June, 2015

article thumbnail

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing. That statement seems self-evident to anyone involved in what I call the NewCo economy – work no longer has to be a duty, it can be a calling. For those blessed with the talent, education, connections, and skill to turn work into part of their self expression, work isn’t the thing you have to do so you can “have a lif

IT 111
article thumbnail

Are You Using DB2 for z/OS Real-Time Statistics? DB2 Is

Robert's Db2

DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility. Starting with DB2 Version 7 (around the 2000 time frame), DB2 could automatically and periodically (every 30 minutes, by default) write a variety of statistics about table spaces and ind

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More for less on the menu for restaurants who choose HotSchedules

Collaboration 2.0

Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.

Cloud 71
article thumbnail

Article 29 Working Party Publishes Its Position on the Proposed EU General Data Protection Regulation

Hunton Privacy

On June 18, 2015, the Article 29 Working Party (the “Working Party”) published letters regarding the proposed EU General Data Protection Regulation (the “Regulation”) addressed to representatives of the Council of the European Union , the European Parliament and the European Commission. Attached to each of the letters is an Appendix detailing the Working Party’s opinion on the core themes of the Regulation.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Improving road inspections and maintenance through mobile technology

CGI

Improving road inspections and maintenance through mobile technology. shobana.lv@cgi.com. Wed, 06/24/2015 - 08:00. Maintaining road infrastructures is highly complex, but also essential for the safety of travelers and economic progress. Roads are heavily used by both business and private travelers, making it difficult to close them for maintenance. Currently, many government transport agencies rely on road inspection techniques that are manual and time consuming.

Paper 45

More Trending

article thumbnail

Forget Work Life Balance. It’s All About Work Life Integration

John Battelle's Searchblog

The post Forget Work Life Balance. It’s All About Work Life Integration appeared first on John Battelle's Search Blog. Tuning in. Every so often (though less often than I’d like), I ask one of my team into my band room, a place I created five years ago where the only rules are honest conversations and unbounded agendas. I built it to nurture my budding interest in playing music, but it’s also a great place to pour a drink, erase the white board, and see where the conversat

IT 110
article thumbnail

I Believe in AIIM Training

JKevinParker

I am a Certified Information Professional. My areas of expertise include Enterprise Information Architecture and Management, Business Process Management, User Experience Design, Web Application Architecture, and SharePoint Architecture. I also speak, write, and make websites. I believe in AIIM training for information professionals. AIIM training and other professional membership benefits have helped my career so much!

article thumbnail

More for less on the menu for restaurants who choose HotSchedules

Collaboration 2.0

Vertical industry mobile & cloud companies are getting lots of press and are the current darlings of the VC world. Common sense end user business plans are what will endure from this era and the supporting technologies have to be aligned with their newly digitized commercial goals. The vast restaurant industry vertical is a particularly interesting example of financial justifications.

Cloud 71
article thumbnail

Germany Adopts a Draft Telecom Data Retention Law that Includes a Localization Requirement

Hunton Privacy

On May 28, 2015, the German government adopted a draft law that would require telecommunications and Internet service providers to retain Internet and telephone usage data. The initiative comes more than a year after the European Court of Justice declared the EU Data Retention Directive invalid, which had been implemented previously by German law. The German law implementing the EU Data Protection Directive had been declared unconstitutional by the German Federal Constitutional Court five years

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The move to modernize traffic management systems

CGI

The move to modernize traffic management systems. narmada.devarajan. Wed, 07/01/2015 - 01:43. Many traffic managers today are dealing with a multitude of disparate legacy systems that were developed over the past 20 years or so. The point-to-point connections among these systems are complex and difficult to manage. In addition, their underlying technology is outdated, making it difficult to respond to evolving traffic management demands.

Retail 40
article thumbnail

Information Governance Initiative – the 2015-16 IGI Annual Survey

Barclay T Blair

Please take our survey and help shape the future of Information Governance. eDisclosure Information Project. The Information Governance Initiative has launched a survey whose results will extend knowledge of the spread of information governance thinking and practice and inform future developments. They will be published in an annual report which will include materials such as infographics which the rest of us will be able to use in presentations and other materials.

article thumbnail

Are we nearly there yet?

Privacy and Cybersecurity Law

If you kids ask that one more time… Well, I think it’s only fair for us poor Data Protection kids […].

IT 40
article thumbnail

Why Does Silicon Valley Like “Silicon Valley” So Much?

John Battelle's Searchblog

The post Why Does Silicon Valley Like “Silicon Valley” So Much? appeared first on John Battelle's Search Blog. HBO’s Silicon Valley , which concluded its second season last night, is an unmitigated hit amongst the Valley folk I’ve come to know and respect. As someone who’s lived variations of the show’s comedically dramatized plotlines – investor takeovers, company-threatening lawsuits, sexist bro cultures, etc. – it makes me cringe, chortle, and engage – something precious few shows

IT 108
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Nevada Expands Definition of Personal Information

Hunton Privacy

On May 13, 2015, Nevada Governor Brian Sandoval (R-NV) signed into law A.B. 179 (the “Bill”), which expands the definition of “personal information” in the state’s data security law. The law takes effect on July 1, 2015. Under the Bill, personal information now includes: a “user name, unique identifier or electronic mail address in combination with a password, access code, or security question and answer that would permit access to an online account;”. a medical identification or health insuranc

article thumbnail

New Dutch Law Introduces General Data Breach Notification Obligation and Higher Sanctions

Hunton Privacy

On May 26, 2015, the Upper House of the Dutch Parliament passed a bill that introduces a general obligation for data controllers to notify the Dutch Data Protection Authority (“DPA”) of data security breaches and provides increased sanctions for violations of the Dutch Data Protection Act. A Dutch Royal Decree still needs to be adopted to set the new law’s date of entry into force.

article thumbnail

NIST Publishes Draft Report on Privacy Risk Management for Federal Information Systems

Hunton Privacy

On June 2, 2015, the National Institute of Standards and Technology (“NIST”) issued a press release on its recently published draft report, entitled Privacy Risk Management Framework for Federal Information Systems (the “Report”). The Report describes a privacy risk management framework (“PRMF”) for federal information systems designed to promote “a greater understanding of privacy impacts and the capability to address them in federal information systems through risk management.

Privacy 45
article thumbnail

SEC Cybersecurity Investigations: A How-to Guide

Hunton Privacy

Hunton & Williams LLP partners Lisa J. Sotto , Scott H. Kimpel and Matthew P. Bosher recently published an article in Westlaw Journal’s Securities Litigation & Regulation entitled SEC Cybersecurity Investigations: A How-to Guide. The article details the U.S. Securities and Exchange Commission’s (“SEC’s”) role in cybersecurity regulation and enforcement, and offers best practice tips for navigating the investigative process.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

PCI Security Standards Council Releases Enhanced Validation Requirements for Designated Entities as PCI DSS Version 3.0 Set to Retire

Hunton Privacy

Earlier this month, the Payment Card Industry Security Standards Council (“PCI SSC”) published a set of enhanced validation procedures designed to provide greater assurance that certain entities are maintaining compliance with the PCI Data Security Standard (“PCI DSS”) effectively and on a continuing basis. The payment card brands and acquirers will determine which organizations are required to undergo a compliance assessment with respect to these supplemental validation requirements, which are

article thumbnail

Hunton Webinar on the Proposed EU General Data Protection Regulation on July 9

Hunton Privacy

Hunton & Williams will host a live webinar covering the latest developments on the proposed EU General Data Protection Regulation on Thursday, July 9, at 12:00 p.m. EDT. The webinar will provide an overview of the current status of the EU General Data Protection Regulation, highlights from the ongoing trilogue discussions, and guidance on how to prepare for the upcoming changes.

40
article thumbnail

Federal Court: Data Breach Class Action Against Sony Survives Motion to Dismiss

Hunton Privacy

The U.S. District Court for the Central District of California recently granted, only in part, a motion to dismiss a data breach class action against Sony Pictures Entertainment, Inc. (“Sony”) in Corona v. Sony Pictures Entertainment, Inc. , No. 14-CV-09600 (RGK) (C.D. Cal. June 15, 2015). The case therefore will proceed with some of the claims intact.

article thumbnail

New Hampshire and Oregon Student Privacy Legislation

Hunton Privacy

Legislators in New Hampshire and Oregon recently passed bills designed to protect the online privacy of students in kindergarten through 12th grade. On June 11, 2015, New Hampshire Governor Maggie Hassan (D-NH) signed H.B. 520 , a bipartisan bill that requires operators of websites, online platforms and applications targeting students and their families (“Operators”) to create and maintain “reasonable” security procedures to protect certain covered information about students.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

What Kaggle taught us about predictive analytics

CGI

What Kaggle taught us about predictive analytics. Anonymous. Thu, 06/18/2015 - 08:00. Last year, CGI’s data science team from Prague had the great honor of winning the Kaggle purchase prediction challenge sponsored by Allstate , competing against 1,500 teams worldwide, and I wanted to share some of our lessons learned. Kaggle is an open community where top data scientists can solve complex business problems and learn the latest techniques.

article thumbnail

Consumer Groups Drop Out of NTIA Multistakeholder Process Regarding the Commercial Use of Facial Recognition Technology

Hunton Privacy

On June 16, 2015, the Consumer Federation of America announced in a joint statement with other privacy advocacy groups that they would no longer participate in the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) multistakeholder process to develop a code of conduct regarding the commercial use of facial recognition technology.

Privacy 40
article thumbnail

Council of the European Union Agrees on General Approach to the Proposed General Data Protection Regulation

Hunton Privacy

The Council of the European Union has agreed on a general approach to the proposed EU General Data Protection Regulation (the “Regulation”). This marks a significant step forward in the legislative process, and the Council’s text will form the basis of its “trilogue” negotiations with the European Parliament and the European Commission. The aim of the trilogue process is to achieve agreement on a final text of the Regulation by the end of 2015.

article thumbnail

Banking on a digital future

CGI

Banking on a digital future. p.butler@cgi.com. Mon, 06/15/2015 - 05:40. In my last blog I shared my views on the impact of the digital revolution and its far reaching impact on every one of us and the companies we work for. I read a recent article in the Financial Times about the race to the first true digital bank. This will /could mean the demise of the high street branch with some banks having no branches at all, operating online, and finding other solutions to meeting their physical requir

Access 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Hong Kong Privacy Commissioner Hosts 43rd APPA Forum and Big Data Conference

Hunton Privacy

On June 11 and 12, 2015, Asia Pacific Privacy Authority (“APPA”) members, invited observers and guest speakers from the government, private sector, academia and civil society, met in Hong Kong to discuss privacy law and policy issues at the 43rd APPA Forum. At the end of the open session on day two, APPA issued its customary communiqué , setting forth the highlights of the discussions of the open and closed sessions.

article thumbnail

DataGuidance Hosts Webinar on Brazil’s Draft Privacy Law

Hunton Privacy

On June 24, 2015, DataGuidance will host a complimentary webinar on Brazil: Towards Privacy Compliance. The panel of speakers includes Bojana Bellamy , President of the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams; Esther Nunes, Partner of Pinheiro Neto Advogados; and Renato Leite Monteiro of Opice Blum, Bruno, Abrusio & Vainzof Advogados Associados.

Privacy 40
article thumbnail

China’s Ministry of Industry and Information Technology Published Rules Governing Use of Text Messaging

Hunton Privacy

On May 19, 2015, China’s Ministry of Industry and Information Technology promulgated its Provisions on the Administration of Short Messaging Services (the “Provisions”), which will take effect on June 30, 2015. Prepared to combat improper texting practices, such as junk short messages, the Provisions were adopted under the July 2014 People’s Republic of China (“P.R.C.