the ICS-CERT Monitor , the compromised company is a conglomerate that acquired multiple organizations in recent years, resulting in multiple corporate networks being merged.

article thumbnail

FTC Announces Settlement with AT&T in Mobile Cramming Case

Hunton Privacy

On October 8, 2014, the Federal Trade Commission announced an $80 million settlement with mobile phone carrier AT&T Mobility, LLC (“AT&T”) stemming from allegations related to mobile cramming. The $80 million payment to the FTC is part of a larger $105 million settlement between AT&T and various federal and state regulators, including the Federal Communications Commission and the attorneys general of all 50 states and the District of Columbia.