This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014. Last week Google CEO Larry Page got the Fortune magazine cover treatment , the latest of many such pieces attempting to quantify Google’ sprawling business. The business press is obsessed with answering the question of whether we’ve reached “ Peak Google.” (Clearly Fortune’s opinion is that we have not, given they
Short answer: lower than I'd previously thought. Short explanation: solid-state drives. OK, backstory: I was recently analyzing some performance information related to a client's production DB2 for z/OS environment. Included in the documentation provided by the client were some Accounting Long reports generated by their DB2 monitor (these reports format data contained in DB2 accounting trace records).
The remote control tower ….the remote control airport? Enabled by the Internet of Things. ravi.kumarv@cgi.com. Wed, 11/26/2014 - 02:06. Aviation is growing and operational, regulatory, security, and commercial expectations are changing , and this is placing pressure on the associated airport infrastructure, much of which can require enormous redesign and capital expenditure to meet these challenges.
On November 21, 2014, Massachusetts Attorney General Martha Coakley announced that Boston hospital Beth Israel Deaconess Medical Center (“BIDMC”) has agreed to pay a total of $100,000 to settle charges related to a data breach that affected the personal and protected health information of nearly 4,000 patients and employees. In its complaint, the Attorney General alleged that a trespasser entered an unlocked office of a BIDMC physician and stole a personal laptop containing unencrypted names, So
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.
I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.
'The post The Web Will Kill Apps appeared first on John Battelle's Search Blog. Lots of the “apps are killing the web” meme going around these days, with the latest batch of casket sealant come from no greater validator of commonly agreed upon wisdom than the Wall St. Journal. “The Web Is Dying; Apps Are Killing It” argues Christopher Mims, and it’s hard to argue with him given the preponderance of current evidence.
'The post Whither the Public Commons? Enter The Private Corporation appeared first on John Battelle's Search Blog. ( image ) From time to time a piece reminds us that we are in a slow, poorly articulated struggle over what we hold as a public commons. That was the case with Vanity Fair’s Man and Uber Man , a profile of Uber’s Travis Kalanick by Kara Swisher.
'The post The Internet Big Five: Doubling In Three Years On A Trillion Dollar Base appeared first on John Battelle's Search Blog. From time to time I have tracked what I call the “Internet Big Five” – the key platform technology companies that are driving the Internet economy. Nearly three years ago I wrote the first of this series – The Internet Big Five.
'The post Else 11.03.14: It’s Over, Google. Now What? appeared first on John Battelle's Search Blog. ( image ) Our friends in the press have decided that search has had its decade in the sun, and I can’t disagree, at least as it was known before. The question of how it becomes something else is still very much afoot, but not solved.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On November 18, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program covered a number of privacy and data protection topics, including a report on the International Conference of Data Protection and Privacy Commissioners , highlights on the Council of the European Union’s proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the fo
On November 18, 2014, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) held the second workshop in its ongoing work on the risk-based approach to privacy and a Privacy Risk Framework. Approximately 70 Centre members, privacy regulators and other privacy experts met in Brussels to discuss the benefits and challenges of the risk-based approach, operationalizing risk assessments within organizations, and employing risk analysis in enforcement.
On November 17, 2014, the Federal Trade Commission announced that data privacy certifier True Ultimate Standards Everywhere, Inc. (“TRUSTe”) has agreed to settle charges that the company deceived consumers about its recertification program and misrepresented that it was a non-profit entity in violation of Section 5 of the FTC Act. TRUSTe offers a variety of assessments and certifications (“Certified Privacy Seals”) for online business websites and mobile applications.
On November 12, 2014, the Federal Trade Commission announced that in response to FTC complaints, a federal court has ordered two debt brokerage companies to notify over 70,000 consumers whose sensitive personal information was posted on a public website by the debt brokerage companies. The two defendants are debt brokers that sell portfolios of consumer debt for eventual collection by third party debt collectors.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Join us at the International Association of Privacy Professionals (“IAPP”) Data Protection Congress in Brussels, November 18-20, 2014. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Internet of Things, Data Protection and Security: What are the Legal Challenges, and How Do We Overcome Them? Preconference Workshop: Tuesday, November 18, 2:00 p.m.
Hunton & Williams Labor & Employment partner Susan Wiltsie reports: Fears of a worldwide Ebola pandemic appear to have abated, but the tension between workplace safety and employee privacy, thrown into relief by this health emergency, remains an issue relevant to all employers. Any potential health threat created by contagious illness requires employers to plan and put into effect a reasonable response, including policies governing the terms and conditions under which employees may be re
Enabling Data Driven Business Models. p.butler@cgi.com. Thu, 11/13/2014 - 04:06. The business world is changing at a rate we would not have believed ten years ago. My colleague Ian Watts, CGI’s Director of Consulting, uses the phrase ‘change is the constant, it’s the rate of acceleration for different industries that we need to understand’ , which I think captures the challenge businesses are grappling with quite well.
Does the advance of smart devices mean the end of the World Wide Web as we know it? sarah.robins@cgi.com. Wed, 11/12/2014 - 05:05. In many ways the Internet provides a platform which aggregates data from content providers and adds a user friendly, consistent presentation layer for easy consumption. Information is created and published online; it is indexed and sorted, manipulated for various devices and then remains there to be consumed at our leisure.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Care for an example of how IT, Legal, and Records need to work together (commonly known as Information Governance?) Here’s one development: Technology at ARMA International is a fascinating mélange. Each year, we see incremental improvements. There are faster scanners, increasingly subtle analytics, greater capacities, more resolution, less-volatile media, and more.
On October 15, 2014, the UK Information Commissioner’s Office (“ICO”) published a code of practice regarding the use of surveillance cameras (“Code of Practice”). The Code of Practice explains how the legal requirements of the Data Protection Act 1998 apply to operators of surveillance cameras. Practical and technological advancements have led to a wide variety of surveillance camera technologies that differ from traditional CCTV ( e.g. , Automatic Number Plate Recognition cameras and body-worn
On November 1, 2014, the Global Privacy Enforcement Network (“GPEN”) posted a media release on their workshop held on October 12, 2014, in Mauritius on the use of publicity as a regulatory compliance technique. The workshop, attended by 44 commissioners and staff from around the world, focused on different issues concerning privacy enforcement, including the effectiveness of monetary penalties in enforcing data protection laws and the diverse approaches to enforcement publicity.
Hunton & Williams Insurance Litigation & Counseling partner Lon Berk reports: As the demand for cyber insurance has skyrocketed, so too has the cost. One broker estimates that sales in 2014 will double from the $1 billion premium collected in 2013. Much of the increase in demand and cost has been the result of the widely publicized hacks of the point-of-sale systems at large retailers, and the primary emphasis of most cyber policies is to address liability arising from such events.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On October 28, 2014, the German Federal Court of Justice referred the question of whether an IP address constitutes personal data under the EU Data Protection Directive 95/46/EC (“EU Data Protection Directive”) to the European Court of Justice (“ECJ”). The German court referred the question to the ECJ for a preliminary ruling in connection with a case that arose in 2008 when a German citizen challenged the German federal government’s storage of the dynamic IP addresses of users on government web
This week, the Article 29 Working Party (“Working Party”) prepares to debate various proposals on the “one-stop-shop” mechanism under the proposed EU General Data Protection Regulation (“Regulation”). Hunton & Williams’ Global Privacy and Cybersecurity practice and its Centre for Information Policy Leadership submitted a strategy paper on the one-stop-shop to the Working Party.
On October 8, 2014, the United States District Court for the Northern District of Georgia granted Cartoon Network, Inc.’s (“Cartoon Network’s”) motion to dismiss a putative class action alleging that Cartoon Network’s mobile app impermissibly disclosed users’ personally identifiable information (“PII”) to a third party data analytics company under the Video Privacy Protection Act (“VPPA”).
On October 30, 2014, the Supreme Court of Canada extended the deadline for the province of Alberta to amend its Personal Information Protection Act (“PIPA”). In November 2013, the Supreme Court of Canada declared PIPA invalid because it interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On November 3, 2014, the Federal Financial Institutions Examination Council (“FFIEC”), on behalf of its members, released a report entitled FFIEC Cybersecurity Assessment General Observations (the “Report”) that contains observations from recent cybersecurity assessments conducted at over 500 community financial institutions as part of the FFIEC cybersecurity examination work program.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content