This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.
The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing. That statement seems self-evident to anyone involved in what I call the NewCo economy – work no longer has to be a duty, it can be a calling. For those blessed with the talent, education, connections, and skill to turn work into part of their self expression, work isn’t the thing you have to do so you can “have a lif
DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility. Starting with DB2 Version 7 (around the 2000 time frame), DB2 could automatically and periodically (every 30 minutes, by default) write a variety of statistics about table spaces and ind
On June 18, 2015, the Article 29 Working Party (the “Working Party”) published letters regarding the proposed EU General Data Protection Regulation (the “Regulation”) addressed to representatives of the Council of the European Union , the European Parliament and the European Commission. Attached to each of the letters is an Appendix detailing the Working Party’s opinion on the core themes of the Regulation.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Improving road inspections and maintenance through mobile technology. shobana.lv@cgi.com. Wed, 06/24/2015 - 08:00. Maintaining road infrastructures is highly complex, but also essential for the safety of travelers and economic progress. Roads are heavily used by both business and private travelers, making it difficult to close them for maintenance. Currently, many government transport agencies rely on road inspection techniques that are manual and time consuming.
What a pleasure and honor to work with Bennett. eDisclosure Information Project. There was a time when the roles of corporate professional advisers were sharply defined. Accountants did the sums, audited accounts and gave financial advice while lawyers dealt, largely reactively, with a well-compartmentalised class of problems which involved meeting legal obligations, securing proprietary rights and bringing or defending litigation claims; IP specialists and a range of others with specific skills
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
What a pleasure and honor to work with Bennett. eDisclosure Information Project. There was a time when the roles of corporate professional advisers were sharply defined. Accountants did the sums, audited accounts and gave financial advice while lawyers dealt, largely reactively, with a well-compartmentalised class of problems which involved meeting legal obligations, securing proprietary rights and bringing or defending litigation claims; IP specialists and a range of others with specific skills
Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.
The post Forget Work Life Balance. It’s All About Work Life Integration appeared first on John Battelle's Search Blog. Tuning in. Every so often (though less often than I’d like), I ask one of my team into my band room, a place I created five years ago where the only rules are honest conversations and unbounded agendas. I built it to nurture my budding interest in playing music, but it’s also a great place to pour a drink, erase the white board, and see where the conversat
I am a Certified Information Professional. My areas of expertise include Enterprise Information Architecture and Management, Business Process Management, User Experience Design, Web Application Architecture, and SharePoint Architecture. I also speak, write, and make websites. I believe in AIIM training for information professionals. AIIM training and other professional membership benefits have helped my career so much!
On May 28, 2015, the German government adopted a draft law that would require telecommunications and Internet service providers to retain Internet and telephone usage data. The initiative comes more than a year after the European Court of Justice declared the EU Data Retention Directive invalid, which had been implemented previously by German law. The German law implementing the EU Data Protection Directive had been declared unconstitutional by the German Federal Constitutional Court five years
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The move to modernize traffic management systems. narmada.devarajan. Wed, 07/01/2015 - 01:43. Many traffic managers today are dealing with a multitude of disparate legacy systems that were developed over the past 20 years or so. The point-to-point connections among these systems are complex and difficult to manage. In addition, their underlying technology is outdated, making it difficult to respond to evolving traffic management demands.
Please take our survey and help shape the future of Information Governance. eDisclosure Information Project. The Information Governance Initiative has launched a survey whose results will extend knowledge of the spread of information governance thinking and practice and inform future developments. They will be published in an annual report which will include materials such as infographics which the rest of us will be able to use in presentations and other materials.
The post Why Does Silicon Valley Like “Silicon Valley” So Much? appeared first on John Battelle's Search Blog. HBO’s Silicon Valley , which concluded its second season last night, is an unmitigated hit amongst the Valley folk I’ve come to know and respect. As someone who’s lived variations of the show’s comedically dramatized plotlines – investor takeovers, company-threatening lawsuits, sexist bro cultures, etc. – it makes me cringe, chortle, and engage – something precious few shows
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
On May 13, 2015, Nevada Governor Brian Sandoval (R-NV) signed into law A.B. 179 (the “Bill”), which expands the definition of “personal information” in the state’s data security law. The law takes effect on July 1, 2015. Under the Bill, personal information now includes: a “user name, unique identifier or electronic mail address in combination with a password, access code, or security question and answer that would permit access to an online account;”. a medical identification or health insuranc
On May 26, 2015, the Upper House of the Dutch Parliament passed a bill that introduces a general obligation for data controllers to notify the Dutch Data Protection Authority (“DPA”) of data security breaches and provides increased sanctions for violations of the Dutch Data Protection Act. A Dutch Royal Decree still needs to be adopted to set the new law’s date of entry into force.
On June 2, 2015, the National Institute of Standards and Technology (“NIST”) issued a press release on its recently published draft report, entitled Privacy Risk Management Framework for Federal Information Systems (the “Report”). The Report describes a privacy risk management framework (“PRMF”) for federal information systems designed to promote “a greater understanding of privacy impacts and the capability to address them in federal information systems through risk management.
Hunton & Williams LLP partners Lisa J. Sotto , Scott H. Kimpel and Matthew P. Bosher recently published an article in Westlaw Journal’s Securities Litigation & Regulation entitled SEC Cybersecurity Investigations: A How-to Guide. The article details the U.S. Securities and Exchange Commission’s (“SEC’s”) role in cybersecurity regulation and enforcement, and offers best practice tips for navigating the investigative process.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Earlier this month, the Payment Card Industry Security Standards Council (“PCI SSC”) published a set of enhanced validation procedures designed to provide greater assurance that certain entities are maintaining compliance with the PCI Data Security Standard (“PCI DSS”) effectively and on a continuing basis. The payment card brands and acquirers will determine which organizations are required to undergo a compliance assessment with respect to these supplemental validation requirements, which are
Hunton & Williams will host a live webinar covering the latest developments on the proposed EU General Data Protection Regulation on Thursday, July 9, at 12:00 p.m. EDT. The webinar will provide an overview of the current status of the EU General Data Protection Regulation, highlights from the ongoing trilogue discussions, and guidance on how to prepare for the upcoming changes.
The U.S. District Court for the Central District of California recently granted, only in part, a motion to dismiss a data breach class action against Sony Pictures Entertainment, Inc. (“Sony”) in Corona v. Sony Pictures Entertainment, Inc. , No. 14-CV-09600 (RGK) (C.D. Cal. June 15, 2015). The case therefore will proceed with some of the claims intact.
Legislators in New Hampshire and Oregon recently passed bills designed to protect the online privacy of students in kindergarten through 12th grade. On June 11, 2015, New Hampshire Governor Maggie Hassan (D-NH) signed H.B. 520 , a bipartisan bill that requires operators of websites, online platforms and applications targeting students and their families (“Operators”) to create and maintain “reasonable” security procedures to protect certain covered information about students.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
What Kaggle taught us about predictive analytics. Anonymous. Thu, 06/18/2015 - 08:00. Last year, CGI’s data science team from Prague had the great honor of winning the Kaggle purchase prediction challenge sponsored by Allstate , competing against 1,500 teams worldwide, and I wanted to share some of our lessons learned. Kaggle is an open community where top data scientists can solve complex business problems and learn the latest techniques.
On June 16, 2015, the Consumer Federation of America announced in a joint statement with other privacy advocacy groups that they would no longer participate in the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) multistakeholder process to develop a code of conduct regarding the commercial use of facial recognition technology.
The Council of the European Union has agreed on a general approach to the proposed EU General Data Protection Regulation (the “Regulation”). This marks a significant step forward in the legislative process, and the Council’s text will form the basis of its “trilogue” negotiations with the European Parliament and the European Commission. The aim of the trilogue process is to achieve agreement on a final text of the Regulation by the end of 2015.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Banking on a digital future. p.butler@cgi.com. Mon, 06/15/2015 - 05:40. In my last blog I shared my views on the impact of the digital revolution and its far reaching impact on every one of us and the companies we work for. I read a recent article in the Financial Times about the race to the first true digital bank. This will /could mean the demise of the high street branch with some banks having no branches at all, operating online, and finding other solutions to meeting their physical requir
On June 11 and 12, 2015, Asia Pacific Privacy Authority (“APPA”) members, invited observers and guest speakers from the government, private sector, academia and civil society, met in Hong Kong to discuss privacy law and policy issues at the 43rd APPA Forum. At the end of the open session on day two, APPA issued its customary communiqué , setting forth the highlights of the discussions of the open and closed sessions.
On June 24, 2015, DataGuidance will host a complimentary webinar on Brazil: Towards Privacy Compliance. The panel of speakers includes Bojana Bellamy , President of the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams; Esther Nunes, Partner of Pinheiro Neto Advogados; and Renato Leite Monteiro of Opice Blum, Bruno, Abrusio & Vainzof Advogados Associados.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content