November, 2014

article thumbnail

Google: The Information-First Conglomerate

John Battelle's Searchblog

'The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014. Last week Google CEO Larry Page got the Fortune magazine cover treatment , the latest of many such pieces attempting to quantify Google’ sprawling business. The business press is obsessed with answering the question of whether we’ve reached “ Peak Google.” (Clearly Fortune’s opinion is that we have not, given they

Marketing 111
article thumbnail

DB2 for z/OS: How Low Can Synchronous Read Wait Time Go?

Robert's Db2

Short answer: lower than I'd previously thought. Short explanation: solid-state drives. OK, backstory: I was recently analyzing some performance information related to a client's production DB2 for z/OS environment. Included in the documentation provided by the client were some Accounting Long reports generated by their DB2 monitor (these reports format data contained in DB2 accounting trace records).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The remote control tower ….the remote control airport? Enabled by the Internet of Things.

CGI

The remote control tower ….the remote control airport? Enabled by the Internet of Things. ravi.kumarv@cgi.com. Wed, 11/26/2014 - 02:06. Aviation is growing and operational, regulatory, security, and commercial expectations are changing , and this is placing pressure on the associated airport infrastructure, much of which can require enormous redesign and capital expenditure to meet these challenges.

IoT 40
article thumbnail

Massachusetts Attorney General Reaches Settlement with Boston Hospital Over Data Security Allegations

Hunton Privacy

On November 21, 2014, Massachusetts Attorney General Martha Coakley announced that Boston hospital Beth Israel Deaconess Medical Center (“BIDMC”) has agreed to pay a total of $100,000 to settle charges related to a data breach that affected the personal and protected health information of nearly 4,000 patients and employees. In its complaint, the Attorney General alleged that a trespasser entered an unlocked office of a BIDMC physician and stole a personal laptop containing unencrypted names, So

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Is IG a new package and labeling of RIM?

Positively RIM

Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.

More Trending

article thumbnail

The Web Will Kill Apps

John Battelle's Searchblog

'The post The Web Will Kill Apps appeared first on John Battelle's Search Blog. Lots of the “apps are killing the web” meme going around these days, with the latest batch of casket sealant come from no greater validator of commonly agreed upon wisdom than the Wall St. Journal. “The Web Is Dying; Apps Are Killing It” argues Christopher Mims, and it’s hard to argue with him given the preponderance of current evidence.

IT 111
article thumbnail

Whither the Public Commons? Enter The Private Corporation

John Battelle's Searchblog

'The post Whither the Public Commons? Enter The Private Corporation appeared first on John Battelle's Search Blog. ( image ) From time to time a piece reminds us that we are in a slow, poorly articulated struggle over what we hold as a public commons. That was the case with Vanity Fair’s Man and Uber Man , a profile of Uber’s Travis Kalanick by Kara Swisher.

article thumbnail

The Internet Big Five: Doubling In Three Years On A Trillion Dollar Base

John Battelle's Searchblog

'The post The Internet Big Five: Doubling In Three Years On A Trillion Dollar Base appeared first on John Battelle's Search Blog. From time to time I have tracked what I call the “Internet Big Five” – the key platform technology companies that are driving the Internet economy. Nearly three years ago I wrote the first of this series – The Internet Big Five.

Marketing 110
article thumbnail

Else 11.03.14: It’s Over, Google. Now What?

John Battelle's Searchblog

'The post Else 11.03.14: It’s Over, Google. Now What? appeared first on John Battelle's Search Blog. ( image ) Our friends in the press have decided that search has had its decade in the sun, and I can’t disagree, at least as it was known before. The question of how it becomes something else is still very much afoot, but not solved.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hunton Global Privacy Update – November 2014

Hunton Privacy

On November 18, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program covered a number of privacy and data protection topics, including a report on the International Conference of Data Protection and Privacy Commissioners , highlights on the Council of the European Union’s proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the fo

Privacy 40
article thumbnail

Centre’s Risk Workshop II in Brussels Emphasizes that Risk-Based Approach to Privacy Does Not Change Legal Obligations but Helps Calibrate Their Effective Implementation

Hunton Privacy

On November 18, 2014, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) held the second workshop in its ongoing work on the risk-based approach to privacy and a Privacy Risk Framework. Approximately 70 Centre members, privacy regulators and other privacy experts met in Brussels to discuss the benefits and challenges of the risk-based approach, operationalizing risk assessments within organizations, and employing risk analysis in enforcement.

Risk 40
article thumbnail

TRUSTe Reaches Settlement with FTC Over Alleged FTC Act Violations

Hunton Privacy

On November 17, 2014, the Federal Trade Commission announced that data privacy certifier True Ultimate Standards Everywhere, Inc. (“TRUSTe”) has agreed to settle charges that the company deceived consumers about its recertification program and misrepresented that it was a non-profit entity in violation of Section 5 of the FTC Act. TRUSTe offers a variety of assessments and certifications (“Certified Privacy Seals”) for online business websites and mobile applications.

Privacy 40
article thumbnail

Court Orders Debt Brokers to Notify Consumers Following FTC Allegations of Unlawful Disclosure of Personal Information

Hunton Privacy

On November 12, 2014, the Federal Trade Commission announced that in response to FTC complaints, a federal court has ordered two debt brokerage companies to notify over 70,000 consumers whose sensitive personal information was posted on a public website by the debt brokerage companies. The two defendants are debt brokers that sell portfolios of consumer debt for eventual collection by third party debt collectors.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

IAPP Europe Data Protection Congress 2014

Hunton Privacy

Join us at the International Association of Privacy Professionals (“IAPP”) Data Protection Congress in Brussels, November 18-20, 2014. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Internet of Things, Data Protection and Security: What are the Legal Challenges, and How Do We Overcome Them? Preconference Workshop: Tuesday, November 18, 2:00 p.m.

Privacy 40
article thumbnail

Ebola and Other Health Emergencies Create Workplace Privacy Dilemmas

Hunton Privacy

Hunton & Williams Labor & Employment partner Susan Wiltsie reports: Fears of a worldwide Ebola pandemic appear to have abated, but the tension between workplace safety and employee privacy, thrown into relief by this health emergency, remains an issue relevant to all employers. Any potential health threat created by contagious illness requires employers to plan and put into effect a reasonable response, including policies governing the terms and conditions under which employees may be re

Privacy 40
article thumbnail

Enabling Data Driven Business Models

CGI

Enabling Data Driven Business Models. p.butler@cgi.com. Thu, 11/13/2014 - 04:06. The business world is changing at a rate we would not have believed ten years ago. My colleague Ian Watts, CGI’s Director of Consulting, uses the phrase ‘change is the constant, it’s the rate of acceleration for different industries that we need to understand’ , which I think captures the challenge businesses are grappling with quite well.

B2C 40
article thumbnail

Does the advance of smart devices mean the end of the World Wide Web as we know it?

CGI

Does the advance of smart devices mean the end of the World Wide Web as we know it? sarah.robins@cgi.com. Wed, 11/12/2014 - 05:05. In many ways the Internet provides a platform which aggregates data from content providers and adds a user friendly, consistent presentation layer for easy consumption. Information is created and published online; it is indexed and sorted, manipulated for various devices and then remains there to be consumed at our leisure.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

New Records Technology: Structured Data Archiving

Positively RIM

Care for an example of how IT, Legal, and Records need to work together (commonly known as Information Governance?) Here’s one development: Technology at ARMA International is a fascinating mélange. Each year, we see incremental improvements. There are faster scanners, increasingly subtle analytics, greater capacities, more resolution, less-volatile media, and more.

article thumbnail

UK ICO Issues Code of Practice Regarding the Use of Surveillance Cameras

Hunton Privacy

On October 15, 2014, the UK Information Commissioner’s Office (“ICO”) published a code of practice regarding the use of surveillance cameras (“Code of Practice”). The Code of Practice explains how the legal requirements of the Data Protection Act 1998 apply to operators of surveillance cameras. Practical and technological advancements have led to a wide variety of surveillance camera technologies that differ from traditional CCTV ( e.g. , Automatic Number Plate Recognition cameras and body-worn

article thumbnail

GPEN Holds Workshop on the Use of Publicity as a Regulatory Compliance Technique

Hunton Privacy

On November 1, 2014, the Global Privacy Enforcement Network (“GPEN”) posted a media release on their workshop held on October 12, 2014, in Mauritius on the use of publicity as a regulatory compliance technique. The workshop, attended by 44 commissioners and staff from around the world, focused on different issues concerning privacy enforcement, including the effectiveness of monetary penalties in enforcing data protection laws and the diverse approaches to enforcement publicity.

article thumbnail

New Payment Technologies Should Reduce Demand for Cyber Insurance

Hunton Privacy

Hunton & Williams Insurance Litigation & Counseling partner Lon Berk reports: As the demand for cyber insurance has skyrocketed, so too has the cost. One broker estimates that sales in 2014 will double from the $1 billion premium collected in 2013. Much of the increase in demand and cost has been the result of the widely publicized hacks of the point-of-sale systems at large retailers, and the primary emphasis of most cyber policies is to address liability arising from such events.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

German Court Asks European Court of Justice if IP Addresses are Personal Data

Hunton Privacy

On October 28, 2014, the German Federal Court of Justice referred the question of whether an IP address constitutes personal data under the EU Data Protection Directive 95/46/EC (“EU Data Protection Directive”) to the European Court of Justice (“ECJ”). The German court referred the question to the ECJ for a preliminary ruling in connection with a case that arose in 2008 when a German citizen challenged the German federal government’s storage of the dynamic IP addresses of users on government web

article thumbnail

“One-Stop-Shop” Under the Proposed EU Regulation: A Way Forward

Hunton Privacy

This week, the Article 29 Working Party (“Working Party”) prepares to debate various proposals on the “one-stop-shop” mechanism under the proposed EU General Data Protection Regulation (“Regulation”). Hunton & Williams’ Global Privacy and Cybersecurity practice and its Centre for Information Policy Leadership submitted a strategy paper on the one-stop-shop to the Working Party.

Paper 40
article thumbnail

Federal District Court Grants Motion to Dismiss a Class Action Alleging Impermissible Sharing of Personal Information Under the Video Privacy Protection Act

Hunton Privacy

On October 8, 2014, the United States District Court for the Northern District of Georgia granted Cartoon Network, Inc.’s (“Cartoon Network’s”) motion to dismiss a putative class action alleging that Cartoon Network’s mobile app impermissibly disclosed users’ personally identifiable information (“PII”) to a third party data analytics company under the Video Privacy Protection Act (“VPPA”).

Privacy 40
article thumbnail

Supreme Court of Canada Extends Deadline for Amending Alberta PIPA

Hunton Privacy

On October 30, 2014, the Supreme Court of Canada extended the deadline for the province of Alberta to amend its Personal Information Protection Act (“PIPA”). In November 2013, the Supreme Court of Canada declared PIPA invalid because it interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

FFIEC Announces Plans to Update Cybersecurity Guidance in Wake of Cybersecurity Assessments

Hunton Privacy

On November 3, 2014, the Federal Financial Institutions Examination Council (“FFIEC”), on behalf of its members, released a report entitled FFIEC Cybersecurity Assessment General Observations (the “Report”) that contains observations from recent cybersecurity assessments conducted at over 500 community financial institutions as part of the FFIEC cybersecurity examination work program.