March, 2015

article thumbnail

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 273
article thumbnail

A Few Questions For Publishers Contemplating Facebook As A Platform

John Battelle's Searchblog

'The post A Few Questions For Publishers Contemplating Facebook As A Platform appeared first on John Battelle's Search Blog. Well, it’s happening. According to no less authoritative source than The New York Times , The New York Times is preparing to plant a taproot right inside the highly walled garden that is Facebook. As Times’ executives contemplate moving The Grey Lady squarely under the rather constrictive confines of Facebook’s terms of service , they may be comforting themselves with

Access 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DB2-Managed Data Archiving Feature of DB2 11 for z/OS

Robert's Db2

Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS. In the course of these discussions and presentations, I've noticed something interesting pertaining to the DB2-managed data archiving capability delivered with this latest release of the DBMS: a) it is one of the more misunderstood features of DB2 11, and b) when people do understand what DB2-managed archiving is about, it becomes one of the DB2 11 features about which they are most enthusiastic.

article thumbnail

FTC Forms Office of Technology Research and Investigation

Hunton Privacy

On March 23, 2015, the Federal Trade Commission announced the formation of the Office of Technology Research and Investigation (“OTRI”), which the FTC describes as “an office designed to expand the FTC’s capacity to protect consumers in an age of rapid technological innovation.”. The OTRI will succeed and expand the focus of the FTC’s previously-created Mobile Technology Unit, which focused on consumer protection issues relating to mobile technologies.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

ECJ case on Safe Harbor

Privacy and Cybersecurity Law

The ECJ heard arguments, this week, in the action against the Irish Data Protection Commissioner that Safe Harbor should be […].

More Trending

article thumbnail

Digital washing can wreck your strategic business planning

Collaboration 2.0

'Like France''s 1930''s Maginot Line, ''digital washing'' of old ideas and lack of forward thinking has the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 183
article thumbnail

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

'The post What’s NewCo? These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. I thought I’d share them here. The first one features folks talking about their experience attending festivals, and the second one features host company presentors doing the same.

86
article thumbnail

DB2 for z/OS: Non-Disruptively Altering a Native SQL Procedure

Robert's Db2

Not long ago, I was contacted by a DB2 for z/OS DBA who wanted to run a situation by me. On one of his organizations' mainframe DB2 systems -- a system with very high transaction volumes and very stringent application availability requirements -- there was a native SQL procedure for which the ASUTIME specification had to be changed. The DBA wanted to see if I could help him to find a non-disruptive way to effect this stored procedure modification.

IT 48
article thumbnail

FTC to Host Workshop on Cross-Device Tracking

Hunton Privacy

On November 16, 2015, the Federal Trade Commission will host a workshop in Washington, D.C., to examine the benefits and privacy risks associated with “cross-device tracking.” The workshop intends to highlight the types of cross-device tracking techniques and how businesses and consumers can benefit from these practices. The workshop also will address related privacy and security risks, and discuss whether self-regulatory programs apply to these practices.

Privacy 45
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Cyber Vulnerability in Wind Turbines

Privacy and Cybersecurity Law

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to […].

IT 40
article thumbnail

Managing customer data as an asset at Nissan Europe

CGI

Managing customer data as an asset at Nissan Europe. ravi.kumarv@cgi.com. Mon, 03/16/2015 - 16:32. Improved campaign conversion rates using preferred channels. 1.5X more effective campaign conversions by targeting less…to spend less. 2.5X more effective campaign conversions by targeting better…to win more. Nissan Europe achieved these inspiring results by partnering with CGI to establish a customer master data management platform.

article thumbnail

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ? All valid questions. There must have been a conversation between executives and the IT department at the Secretary of State’s office about this, and it’s fascinating to imagine how that conversation went

IT 40
article thumbnail

With Meridian, Sovrn Levels the Playing Field For Publishers

John Battelle's Searchblog

'The post With Meridian, Sovrn Levels the Playing Field For Publishers appeared first on John Battelle's Search Blog. A long, strange, and ultimately rewarding trip, that’s what many involved in the past ten years at Federated Media, Lijit, and now sovrn Holdings might say. One year ago, give or take, we sold FM’s assets to LIN Media , and created sovrn Holdings , a programmatic data business focused on one mission: to foster an ecosystem where independent and influential publis

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools.

article thumbnail

Centre for Information Policy Leadership Holds Privacy Consultations in Brazil

Hunton Privacy

As part of its ongoing Brazil outreach initiative, a delegation of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) is in Brasilia and Rio de Janeiro the week of March 23, 2015. The delegation will meet with Brazilian government representatives, organizations and experts to discuss global privacy law and best practice developments and other issues of mutual interest, as well as a joint global privacy dialogue workshop in Brazil planned for later this year.

Privacy 40
article thumbnail

Online Dating Site Hit with Anti-Spam Law Fine

Privacy and Cybersecurity Law

On the heels of issuing its first Notice of Violation under Canada’s Anti-spam Legislation (CASL) earlier this month, the Canadian […].

IT 40
article thumbnail

Staying connected with customers in the age of big data

CGI

Staying connected with customers in the age of big data. Anonymous. Mon, 03/16/2015 - 01:28. The owner of a large supermarket chain approached CGI with how difficult it is to retain customers and attract new ones, especially in their large urban and suburban stores. He felt they were losing sight of their loyal customers and what makes them stay or go.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Feature Differences in Office 365 Plans

JKevinParker

I wanted to compare exactly which features are available for these Office 365 plans: Office 365 Business Premium. Office 365 Enterprise E1. Office 365 Enterprise E3. The Office 365 plan comparison page did not give me enough detail. So I checked out the latest Office 365 service comparison page on TechNet (updated 1/28/2015 at the time of this post).

article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.

article thumbnail

CNIL Simplifies Registration Requirements for International Data Transfers Based on BCRs

Hunton Privacy

On March 24, 2015, the CNIL announced the implementation of a new procedure that will simplify the registration formalities for French affiliates of groups that have implemented Binding Corporate Rules (“BCRs”). Currently, the CNIL’s prior authorization is required for each type of data transfer outside of the EU when the transfer is based on BCRs. The CNIL now proposes to issue a single authorization decision to each group that has implemented BCRs.

article thumbnail

IPTF Issues Request for Public Comment Regarding Cybersecurity Issues Affecting the Digital Economy

Hunton Privacy

On March 13, 2015, the U.S. Department of Commerce Internet Policy Task Force (“IPTF”) issued a request for public comment regarding cybersecurity issues affecting the digital economy. The IPTF’s request invites all stakeholders interested in cybersecurity to “identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

UK Announces investment in digital currencies

Privacy and Cybersecurity Law

UK Chancellor, George Osborne, announced yesterday, a £10 million boost from government for digital currency such as Bitcoin. This was […].

article thumbnail

Montana and Washington State Propose Amendments to Data Breach Legislation

Hunton Privacy

On March 4, 2015, the House of Representatives of Washington passed a bill ( HB 1078 ), which would amend the state’s breach notification law to require notification to the state Attorney General in the event of a breach and impose a 45-day timing requirement for notification provided to affected residents and the state regulator. The bill also mandates content requirements for notices to affected residents, including (1) the name and contact information of the reporting business; (2) a list of

article thumbnail

FTC Enters into Memorandum of Understanding with Dutch Data Protection Authority

Hunton Privacy

On March 9, 2015, the Federal Trade Commission announced that it has entered into a Memorandum of Understanding (the “Memorandum”) with the Dutch Data Protection Authority (the “Dutch DPA”). The Memorandum, which does not create legally binding obligations on the FTC or the Dutch DPA, focuses on the following five objectives: cooperating when enforcing applicable privacy laws such as the FTC Act and the Dutch Data Protection Act, including sharing relevant information about complaints; facilitat

Privacy 40
article thumbnail

CGI Top 5 UK Employer Award

CGI

CGI Top 5 UK Employer Award. p.butler@cgi.com. Fri, 03/06/2015 - 02:00. Well here goes, my first blog, I hope you enjoy it. I plan to use this channel on a regular basis to share my thoughts on a variety of topics. CGI is a people business. Ensuring that we are providing the best possible environment and culture for our people to build their careers and develop their skills is critical to our success.

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

NTIA Announces New Multistakeholder Process on Drone Privacy

Hunton Privacy

On March 4, 2015, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process seeking comments on best practices concerning privacy, transparency and accountability issues related to the use of commercial and private unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 40
article thumbnail

$1.1 Million Penalty Issued Under Canada’s Anti-Spam Law

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) announced today that it has issued a Notice of Violation to Quebec-based business Compu-Finder […].

IT 40
article thumbnail

IoT – it’s all about insights

CGI

IoT – it’s all about insights. ravi.kumarv@cgi.com. Thu, 03/05/2015 - 04:11. The Internet of things (IoT) is set to generate vast amounts of new data, with some predictions at over 100Billion ‘things’ sending out data on the Internet by 2020. Without new analysis methods, the sheer volume, at best risks the value of data being lost, and at worst, may overwhelm a business completely.

IoT 40