January, 2015

article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'"The oldest and strongest emotion of mankind is fear, and the oldest and strongest kind of fear is fear of the unknown" HP Lovecraft.

273
273
article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

'The post Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech… appeared first on John Battelle's Search Blog. 2015. My eleventh year of making predictions. Seems everyone’s gotten onto this particular bus, and I’m now late to the party – I never get around to writing till the weekend – when I have open hours in front of me, and plenty of time to contemplate That Which May Come.

Marketing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

19.5% of https sites trigger browser warning as they use sha-1 signed certificates

Elie

19.5% of HTTPS-enabled sites in Alexa's Top 1 Million trigger or will soon trigger a Chrome security warning because they are using the now deprecated SHA-1 signature algorithm to sign their HTTPS certificate. Soon those sites will be flagged by all major browsers as insecure.

article thumbnail

Freedom of Expression and Privacy in Labour Disputes: Amendments to Alberta’s Personal Information Protection Act in Force

Privacy and Cybersecurity Law

Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look. Amendments set out in Bill 3, the […].

Privacy 52
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

DB2 for z/OS: Native SQL Procedures and STAY RESIDENT

Robert's Db2

A couple of days ago, I received from a DB2 for z/OS professional a question about stored procedures. This individual asked specifically about the STAY RESIDENT option of CREATE PROCEDURE (and ALTER PROCEDURE), and its effect on a native SQL procedure (i.e., a stored procedure that is written in SQL procedure language -- aka SQL PL -- and which runs in the DB2 database services address space).

More Trending

article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

Security 269
article thumbnail

Apple and Google: Middle School Mean Girls Having At It

John Battelle's Searchblog

'The post Apple and Google: Middle School Mean Girls Having At It appeared first on John Battelle's Search Blog. ( image ) I’m the father of three children, and two of them are girls. And while my first was a boy, and therefore “broke me in” with extraordinary acts of Running Headlong Into Fence Posts and Drinking Beer Stolen From Dad’s Fridge Yet Forgetting To Hide The Bottles, nothing, NOTHING, prepared me for Girls Behaving Badly To Each Other Whilst In Middle Sch

IT 109
article thumbnail

European Data Protection Supervisor Speaks on Data Protection Day

Hunton Privacy

On January 28, 2015, in connection with Data Protection Day, newly appointed European Data Protection Supervisor (“EDPS”) Giovanni Buttarelli spoke about future challenges for data protection. Buttareli encouraged the EU “to lead by example as a beacon of respect for digital rights,” and “to be at the forefront in shaping a global, digital standard for privacy and data protection which centers on the rights of the individual.

Privacy 40
article thumbnail

I Think We are Moving to a World Where We Will Keep Everything Forever. Here’s Why.

Barclay T Blair

Transcript. An edited and condensed transcript of this speech is available here. . Tagged: AHIMA , big data , E-Discovery , InfoGovCon , Information Governance , Keynote , Presentation.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

Not long ago, an IBM colleague of mine who is a WebSphere Application Server (WAS) for z/OS specialist sent to me and to a few other IBMers (including some of our CICS and DB2 for z/OS developers) some information about an application scenario, and asked for our ideas and feedback. The scenario involved a Java program that accessed a local DB2 for z/OS subsystem (i.e., a subsystem in the same z/OS LPAR as the WAS instance) and selected a row to be updated, and then invoked a COBOL program (also

Mining 48
article thumbnail

Maturity models, love them or hate them?

CGI

Maturity models, love them or hate them? narmada.devarajan. Fri, 01/30/2015 - 00:02. Maturity models, love them or hate them; they can help us set improvement objectives against a model of good practice, while possibly distracting us from the meaningful and actionable. Maturity Modal. Which model to use? How much is relevant? I won’t be giving a view on that.

IT 40
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'The challenge for giant swathes of the tech industry is that bad smell from past plumbing failures -- and fear of the unknown.

183
183
article thumbnail

Metromile: A FitBit for Your Car

John Battelle's Searchblog

'The post Metromile: A FitBit for Your Car appeared first on John Battelle's Search Blog. The Metromile staff in front of their SF HQ (Preston is in the red shirt in the back right). Ever since writing Living Systems and The Information First Company last Fall, I’ve been citing Earnest , the financial services startup, as a poster child for what I mean by an “information-first” company.

Insurance 102
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Finland Introduces New Electronic Privacy Requirements for Online Communications Services Providers

Hunton Privacy

On January 1, 2015, Finland’s Information Security Code ( 2014/ 917 , the “Code”) became effective. The Code introduces substantial revisions to Finland’s existing electronic communications legislation and consolidates several earlier laws into a single, unified text. Although many of these earlier laws remain unchanged, the Code includes extensive amendments in a number of areas.

article thumbnail

Canadian Privacy Compliance: Time for your Online Checkup

Privacy and Cybersecurity Law

In a previous post on online behavioural advertising (OBA), we wrote about the Office of the Privacy Commissioner’s “call to action” to stakeholders in […].

Privacy 40
article thumbnail

Your Password Is 12345? Password FAIL

JKevinParker

It's hard to fathom why people don't get that 12345, 123456, and other similarly stupid passwords make their own information and their organization's info much less secure. But many people don't get it. Dark Helmet from SPACEBALLS warned you a long time ago: "12345? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!".

article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT). p.butler@cgi.com. Thu, 01/22/2015 - 03:28. Many of you will be familiar with the term IoT – well it’s hard to miss if you scan the press, social media and business pages. CGI have a long track record working in this area, so in this blog, I thought I’d provide a potted history to the term, its origins and what it means to us at CGI.

IoT 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

Security 100
article thumbnail

The Three Golden Rules of Naming Something

John Battelle's Searchblog

'The post The Three Golden Rules of Naming Something appeared first on John Battelle's Search Blog. ( image ) I love being part of naming something. It’s probably the flat out most fun you can have legally with your clothes on – but for many folks, including entrepreneurs, it’s the source of endless consternation. It doesn’t have to be.

IT 93
article thumbnail

FTC Releases Report on Internet of Things

Hunton Privacy

On January 27, 2015, the Federal Trade Commission announced the release of a report on the Internet of Things: Privacy and Security in a Connected World (the “Report”). The Report describes the current state of the Internet of Things, analyzes the benefits and risks of its development, applies privacy principles to the Internet of Things and discusses whether legislation is needed to address this burgeoning area.

Privacy 40
article thumbnail

A Eulogy for my Grandfather

Barclay T Blair

Over the holiday season while were visiting family in Alberta, Canada, my 92-year-old grandfather – who had been healthy and active his whole life – passed away. He went quickly and surrounded by his family, and I was honored to be there with my family and to participate in his funeral. I was asked to make a “slide show,” and spent a couple of days with hundreds of photos going back to the 1920s, which was a beautiful way to meditate on this man’s life.

IT 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Updated – Publishing CCTV Images – Don’t Be Tempted!

Managing Your Information

With the recent publicity surrounding Virgin Trains, empty seats and Jeremy Corbyn , it would seem that organisations remain unaware of the data protection implications when using CCTV images. There was an interesting story that was reported in the press on 31 December 2015 about a restaurant who posted an image from their CCTV on Facebook of a group of 4 people that had allegedly left the restaurant without paying their bill.

article thumbnail

App Stores Must Go

John Battelle's Searchblog

'The post App Stores Must Go appeared first on John Battelle's Search Blog. 2014 was the year the industry woke up to the power of mobile app installs, and the advertising platforms that drive them. Facebook’s impressive mobile revenue numbers – 66% of its Q3 2014 revenue and growing – are a proxy for the mobile economy at large, and while the company doesn’t divulge what percentage of that revenue is app install advertising, estimates range from a third to a half

article thumbnail

German DPAs Host Event Regarding U.S.-EU Safe Harbor Framework and Initiate Administrative Proceedings Against Two U.S. Companies

Hunton Privacy

On January 28, 2015, the German conference of data protection commissioners hosted a European Data Protection Day event called Europe: Safer Harbor for Data Protection? – The Future Use of the Different Level of Data Protection between the EU and the US. At the conference, the speakers discussed the validity of the U.S.-EU Safe Harbor Framework. Previously, in 2013, the German data protection commissioners stated that they would review whether to suspend data transfers made from Germany to the U

Access 40
article thumbnail

Risk-Based Approach – New Thinking for Regulating Privacy

Hunton Privacy

On February 11, 2015, the International Association of Privacy Professionals Australian New Zealand (“iappANZ”) will host a discussion on the risk-based approach to privacy in Sydney, Australia. Richard Thomas , Global Strategy Advisor for the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”), will present the Centre’s contributions to this topic including the outcomes from the workshops held in Paris and Brussels.

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Federal Court Grants Partial Summary Judgment to Government in an Action Against Dish Network Alleging Telemarketing Violations

Hunton Privacy

On January 21, 2015, the Federal Trade Commission announced that the U.S. District Court for the Central District of Illinois granted partial summary judgment on December 12, 2014, to the federal government in its action against Dish Network LLC (“Dish”), alleging that Dish violated certain aspects of the Telemarketing Sales Rule (“TSR”) that restrict placing calls to numbers on the National Do-Not-Call Registry and an entity’s internal Do-Not-Call list.

article thumbnail

ENISA Issues Report on Implementation of Privacy and Data Protection by Design

Hunton Privacy

On January 12, 2015, the European Union Agency for Network and Information Security (“ENISA”) published a report on Privacy and Data Protection by Design – from policy to engineering (the “Report”). The “privacy by design” principle emphasizes the development of privacy protections at the early stages of the product or service development process, rather than at later stages.

Privacy 40
article thumbnail

German DPA Appeals Court Decision on Facebook Fan Pages and Suggests Clarification by ECJ on Data Controllership

Hunton Privacy

On January 14, 2015, the data protection authority of the German federal state of Schleswig-Holstein (“Schleswig DPA”) issued an appeal challenging a September 4, 2014 decision by the Administrative Court of Appeals, which held that companies using Facebook’s fan pages cannot be held responsible for data protection law violations committed by Facebook because the companies do not have any control over the use of the data.