June, 2014

article thumbnail

A Return To Form In Media

John Battelle's Searchblog

'The post A Return To Form In Media appeared first on John Battelle's Search Blog. Once upon a time, print was a vibrant medium, a platform where entrepreneurial voices created new forms of value, over and over again. I’ll admit it was my native platform, at least for a while – Wired and The Industry Standard were print-driven companies, though they both innovated online, and the same could be said for Make , which I helped early in its life.

IT 111
article thumbnail

DB2 for z/OS: the Functional Advantages of Native SQL Procedures

Robert's Db2

I have been a big fan of DB2 for z/OS native SQL procedures ever since the functionality was introduced with DB2 9 , back in 1997. I have posted quite a few blog entries on the topic, the first in 1998 (written while I was working as an independent consultant) and the most recent just last month. In these blog entries, and in presentations I've delivered over the past several years (and in discussions generally), I've focused largely on performance aspects of native SQL procedures versus externa

IT 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choose the right sharing icon to boost user engagement

Elie

What’s the best icon to entice people to share something through their social networks? It turns out to be the one used on Android. While this may contradict guidelines proposed by some designers, this conclusion is based on the results of a survey of 7,500 users.

IT 48
article thumbnail

Hunton Listed as Top-Ranked Firm for Both Cyber Crime and Privacy in The Legal 500 United States 2014 Guide

Hunton Privacy

Hunton & Williams LLP proudly announces that the firm’s Global Privacy and Cybersecurity practice was ranked in Tier 1 in The Legal 500 United States 2014 guide for cyber crime and data protection and privacy. Global practice chair Lisa Sotto also was ranked as a leading lawyer and partner Aaron Simpson was highlighted for his work on privacy and cybersecurity matters.

Privacy 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What is a hot topic now, the international implementation of intelligent transport systems?

CGI

What is a hot topic now, the international implementation of intelligent transport systems? Anonymous. Thu, 06/26/2014 - 08:00. The morning is rush hour in both Helsinki and Barcelona. Both cities are also actively discussing, among other topics, how technology can facilitate peak hour traffic, and future urban transport solutions. The tenth ITS European Congress was held in Helsinki, Finland for the first time.

More Trending

article thumbnail

Feels Like Apple…in 1992

John Battelle's Searchblog

'The post Feels Like Apple…in 1992 appeared first on John Battelle's Search Blog. I went on Bloomberg today, ostensibly to talk about data marketing, NewCo, and anything newsworthy. Turns out, we talked (mostly) about Apple. Bloomberg’s got the video up here , and embedded below. While I understand the headline – Battelle: “Apple Failed to Be Apple” – that’s not exactly my point.

article thumbnail

DB2 for z/OS: Getting to Universal Table Spaces

Robert's Db2

Often, there is a bit of a time lag between the introduction of a DB2 for z/OS feature and the widespread adoption of the new technology. Take universal table spaces, for example. These were introduced with DB2 9 for z/OS (almost 7 years ago), but some organizations are only now beginning to convert non-universal table spaces to the universal variety.

IT 48
article thumbnail

UK Government launches “Cyber Essentials” badge

Privacy and Cybersecurity Law

The UK Government has launched a new cyber security certification framework called “Cyber Essentials“ This is part of a continuing effort […].

article thumbnail

New Centre for Information Policy Leadership White Paper on a “Privacy Risk Framework” and the “Risk-Based Approach”

Hunton Privacy

The Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) has published a white paper entitled A Risk-based Approach to Privacy: Improving Effectiveness in Practice. This is the first paper in the Centre’s new multi-year Privacy Risk Framework Project. It follows the Centre’s March 2014 Risk Workshop, held in Paris with Centre members, privacy experts, regulators and other stakeholders.

Paper 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Electric cars need to be supported by intelligent transport systems

CGI

Electric cars need to be supported by intelligent transport systems. Anonymous. Fri, 06/20/2014 - 10:00. It is not surprising that there is a world of expectation from electric cars. Electro-mobility is far more than replacing internal combustion engines with electric motors and tanks with batteries. It is about taking auto-IQ to an entirely new level - with thinking auto parts that avoid traffic jams, prevent collisions and are part of an intelligent traffic flow controlled by an invisible hand

article thumbnail

Execute without read

Scary Beasts Security

A couple of years ago, during an idle moment, I wondered what we could do if we had the hardware CPU primitive of pages with permissions execute-only (i.e. no read and write): [link] It turns out that aarch64 has exactly such support. Here's support heading in to the Linux kernel: [link] The original idea was to defeat ROP by having all of the instructions randomized a bit on a per-install basis.

IT 20
article thumbnail

Why You Need to See ‘Her’ (Or, ‘Her’ Again)

John Battelle's Searchblog

'The post Why You Need to See ‘Her’ (Or, ‘Her’ Again) appeared first on John Battelle's Search Blog. A while ago I wrote a piece about Dave Egger’s latest novel The Circle. I gave the post the too-clever-by-twice title of Why You Should Read The Circle, Even If You Don’t Buy It. While the book had (to my mind) deep flaws, it was far too important to not read.

article thumbnail

Else 6.2.14: What Do We Want The Internet To Be?

John Battelle's Searchblog

'The post Else 6.2.14: What Do We Want The Internet To Be? appeared first on John Battelle's Search Blog. So much to note over these past two weeks (I took last Monday off for Memorial Day): Google bends to the Euro and tops Apple in a key index that doesn’t really matter (much), Meeker updates her famously design-challenged Internet Trends powerpoint deck, and we continue the endless debate around what we want the Internet to be.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Search and Apps – Give Consumers Back Their Links

John Battelle's Searchblog

'The post Search and Apps – Give Consumers Back Their Links appeared first on John Battelle's Search Blog. I’ve railed against the “chicletized” world of apps for years. I’ve never been a fan of the way mobile has evolved, with dozens, if not hundreds, of segregated little “chiclets” of stovepiped apps, none of which speak to each other, all without any universal platform to unite them save the virtual walled garden of Apple or Google’s app st

IT 86
article thumbnail

Else 6.16.14: Internet Ads Grow, Apple Ads Blow

John Battelle's Searchblog

'The post Else 6.16.14: Internet Ads Grow, Apple Ads Blow appeared first on John Battelle's Search Blog. Up and to the right, baby. Lots of advertising news in this issue of Signal, as the bi-annual IAB report shows strong gains (YAY, Internet!). To the links: Internet Ads Surge 19% in Just One Year – WSJ That’s strong growth for an industry working on its 21st year. ( IAB report ).

article thumbnail

Else 6.9.14: The Internet Beats Rabbit Ears

John Battelle's Searchblog

'The post Else 6.9.14: The Internet Beats Rabbit Ears appeared first on John Battelle's Search Blog. The world’s most fascinating story kept time this past week – cord cutting beat rabbit ears, Google took some punches, and billion-dollar companies pondered their fate once the bloom starts to fade. To the links… Internet-TV Delivery to Surpass Over-the-Air – Worldscreen Worth noting that more of us get TV from the Internet than get it from “over the air”

article thumbnail

Else 6.30.14: Input, Output, Kaput

John Battelle's Searchblog

'The post Else 6.30.14: Input, Output, Kaput appeared first on John Battelle's Search Blog. This past week in tech brought Google’s I/O developer conference, and with it lots of debate on the culture of the Valley, the future of links in the mobile world, the end of the Internet (again), and the death of the IPO. To the (dead? resurgent?) links: In­side the Mir­rortoc­ra­cy – Carlos Buenos From time to time a commentator hits the mark when it comes to the Valley’s cultur

IT 67
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Else 6.23.14: Questioning Valley Idols

John Battelle's Searchblog

'The post Else 6.23.14: Questioning Valley Idols appeared first on John Battelle's Search Blog. A fascinating week of links, starting with a blast from the past (see above), but the real meat of the week came in the debates around some of the Valley’s most scared cows. For more, read on… Tech Time Warp of the Week: Watch IBM Warn Us About Glassholes 10 Years Ago- Wired I am particularly enamored with “Park Bench” – if I saw a guy doing what this guy is doing i

FOIA 65
article thumbnail

German DPAs Publish App Guidelines and Step Up Enforcement

Hunton Privacy

On June 18, 2014, the German state data protection authorities responsible for the private sector (the Düsseldorfer Kreis) issued guidelines concerning the data protection requirements for app developers and app publishers (the “Guidelines”). The Guidelines were prepared by the Bavarian state data protection authority and cover requirements in Germany’s Telemedia Act as well as the Federal Data Protection Act.

article thumbnail

Proposed Legislation Would Give EU Citizens Right to Sue in U.S. for Wrongful Disclosure of Personal Information

Hunton Privacy

On June 25, 2014, U.S. Attorney General Eric Holder announced that the Obama Administration is looking to pass legislation that would provide EU citizens with a right to judicial redress in U.S. courts if their personal information that was shared for law enforcement purposes is later intentionally or wilfully disclosed. The announcement was made during the EU-U.S.

Privacy 40
article thumbnail

Supreme Court Finds Warrantless Cell Phone Searches Unconstitutional

Hunton Privacy

On June 25, 2014, the United States Supreme Court issued a unanimous opinion in Riley v. California , holding 9-0 that law enforcement personnel cannot search detained suspects’ cell phones without a warrant. Writing for the Court, Chief Justice John Roberts found that the practice of searching cell phones implicates “substantially greater” individual privacy interests than other physical objects that may be found on an arrestee and deserves heightened protections.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Restrictions on Cross-Border Data Flows Discussed at President’s Export Council Meeting

Hunton Privacy

On June 19, 2014, the President’s Export Council (“PEC”) held a meeting to discuss nine key issues, including the effects of foreign laws that restrict cross-border data flows. At the meeting, the private sector members of the PEC submitted a recommendation letter to President Obama expressing their concern about the threat to American business from protectionist, cross-border data transfer restrictions imposed by foreign countries.

article thumbnail

HHS Settles Case Involving Unattended Medical Records

Hunton Privacy

On June 23, 2014, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $800,000 settlement with Parkview Health System, Inc. (“Parkview”) following a complaint involving patient medical records that were dumped by Parkview employees and left unattended on a physician’s driveway. In 2008, Parkview took custody of hard copy medical records containing protected health information of several thousand patients of a retiring physician.

Privacy 40
article thumbnail

Recent Developments Concerning Cybersecurity Disclosure for Public Companies

Hunton Privacy

Cyber incidents have become more common — and more severe — in recent years. Like other federal agencies, the Securities and Exchange Commission (“Commission”) has recently been analyzing the applicability of its existing regulations relating to cybersecurity risks. The Commission’s efforts are focused on maintaining the integrity of market systems, protecting customer data and the disclosure of material information.

article thumbnail

DOJ Announces Multinational Efforts to Disrupt Gameover Zeus Botnet

Hunton Privacy

On June 2, 2014, the U.S. Department of Justice announced a U.S.-led multinational effort to disrupt the “Gameover Zeus” botnet and the malware known as “Cryptolocker.” The DOJ also unsealed charges filed in Pittsburgh, Pennsylvania and Omaha, Nebraska against an administrator of Gameover Zeus. Gameover Zeus, a sophisticated type of malware that first emerged in 2011, is designed to steal banking and other credentials from the computers it infects.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Article 29 Working Party Comments on the Risk-Based Approach to Privacy

Hunton Privacy

In response to increasing interest in a “risk-based” approach among privacy experts, including policymakers working on the proposed EU General Data Protection Regulation, the Article 29 Working Party (the “Working Party”) published a statement on the role of a risk-based approach in data protection legal frameworks (the “Statement”). The Statement confirms the Working Party’s general support for including a risk-based approach in the EU data protection framework.

Risk 40
article thumbnail

Connecticut Governor Signs Pharmacy Reward Program Authorization Bill into Law

Hunton Privacy

On June 12, 2014, Connecticut Governor Dannel Malloy signed a bill into law that may require retailers to modify their existing Health Insurance Portability and Accountability Act (“HIPAA”) authorizations for pharmacy reward programs. The law, which will become effective on July 1, 2014, obligates retailers to provide consumers with a “plain language summary of the terms and conditions” of their pharmacy reward programs before the consumers may enroll.

Retail 40
article thumbnail

Developing technology to ensure Nurses never miss a beat when providing high quality care

CGI

Developing technology to ensure Nurses never miss a beat when providing high quality care. ravi.kumarv@cgi.com. Tue, 06/17/2014 - 04:23. Nurses are at the heart of healthcare delivery in the NHS and form the largest staff group involved in patient care working across all care settings - from Accident and Emergency to visiting patients at home. It takes a caring, compassionate and dedicated professional to juggle such a wide range of tasks and communicate clearly with colleagues and patients.