January, 2015

article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

'The post Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech… appeared first on John Battelle's Search Blog. 2015. My eleventh year of making predictions. Seems everyone’s gotten onto this particular bus, and I’m now late to the party – I never get around to writing till the weekend – when I have open hours in front of me, and plenty of time to contemplate That Which May Come.

Marketing 111
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

Security 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

19.5% of https sites trigger browser warning as they use sha-1 signed certificates

Elie

19.5% of HTTPS-enabled sites in Alexa's Top 1 Million trigger or will soon trigger a Chrome security warning because they are using the now deprecated SHA-1 signature algorithm to sign their HTTPS certificate. Soon those sites will be flagged by all major browsers as insecure.

article thumbnail

DB2 for z/OS: Native SQL Procedures and STAY RESIDENT

Robert's Db2

A couple of days ago, I received from a DB2 for z/OS professional a question about stored procedures. This individual asked specifically about the STAY RESIDENT option of CREATE PROCEDURE (and ALTER PROCEDURE), and its effect on a native SQL procedure (i.e., a stored procedure that is written in SQL procedure language -- aka SQL PL -- and which runs in the DB2 database services address space).

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Maturity models, love them or hate them?

CGI

Maturity models, love them or hate them? narmada.devarajan. Fri, 01/30/2015 - 00:02. Maturity models, love them or hate them; they can help us set improvement objectives against a model of good practice, while possibly distracting us from the meaningful and actionable. Maturity Modal. Which model to use? How much is relevant? I won’t be giving a view on that.

IT 40

More Trending

article thumbnail

Apple and Google: Middle School Mean Girls Having At It

John Battelle's Searchblog

'The post Apple and Google: Middle School Mean Girls Having At It appeared first on John Battelle's Search Blog. ( image ) I’m the father of three children, and two of them are girls. And while my first was a boy, and therefore “broke me in” with extraordinary acts of Running Headlong Into Fence Posts and Drinking Beer Stolen From Dad’s Fridge Yet Forgetting To Hide The Bottles, nothing, NOTHING, prepared me for Girls Behaving Badly To Each Other Whilst In Middle Sch

IT 109
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'"The oldest and strongest emotion of mankind is fear, and the oldest and strongest kind of fear is fear of the unknown" HP Lovecraft.

109
109
article thumbnail

I Think We are Moving to a World Where We Will Keep Everything Forever. Here’s Why.

Barclay T Blair

Transcript. An edited and condensed transcript of this speech is available here. . Tagged: AHIMA , big data , E-Discovery , InfoGovCon , Information Governance , Keynote , Presentation.

article thumbnail

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

Not long ago, an IBM colleague of mine who is a WebSphere Application Server (WAS) for z/OS specialist sent to me and to a few other IBMers (including some of our CICS and DB2 for z/OS developers) some information about an application scenario, and asked for our ideas and feedback. The scenario involved a Java program that accessed a local DB2 for z/OS subsystem (i.e., a subsystem in the same z/OS LPAR as the WAS instance) and selected a row to be updated, and then invoked a COBOL program (also

Mining 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Determining best-fit workload environment key to effective cloud brokerage

CGI

Determining best-fit workload environment key to effective cloud brokerage. kathy.jacquay@…. Fri, 01/30/2015 - 07:01. In today’s immature cloud brokerage marketplace, there is a big misconception that cloud brokerage is primarily about finding the least expensive virtual machine when it really should be about figuring out the best-fit environment for your workload.

Cloud 40
article thumbnail

Finland Introduces New Electronic Privacy Requirements for Online Communications Services Providers

Hunton Privacy

On January 1, 2015, Finland’s Information Security Code ( 2014/ 917 , the “Code”) became effective. The Code introduces substantial revisions to Finland’s existing electronic communications legislation and consolidates several earlier laws into a single, unified text. Although many of these earlier laws remain unchanged, the Code includes extensive amendments in a number of areas.

article thumbnail

Metromile: A FitBit for Your Car

John Battelle's Searchblog

'The post Metromile: A FitBit for Your Car appeared first on John Battelle's Search Blog. The Metromile staff in front of their SF HQ (Preston is in the red shirt in the back right). Ever since writing Living Systems and The Information First Company last Fall, I’ve been citing Earnest , the financial services startup, as a poster child for what I mean by an “information-first” company.

Insurance 102
article thumbnail

The growing digital divide and the strategic inertia that can kill

Collaboration 2.0

'The challenge for giant swathes of the tech industry is that bad smell from past plumbing failures -- and fear of the unknown.

73
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Your Password Is 12345? Password FAIL

JKevinParker

It's hard to fathom why people don't get that 12345, 123456, and other similarly stupid passwords make their own information and their organization's info much less secure. But many people don't get it. Dark Helmet from SPACEBALLS warned you a long time ago: "12345? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!".

article thumbnail

Updated – Publishing CCTV Images – Don’t Be Tempted!

Managing Your Information

With the recent publicity surrounding Virgin Trains, empty seats and Jeremy Corbyn , it would seem that organisations remain unaware of the data protection implications when using CCTV images. There was an interesting story that was reported in the press on 31 December 2015 about a restaurant who posted an image from their CCTV on Facebook of a group of 4 people that had allegedly left the restaurant without paying their bill.

article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT). p.butler@cgi.com. Thu, 01/22/2015 - 03:28. Many of you will be familiar with the term IoT – well it’s hard to miss if you scan the press, social media and business pages. CGI have a long track record working in this area, so in this blog, I thought I’d provide a potted history to the term, its origins and what it means to us at CGI.

IoT 40
article thumbnail

FTC Releases Report on Internet of Things

Hunton Privacy

On January 27, 2015, the Federal Trade Commission announced the release of a report on the Internet of Things: Privacy and Security in a Connected World (the “Report”). The Report describes the current state of the Internet of Things, analyzes the benefits and risks of its development, applies privacy principles to the Internet of Things and discusses whether legislation is needed to address this burgeoning area.

Privacy 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Three Golden Rules of Naming Something

John Battelle's Searchblog

'The post The Three Golden Rules of Naming Something appeared first on John Battelle's Search Blog. ( image ) I love being part of naming something. It’s probably the flat out most fun you can have legally with your clothes on – but for many folks, including entrepreneurs, it’s the source of endless consternation. It doesn’t have to be.

IT 93
article thumbnail

Illumio's new security foundations can enable a new era of agility

Collaboration 2.0

'Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world.

article thumbnail

Freedom of Expression and Privacy in Labour Disputes: Amendments to Alberta’s Personal Information Protection Act in Force

Privacy and Cybersecurity Law

Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look. Amendments set out in Bill 3, the […].

Privacy 52
article thumbnail

A Eulogy for my Grandfather

Barclay T Blair

Over the holiday season while were visiting family in Alberta, Canada, my 92-year-old grandfather – who had been healthy and active his whole life – passed away. He went quickly and surrounded by his family, and I was honored to be there with my family and to participate in his funeral. I was asked to make a “slide show,” and spent a couple of days with hundreds of photos going back to the 1920s, which was a beautiful way to meditate on this man’s life.

IT 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

App Stores Must Go

John Battelle's Searchblog

'The post App Stores Must Go appeared first on John Battelle's Search Blog. 2014 was the year the industry woke up to the power of mobile app installs, and the advertising platforms that drive them. Facebook’s impressive mobile revenue numbers – 66% of its Q3 2014 revenue and growing – are a proxy for the mobile economy at large, and while the company doesn’t divulge what percentage of that revenue is app install advertising, estimates range from a third to a half

article thumbnail

German DPAs Host Event Regarding U.S.-EU Safe Harbor Framework and Initiate Administrative Proceedings Against Two U.S. Companies

Hunton Privacy

On January 28, 2015, the German conference of data protection commissioners hosted a European Data Protection Day event called Europe: Safer Harbor for Data Protection? – The Future Use of the Different Level of Data Protection between the EU and the US. At the conference, the speakers discussed the validity of the U.S.-EU Safe Harbor Framework. Previously, in 2013, the German data protection commissioners stated that they would review whether to suspend data transfers made from Germany to the U

Access 40
article thumbnail

Risk-Based Approach – New Thinking for Regulating Privacy

Hunton Privacy

On February 11, 2015, the International Association of Privacy Professionals Australian New Zealand (“iappANZ”) will host a discussion on the risk-based approach to privacy in Sydney, Australia. Richard Thomas , Global Strategy Advisor for the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”), will present the Centre’s contributions to this topic including the outcomes from the workshops held in Paris and Brussels.

Privacy 40
article thumbnail

Federal Court Grants Partial Summary Judgment to Government in an Action Against Dish Network Alleging Telemarketing Violations

Hunton Privacy

On January 21, 2015, the Federal Trade Commission announced that the U.S. District Court for the Central District of Illinois granted partial summary judgment on December 12, 2014, to the federal government in its action against Dish Network LLC (“Dish”), alleging that Dish violated certain aspects of the Telemarketing Sales Rule (“TSR”) that restrict placing calls to numbers on the National Do-Not-Call Registry and an entity’s internal Do-Not-Call list.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

ENISA Issues Report on Implementation of Privacy and Data Protection by Design

Hunton Privacy

On January 12, 2015, the European Union Agency for Network and Information Security (“ENISA”) published a report on Privacy and Data Protection by Design – from policy to engineering (the “Report”). The “privacy by design” principle emphasizes the development of privacy protections at the early stages of the product or service development process, rather than at later stages.

Privacy 40
article thumbnail

German DPA Appeals Court Decision on Facebook Fan Pages and Suggests Clarification by ECJ on Data Controllership

Hunton Privacy

On January 14, 2015, the data protection authority of the German federal state of Schleswig-Holstein (“Schleswig DPA”) issued an appeal challenging a September 4, 2014 decision by the Administrative Court of Appeals, which held that companies using Facebook’s fan pages cannot be held responsible for data protection law violations committed by Facebook because the companies do not have any control over the use of the data.

article thumbnail

Proposed Indiana Law Would Raise Bar for Security and Privacy Requirements

Hunton Privacy

Indiana Attorney General Greg Zoeller has prepared a new bill that, although styled a “security breach” bill, would impose substantial new privacy obligations on companies holding the personal data of Indiana residents. Introduced by Indiana Senator James Merritt (R-Indianapolis) on January 12, 2015, SB413 would make a number of changes to existing Indiana law.

Privacy 40