November, 2015

article thumbnail

Boulder, the World’s Most Creative City: Where I’ll Be Next Week @NewCo

John Battelle's Searchblog

The post Boulder, the World’s Most Creative City: Where I’ll Be Next Week @NewCo appeared first on John Battelle's Search Blog. Boulder is the world’s most creative city , according to a recent study highlighted in Richard Florida’s Rise of the Creative Class – Revisted , so it makes perfect sense that NewCo Boulder has a plethora of extraordinary companies to visit during NewCo Boulder, coming to town November 18-19.

article thumbnail

Brazil Releases Revised Draft Privacy Bill

Hunton Privacy

In late October, the Brazilian Ministry of Justice (the “Ministry”) issued its revised Draft Bill for the Protection of Personal Data (“Draft Bill”). The Ministry released its preliminary draft in January 2015, and the Centre for Information Policy Leadership at Hunton & Williams LLP (“CIPL”) filed public comments to the draft on May 5, 2015. Key changes to the new Draft Bill include: adding “legitimate interest” as a basis for processing non-sensitive personal information; adding a risk-bas

Privacy 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Living and learning with a Yuneec Typhoon Q500 4k drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k

76
article thumbnail

DB2 for z/OS: How I Use -DISPLAY BUFFERPOOL Output

Robert's Db2

A couple of weeks ago, I was going over output of the DB2 for z/OS command -DISPLAY BUFFERPOOL with a group of people, and one of the meeting participants said words to this effect: "You've got some useful formulas and rules of thumb here. Could you write them down for us?" I did that, and it occurred to me that the information would be useful to others in the larger DB2 for z/OS community; so, I've packaged it in this blog entry.

IT 54
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Have your cake and eat it?

CGI

Have your cake and eat it? p.butler@cgi.com. Mon, 11/30/2015 - 00:59. A common analysis from IT departments is a restatement of the 80:20 rule. That 80% of the costs of the IT budget are caught up with running and maintaining the IT legacy and only 20% is available for new services that will drive through the transformation anticipated by the business.

IT 40

More Trending

article thumbnail

Google Unveils App Streaming: Is This The Platform That Unifies Apps And The Web?

John Battelle's Searchblog

The post Google Unveils App Streaming: Is This The Platform That Unifies Apps And The Web? appeared first on John Battelle's Search Blog. For years I’ve been predicting that mobile apps were a fad – there’s no way we’d settle for such a crappy, de-linked, “ chiclet-ized ” approach to information and services management.

article thumbnail

Trans-Pacific Partnership Addresses Cross-Border Data Transfers and Protection of Personal Information

Hunton Privacy

On November 5, 2015, the White House released the proposed text of the Trans-Pacific Partnership Agreement (the “TPP”) containing a chapter on cross-border data transfers in the context of electronic commerce. In the chapter on Electronic Commerce, Chapter 14, the TPP includes commitments from participating parties to adopt and maintain a legal framework to protect personal information, and encourages cross-border data transfers to help facilitate business and trade.

IT 60
article thumbnail

Living and learning with a Yuneec Typhoon Q500 drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k.

76
article thumbnail

DB2 for z/OS: How I Use -DISPLAY GROUPBUFFERPOOL Output

Robert's Db2

Having recently posted a blog entry on my use of output from the DB2 for z/OS -DISPLAY BUFFERPOOL command , it seems a good time to post a companion entry focused on the -DISPLAY GROUPBUFFERPOOL command. Obviously, this latter command is relevant to people who work with DB2 operating in data sharing mode on a Parallel Sysplex. If you are such a person, read on.

Access 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apprentices – You’re Hired!

CGI

Apprentices – You’re Hired! ravi.kumarv@cgi.com. Fri, 11/20/2015 - 04:17. I spent a very pleasant evening in Edinburgh this week surrounded by some amazing young people at Scotland’s Modern Apprenticeship Awards, which was sponsored for the second year in a row by CGI. I was greatly inspired by the hard work and ingenuity of the prizewinners who are just beginning to start their careers in industries such as IT, construction and retail.

article thumbnail

Celebrating digital archives with National Archives Week

Preservica

@explorearchives: “A world without records is a world without memory”. This week, running through to Sunday 22 nd of November, is National Archives Week. The Explore Your Archive campaign, which is now in its third year, is coordinated by one of our customers, The National Archives , and the Archives and Records Association (UK and Ireland). The campaign aims to increase public awareness of the essential role that archives play in our society and to celebrate the wonderful network of collections

article thumbnail

Tesla-As-A-Platform

John Battelle's Searchblog

The post Tesla-As-A-Platform appeared first on John Battelle's Search Blog. (Cross posted from the NewCo site). This is the first in what I hope will become a regular series of posts on new kinds of companies the NewCo team has discovered in our travels to NewCo cities around the world. First up is Tesloop , which I noticed while perusing the schedule for NewCo LA last month.

IT 68
article thumbnail

FCC Reaches Settlement with Cable Operator over Customer Data Breach

Hunton Privacy

On November 5, 2015, the Enforcement Bureau of the Federal Communications Commission (“FCC”) entered into a Consent Decree with cable operator Cox Communications to settle allegations that the company failed to properly protect customer information when the company’s electronic data systems were breached in August 2014 by a hacker. The FCC alleged that Cox failed to properly protect the confidentiality of its customers’ proprietary network information (“CPNI”) and personally identifiable informa

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

No, Technology Can’t Solve Your Information Problems

JKevinParker

Note: This is an excerpt from a post I published on LinkedIn Pulse. Read the full post. You see the vendor sales pitches all the time: “Our innovative technology products will solve all of your information problems and make you look super smart!” Balderdash! The solution to your business information problems are things technology vendors cannot sell you in a box or digital download.

Sales 40
article thumbnail

Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices

HIPAA

Health care providers and health insurance companies are generally aware that when protected health information (“PHI”) is disclosed to a vendor, such as an attorney, consultant or cloud data storage firm, a business associate agreement is necessary to comply with HIPAA and to safeguard the information disclosed. However, not all vendors will be business associates, even when such vendors may have potential access to PHI, and health care providers and insurers often struggle with how to manage r

article thumbnail

Award Ceremonies – why do we do it?

CGI

Award Ceremonies – why do we do it? ravi.kumarv@cgi.com. Mon, 11/16/2015 - 05:43. Award ceremonies are an interesting phenomenon; across the world thousands of businesses enter awards every week in the hope that winning will raise awareness of their brand, whilst recognising the great work done by their own people; even being nominated raises morale and gives the team a boost.

IT 40
article thumbnail

French Data Protection Authority Issues Guidance and FAQs on Safe Harbor

Hunton Privacy

On November 19, 2015, the French Data Protection Authority (“CNIL”) published guidance, including a set of frequently asked questions , to assist companies that are transferring personal data to the U.S. pursuant to the Safe Harbor framework. In the guidance, the CNIL stated that the October 6, 2015 decision of the Court of Justice of the European Union (“CJEU”) invalidated the European Commission’s decision on the adequacy of the protection provided by Safe Harbor.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

EDPS Issues Opinion on the Challenges of Big Data

Hunton Privacy

On November 19, 2015, the European Data Protection Supervisor (the “EDPS”) published an Opinion entitled Meeting the Challenges of Big Data (the “Opinion”). The Opinion outlines the main challenges, opportunities and risks of big data, and the importance placed on companies processing large volumes of personal data to implement innovative methods to comply with data protection laws.

article thumbnail

Class Action Filed Against Georgia’s Secretary of State

Hunton Privacy

On November 17, 2015, two plaintiffs filed a putative class action alleging that Georgia’s Secretary of State, Brian Kemp, improperly disclosed the Social Security numbers, driver’s license numbers and birth dates of more than 6.1 million Georgia voters. The lawsuit alleges that the Secretary violated Georgia’s Personal Identity Protection Act by disclosing the voters’ personally identifiable information, failing to provide voters notice of the breach and failing to notify consumer reporting age

article thumbnail

APEC Leaders Reinforce Commitment to CBPR System

Hunton Privacy

On November 19, 2015, the White House released a fact sheet from the 23rd Annual APEC Economic Leaders’ Meeting in the Philippines. Under the section on Enhancing Regional Economic Integration, representatives from the U.S. and other APEC economies reinforced their commitment to the ongoing implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system for information controllers.

Privacy 40
article thumbnail

CIPL Points to Transparency as Key Catalyst for Innovative Information Economy

Hunton Privacy

On November 20, 2015, Markus Heyder , Vice President of the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, discussed how “transparency is increasingly understood as a core component of addressing the challenges of the modern information economy” and a key catalyst for a productive and innovative information economy in an article entitled Transparency and the Future of Driverless Privacy published by the International Association of Privacy Professionals.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Retailer Sued over Allegations that Background Check Consent Form Includes Extraneous Information

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On November 2, 2015, a putative class action was filed against retailer Big Lots Stores, Inc. in Philadelphia, stemming from allegations that the company “systematically” violated the Fair Credit Reporting Act’s (“FCRA’s”) “standalone disclosure requirement” by making prospective employees sign a document used as a background check consent form that contained extraneous information.

Retail 40
article thumbnail

China Publishes New Regulation for Personal Data Security in the Courier Industry

Hunton Privacy

On November 16, 2015, the Legislative Affairs Office of the State Council of the People’s Republic of China published a draft Regulation for Couriers (the “Regulation”) and requested public comment on the Regulation. Interested parties have until mid-December 2015 to submit comments on the Regulation. The Regulation comes at a time when courier services and online shopping are growing steadily in China.

article thumbnail

French Data Protection Authority Imposes Fine for Inadequate Security Measures

Hunton Privacy

On November 13, 2015, the French Data Protection Authority (“CNIL”) announced its decision in a case against Optical Center, imposing a fine of €50,000 on the company for violations related to the security and confidentiality of its customers’ personal data. Optical Center distributes optical products via its store network and website, which contains 170,000 customer accounts in France.

article thumbnail

Administrative Law Judge Dismisses Complaint for Failure to Show Current or Future Substantial Consumer Injury

Hunton Privacy

On November 13, 2015, Chief Administrative Law Judge D. Michael Chappell dismissed the FTC’s complaint against LabMD Inc. (“LabMD”) for failing to show that LabMD’s allegedly unreasonable data security practices caused, or were likely to cause, substantial consumer injury. The law judge did not address LabMD’s claim that the FTC does not have jurisdiction to enforce data security standards under the unfairness prong of Section 5 of the FTC Act , and LabMD has reserved its jurisdictional challeng

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Security risks raised by today’s hybrid IT delivery models

CGI

Security risks raised by today’s hybrid IT delivery models. kathy.jacquay@…. Thu, 11/12/2015 - 03:46. Traditional on-premises IT has evolved into a hybrid model that now includes both public and private clouds in the ecosystem. Adding to the cloud dimension presents new security risks that make it even more important to adopt a cohesive and holistic security policy.

Risk 40
article thumbnail

Hunton’s Data Protection Practice Recognized by Chambers UK and Legal 500 UK

Hunton Privacy

Hunton & Williams LLP announces the firm’s Global Privacy and Cybersecurity practice was again recognized by Chambers UK 2016 and The Legal 500 UK 2015 guides, earning Tier 1 rankings. Chambers UK noted that the practice has a “superbly strong bench of highly experienced counsel adept at advising on the most complex of information law concerns. Particularly accomplished in guiding clients through the privacy implications of new technologies, international data transfers, and BCR applications

Privacy 40
article thumbnail

IoT – It’s more than just connecting a sensor

CGI

IoT – It’s more than just connecting a sensor. p.butler@cgi.com. Mon, 11/09/2015 - 04:30. There is a growing recognition by business leaders and analysts that there is more to the Internet of Things (IoT) than just connecting a remote device or sensor to an application to monitor a temperature or alarm. Even with wearable devices, expected to grow to 155m units shipped by 2019, people have been happy to just track how far they have walked or how many calories they have burned.

IoT 40