January, 2016

article thumbnail

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

The post Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission appeared first on John Battelle's Search Blog. Twelve years of making predictions doesn’t make writing them any easier, regardless of my relatively good showing in 2015. In fact, I briefly considered taking the year off – who am I to make predictions anyway?

IoT 75
article thumbnail

Anti-Terrorism Law Enacted in China

Hunton Privacy

On December 27, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published the P.R.C. Anti-Terrorism Law. The law was enacted in response to a perceived growing threat from extremists and terrorists, particularly in regions in Western China, and came into effect on January 1, 2016. As its name suggests, the main goal of the law is to strengthen national security and to prevent terrorism.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Thoughts on History and Archive Tables

Robert's Db2

I'll state up front that I'm using the terms "history table" and "archive" table not in a generic sense, but as they have technical meaning in a DB2 for z/OS context. A history table is paired with a "base" table that has been enabled f or system-time temporal support (introduced with DB2 10 for z/OS), and an archive table goes with a base table that has been enabled for DB2-ma nage d archiving (also known as "transparent archi ving" - - a feature delivered with DB2 11).

article thumbnail

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device

Elie

This post summarizes which equipement the FBI use to seize the content of servers and laptops despite many of them use full disk encryption and which defenses exist.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How ‘smart’ is your smart working strategy?

CGI

How ‘smart’ is your smart working strategy? ravi.kumarv@cgi.com. Thu, 01/28/2016 - 07:02. When I talk with friends, family and my clients about the current people challenges in business, there’s often a lot of interest and hot debate about ‘ Smart’ Working …indeed when I joined CGI, one of the things that attracted me as a prospective employee was the company’s philosophy on being outcome focused, providing opportunities to work flexibly and a commitment to employee wellbeing and the work-life b

Paper 40

More Trending

article thumbnail

Is Tech Getting Boring?

John Battelle's Searchblog

The post Is Tech Getting Boring? appeared first on John Battelle's Search Blog. Finishing up my reading for the evening, I came across this serendipitous tweet.*. Intrigued (well done, Mr. Rosoff), I clicked the link, noting it was to Business Insider , a publication for which I have decidedly complicated feelings**. In any case, the story was great, if single sourced.

article thumbnail

New Safe Harbor Deal Between EU and U.S. May Be Imminent

Hunton Privacy

According to Bloomberg BNA , Paul F. Nemitz, Director for Fundamental Rights and Union Citizenship at the Directorate-General Justice of the European Commission, said at a privacy conference that he hoped a new U.S.-EU Safe Harbor agreement would be reached by the evening of Monday, February 1, 2016. According to Nemitz, V?ra Jourová, European Commissioner for Justice, Consumers and Gender Equality Justice, will go to Parliament on Monday evening to “inform member states…of the outcome [of

Privacy 56
article thumbnail

DB2 for z/OS-Managed Archiving, or System-Time Temporal?

Robert's Db2

Recently I had the opportunity to talk to a group of application developers and DBAs about the temporal data support that was introduced with DB2 10 for z/OS. One of the meeting attendees asked an interesting question: for data-archive purposes, should one use system-time temporal functionality (by which DB2 retains "before" images of rows that are affected by update or delete operations), or the DB2-managed archiving capability delivered with DB2 11 for z/OS?

article thumbnail

How email in transit can be intercepted using dns hijacking

Elie

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack discussed in a previous post, it is equally effective at defeating email in-transit encryption.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

InfoGov 2016: The State of Enterprise Information

JKevinParker

The information experts at Optismo and InfoGovCon have published a new report called " Information Governance 2016: The State of Enterprise Information (Part 1) ". This important research paints a bleak picture of Information Governance maturity in today's enterprises. I was excited to see one of my responses quoted in this research: InfoGovCon: "Do you believe the term 'Enterprise Content Management' is still helpful or still has meaning?".

ECM 40
article thumbnail

When all you have is a hammer, everything looks like a nail

CGI

When all you have is a hammer, everything looks like a nail. ravi.kumarv@cgi.com. Mon, 01/25/2016 - 03:00. The author Tim Ferriss tells the story of a man who loses his keys after a night on the town. His friends find him on his hands and knees looking for them under a streetlight, even though he knows he lost them somewhere else. “Why are you looking for your keys under the streetlight?

article thumbnail

FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early

John Battelle's Searchblog

The post FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early appeared first on John Battelle's Search Blog. Way back in 2012 – four years ago in real time, three decades or so in Internet time – I predicted that Facebook would build an alternative to Google’s AdSense based on its extraordinary data set. I was right, but…off by a few years.

article thumbnail

FTC Releases New Report on Big Data

Hunton Privacy

On January 6, 2015, the Federal Trade Commission released its report on big data entitled Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues. The report is a compilation of a seminar on alternative scoring products, the discussions at a big data public workshop held on September 15, 2014, and other recent research and public commentary on the issue.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Taking the complexity out

Attensa

At Attensa we work with complex organizations that are solving complex problems. Effectively managing information and knowledge is a core part of the business strategies of these organizations. But often complexity begets complexity. In the universe of business and professional information services, the complexity wave has been playing out for decades as providers and their customers struggle with applying pre-digital content metaphors to a digital world.

article thumbnail

New year! New North America office!

Preservica

I am excited to announce that as the newly independent Preservica, we have just moved into our new North America office on Milk Street, in the heart of downtown Boston, MA. The move will allow us to increase our focus on serving customers right across the region - as well as of course the growing community of Preservica users in the Boston area, including the Massachusetts State Archives, the City of Boston, Emerson College and The Trustees of Reservations, to name just a few.

article thumbnail

Speaking at AIIM16

JKevinParker

At this year's AIIM Conference , I will be speaking on SharePoint planning for user adoption: Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used. SharePoint is infamous for being unuseful, unusable, and unused. But the fault is not in the technology—usually, it is a failure to adequately plan and execute practical business solutions that causes SharePoint projects to flounder.

article thumbnail

New European Cyber Laws (NISD) – Do you understand the potential impact on your business?

CGI

New European Cyber Laws (NISD) – Do you understand the potential impact on your business? Anonymous. Fri, 01/22/2016 - 04:18. I previously blogged about the new General Data Protection Regulation (GDPR) agreed as European legislation in December 2015. This blog focuses on the new Network and Information Security Directive (NISD) which was agreed at the same time and also has significant implications for business. table.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Mobile Gets a Back Button

John Battelle's Searchblog

The post Mobile Gets a Back Button appeared first on John Battelle's Search Blog. I just opened an email on my phone. It was from a fellow I don’t know, inviting me to an event I’d never heard of. Intrigued, I clicked on the fellow’s LinkedIn, which was part of his email signature. That link opened the LinkedIn app on my phone. In the fellow’s LI feed was another link, this one to a tweet he had mentioned in his feed.

IT 58
article thumbnail

Dutch Law Includes General Data Breach Notification Obligation and Larger Fines for Violations of the Data Protection Act

Hunton Privacy

On January 1, 2016, a Dutch law became effective that (1) includes a general obligation for data controllers to notify the Data Protection Authority (“DPA”) of data security breaches, and (2) authorizes the DPA to impose direct fines for violations of the Data Protection Act. Under the law, data controllers are required to immediately notify the DPA of any data security breaches that have, or are likely to have, serious adverse consequences to the protection of personal data.

article thumbnail

The Streaming Conundrum: Forgetting What I Heard

John Battelle's Searchblog

The post The Streaming Conundrum: Forgetting What I Heard appeared first on John Battelle's Search Blog. Once upon a time, I’d read the yearly lists of “best albums” from folks like Rick Webb or Marc Ruxin , and immediately head over to the iTunes store for a music-buying binge. Afterwards, I’d listen happily to my new music for days on end, forging new connections between the bands my pals had suggested and my own life experiences.

article thumbnail

On Medium, Facebook, and the Graph Conflict

John Battelle's Searchblog

The post On Medium, Facebook, and the Graph Conflict appeared first on John Battelle's Search Blog. I double took upon arriving at Medium just now, fingers flexed to write about semi-private data and hotel rooms (trust me, it’s gonna be great). But upon my arrival, I was greeted thusly: Now, I have no categorical beef with Facebook, I understand the value of its network as much as the next publisher.

IT 53
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Senate Judiciary Committee Passes Amended Judicial Redress Act

Hunton Privacy

On January 28, 2016, the Senate Judiciary Committee passed the Judicial Redress Act (the “Act”), which would give EU citizens the right to sue over certain data privacy issues in the U.S. The Act passed after an amendment was approved which would condition EU citizens’ right to sue on EU Member States (1) allowing companies to transfer personal data to the U.S. for commercial purposes and (2) having personal data transfer policies which do not materially impede the national security interests of

article thumbnail

Taiwan Amends Personal Data Protection Law

Hunton Privacy

On December 30, 2015, Taiwan’s Office of the President issued an order to promulgate certain amendments (the “Amendments”) to Taiwan’s Personal Data Protection Law (the “PDPL”). The Amendments revise 12 articles in the PDPL. The Amendments concern the collection and use of sensitive personal data, the form of consent for the collection and use of non-sensitive personal data, and the imposition of criminal liability for violations of certain provisions of the PDPL.

article thumbnail

Dear Microsoft. I Want To Use Office 365. But…

John Battelle's Searchblog

The post Dear Microsoft. I Want To Use Office 365. But… appeared first on John Battelle's Search Blog. Here’s what I encountered when I, as a first time ever user, was directed to a document that lived in Office 365 World: Holy crap, Microsoft! I just wanted to read the document a colleague at another (much larger, older, and traditional) company had sent me.

49
article thumbnail

Centre for Information Policy Leadership to Co-Host APEC Privacy Workshop in Lima, Peru

Hunton Privacy

On February 22, 2016, the Centre for Information Policy Leadership (“CIPL”), together with TRUSTe, the Information Accountability Foundation and Information Integrity Solutions, will co-host a workshop on Building a Dependable Framework for Privacy, Innovation and Cross-Border Data Flows in the Asia-Pacific Region in Lima, Peru. The workshop will be held in the margins of the upcoming meetings of the APEC Electronic Commerce Steering Group and its Data Privacy Subgroup in Lima from February 23-

Privacy 45
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Pew Research Center Issues Report on Attitudes Toward Sharing Personal Information with Private Sector

Hunton Privacy

On December 30, 2015, the Pew Research Center released a report on the results of a recent survey that asked 461 Americans about their feelings toward sharing personal information with companies. The survey found that a “significant minority” of American adults have felt “confused over information provided in company privacy policies, discouraged by the amount of effort needed to understand the implications of sharing their data, and impatient because they wanted to learn more about the informat

Privacy 45
article thumbnail

CIPL Holds Safe Harbor “Essential Equivalence” Roundtable with Top European Voices

Hunton Privacy

On January 28, 2016, the Centre for Information Policy Leadership (“CIPL”) held a special roundtable at Hunton & Williams’ Brussels office to examine the “essential equivalence” requirement for protection of data transfers to non-EU countries set by the Court of Justice of the European Union’s (“CJEU’s”) Schrems decision. The roundtable brought together leading lawyers, corporate privacy officers, legal experts, regulators and policymakers to discuss the critical issues and impact of t

Privacy 40
article thumbnail

Russian Data Protection Authority Releases 2016 Audit Plan for Localization Law

Hunton Privacy

On January 13, 2016, the Russian Data Protection Authority ( Roscommandzor ) released its plan for audits this year to assess compliance with Russia’s data localization law , which became effective on September 1, 2015. The localization law requires companies to store the personal data of Russians in databases located in Russia. The audit plan indicates that the Roscommandzor will audit large, multinational companies doing business in numerous jurisdictions and processing the personal data of Ru