May, 2015

article thumbnail

Get Out, And Get Into Silicon Valley: SurveyMonkey, Google, GoPro, FlipBoard, & So Many More

John Battelle's Searchblog

The post Get Out, And Get Into Silicon Valley: SurveyMonkey, Google, GoPro, FlipBoard, & So Many More appeared first on John Battelle's Search Blog. Brian and I on SurveyMonkey’s rooftop last year. New York is in the can (what a great event!) and next up, for those of us in the US anyway, is NewCo Silicon Valley. I won’t be able to actually attend NewCo SV, as I’ll be on the road visiting NewCo Amsterdam and NewCo Istanbul.

IT 82
article thumbnail

For a Large DB2 for z/OS Table, Should You Go With Partition-by-Range or Partition-by-Growth?

Robert's Db2

There are several aspects to this question: What do I mean by "large?" Is the table in question new, or does it exist already? What is the nature of the data in the table, and how will that data be accessed and maintained? I'll try to cover these various angles in this blog entry, and I hope that you will find the information provided to be useful. What is a "large" table?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The enterprise conference circus is in town

Collaboration 2.0

A very busy week for tech conferences sees much repositioning of ERP providers as customer transaction experts. But do prospects want their IT vendors giving them marketing advice?

article thumbnail

Justice Department Releases Guidance on Best Practices for Cyber Incident Preparedness

Hunton Privacy

Last week, the Cybersecurity Unit of the U.S. Department of Justice (the “Justice Department”) released a guidance document, entitled Best Practices for Victim Response and Reporting of Cyber Incidents (“Guidance”), discussing best practices for cyber incident response preparedness based on lessons learned by federal prosecutors while handling cyber investigations and prosecutions.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

More Trending

article thumbnail

Managing the insider threat is a critical part of enterprise security

CGI

Managing the insider threat is a critical part of enterprise security. shobana.lv@cgi.com. Wed, 05/27/2015 - 01:00. Most security-minded professionals think of a cybersecurity threat as originating outside the organization. But one of the most potentially damaging threats to your organization comes from insiders: people you trust. Insiders have authorized access to many of the corporate (or government) crown jewels.

article thumbnail

DB2 11 for z/OS: Setting Aside Space for Updates

Robert's Db2

A DB2 table space is well-organized when rows are physically located where they should be per the clustering index of the associated table. Because a high degree of "clustered-ness" is a desirable quality of a table space (mostly for performance reasons), a DB2 DBA will often take steps to preserve row sequencing between REORGs. One such step that is very commonly executed is the setting aside of space in a table space's pages to accommodate inserts of new rows (relevant for a table that is clus

IT 48
article thumbnail

The enterprise conference circus is in town!

Collaboration 2.0

A very busy week for tech conferences sees much repositioning of ERP providers as customer transaction experts, but do their prospects want their IT vendors giving them marketing advice?

article thumbnail

Hunton Releases Guide to the Proposed EU General Data Protection Regulation

Hunton Privacy

Hunton & Williams’ EU Privacy and Cybersecurity practice lawyers recently authored The Proposed EU General Data Protection Regulation – A guide for in-house lawyers (the “Guide”), addressing the key impacts of the forthcoming changes to EU data protection law. Current EU data protection law is based on the EU Data Protection Directive 95/46/EC (the “Directive”), which was introduced in 1995.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Can I Be Sued for a HIPAA Violation?

HIPAA

I am asked that question almost weekly. While the answer has traditionally been “no,” the legal landscape is shifting and the risk of being sued continues to increase. Let’s first start with some background. As some of you may know, HIPAA does not include a “private right of action.” This means that an individual may not file a claim against a covered entity or a business associate in order to enforce HIPAA or seek damages in response to a HIPAA violation.

article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

The following article appears -- in slightly different form -- as the lead contribution to a larger work on Information Governance published online by the International Legal Technology Association. Find it at [link] Written with assistance from Ronke' Ekwensi The whole is more than the sum of its parts: That’s Information Governance. Like a jigsaw puzzle, the pieces are fragmentary, but they combine to create a whole, and sometimes beautiful, picture.

IT 40
article thumbnail

Health policy and implementation challenges to achieving big data outcomes - Part 2

CGI

Produire des résultats à partir des données massives : politiques de santé et défis liés à la mise en œuvre – 2e partie. shobana.lv@cgi.com. Tue, 05/12/2015 - 05:00. Dans la première partie de ce billet, j’ai décrit quelques-unes des façons dont les outils de données massives peuvent être utilisés dans le secteur de la santé et j’ai souligné l’ironie de la situation avec laquelle nous devons composer : la qualité et l’efficacité de certaines méthodes d’utilisation des données sont couvertes à la

article thumbnail

What Should Businesses Do With Their Existing Paper Records?

Shoreline Records Management

Now that the panic has subsided from the Brooklyn CitiStorage document warehouse fire (even though it shouldn’t) everyone is back in the out of sight, out of mind thinking as it relates to records management. Businesses need to consider what steps to take to create efficiency with their unique records process, and prevent a crisis like this from happening again.

Paper 28
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Driver’s Licence Information and Test Drives: Guidance from the Alberta Office of the Information Privacy Commissioner

Privacy and Cybersecurity Law

What personal information is reasonable for a motor vehicle dealer to collect from individuals participating in test drives? It has been […].

Privacy 40
article thumbnail

Florida Passes Drone Surveillance Bill Requiring Individual Consent

Hunton Privacy

On April 28, 2015, the Florida House of Representatives passed a bill ( SB 766 ) that prohibits businesses and government agencies from using drones to conduct surveillance by capturing images of private real property or individuals on such property without valid written consent under circumstances where a reasonable expectation of privacy exists. The bill expands Florida’s Freedom from Unwarranted Surveillance Act to prohibit the “use [of] a drone equipped with an imaging device to record an im

Privacy 53
article thumbnail

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences

article thumbnail

Enforcement of the Self-Regulatory Principles for Online Behavioral Advertising in the Mobile Environment to Begin on September 1, 2015

Hunton Privacy

On May 7, 2015, the Digital Advertising Alliance (“DAA”) announced that, as of September 1, 2015, the Council of Better Business Bureaus and the Direct Marketing Association will begin to enforce the DAA Self-Regulatory Principles for Online Behavioral Advertising and the Multi-Site Data Principles (collectively, the “Self-Regulatory Principles”) in the mobile environment.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

French Data Protection Authority Reveals 2015 Inspection Program

Hunton Privacy

On May 25, 2015, the French Data Protection Authority (“CNIL”) released its long-awaited annual inspection program for 2015. Under French data protection law, the CNIL may conduct four types of inspections: (1) on-site inspections ( i.e. , the CNIL may visit a company’s facilities and access anything that stores personal data); (2) document reviews ( i.e. , the CNIL may require an entity to send documents or files upon written request); (3) hearings ( i.e. , the CNIL may summon representatives o

article thumbnail

Cyber Insurance: Addressing Your Risks and Liabilities

Hunton Privacy

After a number of high-profile data breaches, corporate cybersecurity is facing increased scrutiny and attention from consumers, the government and the public. In a webinar, entitled Cyber Insurance: Addressing Your Risks and Liabilities , hosted by Hunton & Williams LLP and CT , Hunton & Williams partners Lon A. Berk and Lisa J. Sotto provide a background into the current cyber threats and educate companies and their counsel on how to take full advantage of their existing insurance prog

article thumbnail

FCC Advises Broadband Providers to Take Steps to Protect Consumer Privacy

Hunton Privacy

On May 20, 2015, the Federal Communications Commission (“FCC”) released an Enforcement Advisory announcing that its previously-released Open Internet Order “applies the core customer privacy protections of Section 222 of the Communications Act to providers of broadband Internet access service” and that the statutory provisions of Section 222, which historically have been used to protect Consumer Proprietary Network Information on telephone networks, will apply to broadband providers when the Ope

Privacy 45
article thumbnail

CNIL, ICO and GPEN Review Websites Aimed at Children During Internet Sweep

Hunton Privacy

On May 11, 2015, the French Data Protection Authority (“CNIL”) and the UK Information Commissioner’s Office (”ICO”) announced that they will participate in a coordinated online audit to assess whether websites and apps that are directed toward children, and those that are frequently used by or popular among children, comply with global privacy laws.

Privacy 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Centre for Information Policy Leadership Comments on Brazil’s Draft Privacy Law

Hunton Privacy

On May 5, 2015, the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) filed comments in English and Portuguese on Brazil’s draft law “on the processing of personal data to protect the personality and dignity of natural persons” (the “Draft Law”). CIPL’s comments on the Draft Law focus on several key issues that are particularly important in the context of global privacy policy and practice, including alternatives to consent to legitimize data processing, the use of organ

Privacy 45
article thumbnail

Belgian Data Protection Authority Issues Recommendation on Facebook’s User Tracking

Hunton Privacy

On May 13, 2015, the Belgian Data Protection Authority (the “DPA”) published a recommendation addressing the use of social plug-ins associated with Facebook and its services (the “Recommendation”). The Recommendation stems from the recent discussions between the DPA and Facebook regarding Facebook’s privacy policy and the tracking of individuals’ Internet activities.

Privacy 40
article thumbnail

FinCEN Announces First BSA Enforcement Action Against Virtual Currency Exchanger

Hunton Privacy

On May 5, 2015, the Financial Crimes Enforcement Network of the U.S. Treasury Department (“FinCEN”), in coordination with the U.S. Attorney’s Office for the Northern District of California (“USAO”), announced a civil monetary penalty of $700,000 against Ripple Labs, Inc. (“Ripple Labs”) and its subsidiary XRP II, LLC (“XRP II”) for violations of the Bank Secrecy Act (“BSA”).

article thumbnail

A pragmatic solution to the cyber talent shortage: Co-sourcing

CGI

A pragmatic solution to the cyber talent shortage: Co-sourcing. Anonymous. Mon, 05/11/2015 - 02:21. CGI recently partnered with Pierre Audoin Consultants (PAC) to study cybersecurity trends in the United Kingdom. A key question asked was this: “Is cybersecurity now too hard for enterprises?” Of more than 230 respondents from companies with 1,000 employees or more, just 21% reported they do all of their cyber work internally.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Second Circuit Rules that NSA Phone Data Collection Not Authorized by PATRIOT Act

Hunton Privacy

On May 7, 2015, the U.S. Court of Appeals for the Second Circuit sided with the American Civil Liberties Union, holding that the National Security Agency’s (“NSA’s”) collection of metadata relating to domestic phone records is not permitted under the PATRIOT Act. This ruling overturns a December 2013 Southern District of New York decision finding that the NSA’s telephone data collection program is lawful under Section 215 of the PATRIOT Act.

article thumbnail

Health policy challenges to achieving big data outcomes, part I

CGI

Produire des résultats à partir des données massives : politiques de santé et défis liés à la mise en œuvre – 1re partie. shobana.lv@cgi.com. Tue, 05/05/2015 - 05:30. Utiliser pleinement le potentiel d’une nouvelle technologie requiert beaucoup de temps et il est parfois nécessaire de changer les politiques ainsi que les façons d’utiliser la technologie.

article thumbnail

Can I Be Sued for a HIPAA Violation?

HIPAA

I am asked that question almost weekly. While the answer has traditionally been “no,” the legal landscape is shifting and the risk of being sued continues to increase. Let’s first start with some background. As some of you may know, HIPAA does not include a “private right of action.” This means that an individual may not file a claim against a covered entity or a business associate in order to enforce HIPAA or seek damages in response to a HIPAA violation.