This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The point about pre-legislative scrutiny is that a parliamentary bill gets a good prod before it begins its usual passage through Parliament. The main issues are identified, and stakeholders can marshal their views in an attempt to influence the decision-makers in good time for changes to be made that ought to result in a statute that is far fitter for purpose.
The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. ( cross posted from NewCo ). Thanks to NewCo , I’ve gotten out of the Bay Area bubble and visited more than a dozen major cities across several continents in the past year.
On February 1, 2016, V?ra Jourová, European Commissioner for Justice, Consumers and Gender Equality, told the European Parliament that an agreement on a new U.S.-EU Safe Harbor agreement has not yet been reached. Jourová indicated that an agreement is close, but additional work is needed to finalize it. In her message to Parliament, Jourová indicated that any new Safe Harbor agreement would have to be fundamentally different from the original agreement and must be continually reviewed.
Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
As a DB2 for z/OS system grows and evolves, the value of certain ZPARM parameters should be reviewed to ensure that they are still appropriate in the context of the current environment. Failure to do this can result in a situation in which the operational efficiency (or some other characteristic) of the system is negatively impacted. One of these ZPARMs that should be periodically revisited is DSMAX.
Big data weaponization and malware-based espionage are usually associated with governments; however, they don’t own a monopoly on such activities. Also, online poker uses big data to profile user behavior. Players search for fish (bad players) and they use malware to spy on and rip off infected players at the (online) poker table. This blog post is a brief tour of some of the darkest aspects of online poker.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Big data weaponization and malware-based espionage are usually associated with governments; however, they don’t own a monopoly on such activities. Also, online poker uses big data to profile user behavior. Players search for fish (bad players) and they use malware to spy on and rip off infected players at the (online) poker table. This blog post is a brief tour of some of the darkest aspects of online poker.
With the entry into force of the new Unterlassungsklagengesetz (UKlaG) [otherwise known as the “Gesetz zur Verbesserung der zivilrechtlichen Durchsetzung […].
The post The Waze Effect: Flocking, AI, and Private Regulatory Capture appeared first on John Battelle's Search Blog. (image). A couple of weeks ago my wife and I were heading across the San Rafael bridge to downtown Oakland for a show at the Fox Theatre. As all Bay area drivers know, there’s a historically awful stretch of Interstate 80 along that route – a permanent traffic sh*t show.
On February 10, 2016, the U.S. House of Representatives passed the Judicial Redress Act , which had been approved by the Senate the night before and included a recent Senate amendment. The House of Representatives previously passed the original bill in October 2015, but the bill was sent back to the House due to the recent Senate amendment. The Judicial Redress Act grants non-U.S. citizens certain rights, including a private right of action for alleged privacy violations that occur in the U.S.
In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
I'm writing about this now because of the increased interest I've seen, at various DB2 for z/OS sites, in using DB2 query parallelization as a means of boosting zIIP engine utilization when -- and this often happens during nighttime hours -- workloads that typically drive consumption of zIIP MIPS (e.g., DB2 DDF transactions, or Java programs running in WebSphere Application Server for z/OS) diminish.
Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in … + Read More.
The whole is more than the sum of its parts. p.butler@cgi.com. Wed, 02/24/2016 - 23:31. We have all heard the famous quotation by Aristotle, which has been used in many other scenarios: from football teams performing better than what was expected from their collection of players, through to us as human beings. And I think the same applies to future cities and the Internet of Things (IoT). table.
The post Growth Is Hard appeared first on John Battelle's Search Blog. The business story of the decade is one of insurgency: Every sector of our economy has spawned a cohort of software-driven companies “moving fast and breaking things,” “asking for forgiveness, not permission,” and “blitzscaling” their way to “eating the world.” For years we’ve collectively marveled as new kinds of companies have stormed traditional markets, garnering winner-take-all valuations and delivering extraordinar
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
On February 29, 2016, the European Commission issued the legal texts that will implement the EU-U.S. Privacy Shield. These texts include a draft adequacy decision from the European Commission, Frequently Asked Questions and a Communication summarizing the steps that have been taken in the last few years to restore trust in transatlantic data flows. The agreement in support of the new EU-U.S. transatlantic data transfer framework, known as the EU-U.S.
How do you plan a successful information management solution implementation? Well, there's a LOT to it! And there are many paths to failure. In AIIM's Electronic Records Management and Enterprise Content Management master courses , we spend four whole days discussing these concepts. In my recent Pulse article on information management and technology , I state: The solution to your business information problems are things technology vendors cannot sell you in a box or digital download.
The Wellcome Library, a valued user of Preservica since 2008 and one of the world’s most significant resources for medical history, and part of the Wellcome Collection, has just ingested its 20 millionth JPEG2000 image into the Preservica system – a huge landmark for the library and Digital Curator Dave Thomson who’s excitement can easily be interpreted via his energetic twitter page.
You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the … + Read More.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
14 steps to a digital business. ravi.kumarv@cgi.com. Tue, 02/23/2016 - 03:49. When Steve Jobs took over at Apple in 1997, one of his first decisions was to get rid of the Apple Museum in the foyer. He said he didn’t want to be in a company that was living in its past. He knew that the essence of Apple was vision and innovation, and he didn’t want the company’s future to be held back by the best thinking of its history.
Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!
On February 19, 2016, the French Data Protection Authority (“CNIL”) made public its new Single Authorization Decision No. 46 (“Single Authorization AU-46”). This decision relates to the data processing activities of public and private organizations with respect to the preparation, exercise and follow-up regarding disciplinary or court actions, and the enforcement of those actions.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
As 90s hit television series The X-Files returns to our screens after a 13 year hiatus, we have launched an awareness campaign to highlight the danger of file format and software obsolescence, and an impending ‘Digital Dark Age’ – warned against by Google’s Vint Cerf last year. Many file formats and software applications popular in 1993 have already disappeared or become obsolete.
The post Should a Company Have a Soul? appeared first on John Battelle's Search Blog. Much of the Republican debates have been expendable theatrics, but I watched this weekend’s follies from South Carolina anyway. And one thing has struck me: The ads are starting to get better. This season’s debates have had the highest ratings of any recent Presidential race, and they’re attracting some serious corporate sponsorship.
Expectations and opportunities in using bank consumer personal data. kathy.jacquay@…. Fri, 02/19/2016 - 01:49. A top business priority for banks today is to have a complete 360 degree view of customers through the collection and use of personal data. To effectively manage data, it helps to know how consumers expect their information to be used. Armed with this knowledge, banks can identify opportunities for new value-add services that drive revenue and competitive advantage.
In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On February 16, 2016, the Department of Homeland Security (“DHS”), in collaboration with other federal agencies, released a series of documents outlining procedures for both federal and non-federal entities to share and disseminate cybersecurity information. These documents were released as directed by the Cybersecurity Act of 2015 (the “Act”), signed into law on December 18, 2015.
On February 3, 2016, the Article 29 Working Party (the “Working Party”) issued a statement on the consequences of the ruling of the Court of Justice of the European Union (the “CJEU”) in the Schrems case invalidating the European Commission’s Safe Harbor Decision. The statement follows several weeks of analysis of the other data transfer mechanisms ( i.e. , the EU Standard Contractual Clauses and Binding Corporate Rules) in light of the CJEU’s judgment, as well as the assessment of the current l
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content