February, 2016

article thumbnail

Scrutinizing the draft Investigatory Powers Bill

Data Protector

The point about pre-legislative scrutiny is that a parliamentary bill gets a good prod before it begins its usual passage through Parliament. The main issues are identified, and stakeholders can marshal their views in an attempt to influence the decision-makers in good time for changes to be made that ought to result in a statute that is far fitter for purpose.

article thumbnail

The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever

John Battelle's Searchblog

The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. ( cross posted from NewCo ). Thanks to NewCo , I’ve gotten out of the Bay Area bubble and visited more than a dozen major cities across several continents in the past year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

President Obama Signs Executive Order Establishing Federal Privacy Council

Hunton Privacy

On February 9, 2016, President Obama signed an Executive Order establishing a permanent Federal Privacy Council (“Privacy Council”) that will serve as the principal interagency support structure to improve the privacy practices of government agencies and entities working on their behalf. The Privacy Council is charged with building on existing interagency efforts to protect privacy and provide expertise and assistance to government agencies, expand the skill and career development opportunities

Privacy 69
article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS: When Did You Last Check Your Subsystem's DSMAX Value?

Robert's Db2

As a DB2 for z/OS system grows and evolves, the value of certain ZPARM parameters should be reviewed to ensure that they are still appropriate in the context of the current environment. Failure to do this can result in a situation in which the operational efficiency (or some other characteristic) of the system is negatively impacted. One of these ZPARMs that should be periodically revisited is DSMAX.

IT 48

More Trending

article thumbnail

Are Your Wireless Gadgets Vulnerable to Hacking?

Productivity Bytes

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities. They hack into a system, bring attention to problem areas, and hopefully allow companies to fix the issue in … + Read More.

article thumbnail

The Waze Effect: Flocking, AI, and Private Regulatory Capture

John Battelle's Searchblog

The post The Waze Effect: Flocking, AI, and Private Regulatory Capture appeared first on John Battelle's Search Blog. (image). A couple of weeks ago my wife and I were heading across the San Rafael bridge to downtown Oakland for a show at the Fox Theatre. As all Bay area drivers know, there’s a historically awful stretch of Interstate 80 along that route – a permanent traffic sh*t show.

Risk 71
article thumbnail

Safe Harbor Deal Between EU and U.S. Not Yet Reached as Negotiations Continue

Hunton Privacy

On February 1, 2016, V?ra Jourová, European Commissioner for Justice, Consumers and Gender Equality, told the European Parliament that an agreement on a new U.S.-EU Safe Harbor agreement has not yet been reached. Jourová indicated that an agreement is close, but additional work is needed to finalize it. In her message to Parliament, Jourová indicated that any new Safe Harbor agreement would have to be fundamentally different from the original agreement and must be continually reviewed.

Access 67
article thumbnail

Unleashing The Mayhem CRS

ForAllSecure

In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in

Cloud 52
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Statement-Level Control of DB2 for z/OS Query Parallelization

Robert's Db2

I'm writing about this now because of the increased interest I've seen, at various DB2 for z/OS sites, in using DB2 query parallelization as a means of boosting zIIP engine utilization when -- and this often happens during nighttime hours -- workloads that typically drive consumption of zIIP MIPS (e.g., DB2 DDF transactions, or Java programs running in WebSphere Application Server for z/OS) diminish.

article thumbnail

The whole is more than the sum of its parts

CGI

The whole is more than the sum of its parts. p.butler@cgi.com. Wed, 02/24/2016 - 23:31. We have all heard the famous quotation by Aristotle, which has been used in many other scenarios: from football teams performing better than what was expected from their collection of players, through to us as human beings. And I think the same applies to future cities and the Internet of Things (IoT). table.

IT 40
article thumbnail

Plan a Successful Information Management Solution Implementation

JKevinParker

How do you plan a successful information management solution implementation? Well, there's a LOT to it! And there are many paths to failure. In AIIM's Electronic Records Management and Enterprise Content Management master courses , we spend four whole days discussing these concepts. In my recent Pulse article on information management and technology , I state: The solution to your business information problems are things technology vendors cannot sell you in a box or digital download.

article thumbnail

Growth Is Hard

John Battelle's Searchblog

The post Growth Is Hard appeared first on John Battelle's Search Blog. The business story of the decade is one of insurgency: Every sector of our economy has spawned a cohort of software-driven companies “moving fast and breaking things,” “asking for forgiveness, not permission,” and “blitzscaling” their way to “eating the world.” For years we’ve collectively marveled as new kinds of companies have stormed traditional markets, garnering winner-take-all valuations and delivering extraordinar

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Congress Passes Judicial Redress Act

Hunton Privacy

On February 10, 2016, the U.S. House of Representatives passed the Judicial Redress Act , which had been approved by the Senate the night before and included a recent Senate amendment. The House of Representatives previously passed the original bill in October 2015, but the bill was sent back to the House due to the recent Senate amendment. The Judicial Redress Act grants non-U.S. citizens certain rights, including a private right of action for alleged privacy violations that occur in the U.S.

article thumbnail

Wellcome ingests 20 millionth JPEG

Preservica

The Wellcome Library, a valued user of Preservica since 2008 and one of the world’s most significant resources for medical history, and part of the Wellcome Collection, has just ingested its 20 millionth JPEG2000 image into the Preservica system – a huge landmark for the library and Digital Curator Dave Thomson who’s excitement can easily be interpreted via his energetic twitter page.

article thumbnail

What You Need to Know About the Recent FBI Hack

Productivity Bytes

You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the … + Read More.

article thumbnail

14 steps to a digital business

CGI

14 steps to a digital business. ravi.kumarv@cgi.com. Tue, 02/23/2016 - 03:49. When Steve Jobs took over at Apple in 1997, one of his first decisions was to get rid of the Apple Museum in the foyer. He said he didn’t want to be in a company that was living in its past. He knew that the essence of Apple was vision and innovation, and he didn’t want the company’s future to be held back by the best thinking of its history.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

40
article thumbnail

New German Consumer Action risk; now in force

Privacy and Cybersecurity Law

With the entry into force of the new Unterlassungsklagengesetz (UKlaG) [otherwise known as the “Gesetz zur Verbesserung der zivilrechtlichen Durchsetzung […].

Risk 52
article thumbnail

European Commission Presents EU-U.S. Privacy Shield

Hunton Privacy

On February 29, 2016, the European Commission issued the legal texts that will implement the EU-U.S. Privacy Shield. These texts include a draft adequacy decision from the European Commission, Frequently Asked Questions and a Communication summarizing the steps that have been taken in the last few years to restore trust in transatlantic data flows. The agreement in support of the new EU-U.S. transatlantic data transfer framework, known as the EU-U.S.

Privacy 56
article thumbnail

Is your vital digital information at risk of being the next "eX-Files"?

Preservica

As 90s hit television series The X-Files returns to our screens after a 13 year hiatus, we have launched an awareness campaign to highlight the danger of file format and software obsolescence, and an impending ‘Digital Dark Age’ – warned against by Google’s Vint Cerf last year. Many file formats and software applications popular in 1993 have already disappeared or become obsolete.

Risk 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Should a Company Have a Soul?

John Battelle's Searchblog

The post Should a Company Have a Soul? appeared first on John Battelle's Search Blog. Much of the Republican debates have been expendable theatrics, but I watched this weekend’s follies from South Carolina anyway. And one thing has struck me: The ads are starting to get better. This season’s debates have had the highest ratings of any recent Presidential race, and they’re attracting some serious corporate sponsorship.

IT 68
article thumbnail

What does the resurgence of vinyl records say about IoT?

CGI

What does the resurgence of vinyl records say about IoT? p.butler@cgi.com. Fri, 02/19/2016 - 00:03. "Digitally delivered - the one thing the business thought the consumer wanted which was convenience, but I don't think it did anything to strengthen the connection between the music and the fan. When you reduce the visual marker to a thumbnail, it's not like holding a CD let alone a 12" LP.

IoT 40
article thumbnail

Unleashing The Mayhem CRS

ForAllSecure

In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in

Cloud 40
article thumbnail

EU-US Privacy Shield Announced

Privacy and Cybersecurity Law

Today, political agreement has been reached on the new solution to replace the Safe Harbor regime, the so-called “EU-US Privacy […].

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

CNIL Issues Decision Regarding Data Processing for Litigation Purposes

Hunton Privacy

On February 19, 2016, the French Data Protection Authority (“CNIL”) made public its new Single Authorization Decision No. 46 (“Single Authorization AU-46”). This decision relates to the data processing activities of public and private organizations with respect to the preparation, exercise and follow-up regarding disciplinary or court actions, and the enforcement of those actions.

article thumbnail

Department of Homeland Security Issues Procedures Regarding Sharing Cybersecurity Information

Hunton Privacy

On February 16, 2016, the Department of Homeland Security (“DHS”), in collaboration with other federal agencies, released a series of documents outlining procedures for both federal and non-federal entities to share and disseminate cybersecurity information. These documents were released as directed by the Cybersecurity Act of 2015 (the “Act”), signed into law on December 18, 2015.

article thumbnail

Article 29 Working Party Issues Statement on EU-U.S. Privacy Shield and Other Data Transfer Mechanisms

Hunton Privacy

On February 3, 2016, the Article 29 Working Party (the “Working Party”) issued a statement on the consequences of the ruling of the Court of Justice of the European Union (the “CJEU”) in the Schrems case invalidating the European Commission’s Safe Harbor Decision. The statement follows several weeks of analysis of the other data transfer mechanisms ( i.e. , the EU Standard Contractual Clauses and Binding Corporate Rules) in light of the CJEU’s judgment, as well as the assessment of the current l

Privacy 53