This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.
'The post A Few Questions For Publishers Contemplating Facebook As A Platform appeared first on John Battelle's Search Blog. Well, it’s happening. According to no less authoritative source than The New York Times , The New York Times is preparing to plant a taproot right inside the highly walled garden that is Facebook. As Times’ executives contemplate moving The Grey Lady squarely under the rather constrictive confines of Facebook’s terms of service , they may be comforting themselves with
Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS. In the course of these discussions and presentations, I've noticed something interesting pertaining to the DB2-managed data archiving capability delivered with this latest release of the DBMS: a) it is one of the more misunderstood features of DB2 11, and b) when people do understand what DB2-managed archiving is about, it becomes one of the DB2 11 features about which they are most enthusiastic.
On March 23, 2015, the Federal Trade Commission announced the formation of the Office of Technology Research and Investigation (“OTRI”), which the FTC describes as “an office designed to expand the FTC’s capacity to protect consumers in an age of rapid technological innovation.”. The OTRI will succeed and expand the focus of the FTC’s previously-created Mobile Technology Unit, which focused on consumer protection issues relating to mobile technologies.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Huit astuces pour améliorer votre cybersécurité sans défoncer votre budget. shobana.lv@cgi.com. Thu, 03/26/2015 - 02:00. Les budgets consacrés aux TI ne sont plus ce qu’ils étaient. L’époque où ils rivalisaient avec le PIB de petits pays est révolue. Et, bien qu’une énorme part du budget en TI continue d’être allouée aux dépenses en cybersécurité, cette enveloppe est désormais résolument réduite.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Huit astuces pour améliorer votre cybersécurité sans défoncer votre budget. shobana.lv@cgi.com. Thu, 03/26/2015 - 02:00. Les budgets consacrés aux TI ne sont plus ce qu’ils étaient. L’époque où ils rivalisaient avec le PIB de petits pays est révolue. Et, bien qu’une énorme part du budget en TI continue d’être allouée aux dépenses en cybersécurité, cette enveloppe est désormais résolument réduite.
'Like France''s 1930''s Maginot Line, ''digital washing'' of old ideas and lack of forward thinking has the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.
'The post What’s NewCo? These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. I thought I’d share them here. The first one features folks talking about their experience attending festivals, and the second one features host company presentors doing the same.
Not long ago, I was contacted by a DB2 for z/OS DBA who wanted to run a situation by me. On one of his organizations' mainframe DB2 systems -- a system with very high transaction volumes and very stringent application availability requirements -- there was a native SQL procedure for which the ASUTIME specification had to be changed. The DBA wanted to see if I could help him to find a non-disruptive way to effect this stored procedure modification.
On November 16, 2015, the Federal Trade Commission will host a workshop in Washington, D.C., to examine the benefits and privacy risks associated with “cross-device tracking.” The workshop intends to highlight the types of cross-device tracking techniques and how businesses and consumers can benefit from these practices. The workshop also will address related privacy and security risks, and discuss whether self-regulatory programs apply to these practices.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Managing customer data as an asset at Nissan Europe. ravi.kumarv@cgi.com. Mon, 03/16/2015 - 16:32. Improved campaign conversion rates using preferred channels. 1.5X more effective campaign conversions by targeting less…to spend less. 2.5X more effective campaign conversions by targeting better…to win more. Nissan Europe achieved these inspiring results by partnering with CGI to establish a customer master data management platform.
Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ? All valid questions. There must have been a conversation between executives and the IT department at the Secretary of State’s office about this, and it’s fascinating to imagine how that conversation went
'The post With Meridian, Sovrn Levels the Playing Field For Publishers appeared first on John Battelle's Search Blog. A long, strange, and ultimately rewarding trip, that’s what many involved in the past ten years at Federated Media, Lijit, and now sovrn Holdings might say. One year ago, give or take, we sold FM’s assets to LIN Media , and created sovrn Holdings , a programmatic data business focused on one mission: to foster an ecosystem where independent and influential publis
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools.
As part of its ongoing Brazil outreach initiative, a delegation of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) is in Brasilia and Rio de Janeiro the week of March 23, 2015. The delegation will meet with Brazilian government representatives, organizations and experts to discuss global privacy law and best practice developments and other issues of mutual interest, as well as a joint global privacy dialogue workshop in Brazil planned for later this year.
Staying connected with customers in the age of big data. Anonymous. Mon, 03/16/2015 - 01:28. The owner of a large supermarket chain approached CGI with how difficult it is to retain customers and attract new ones, especially in their large urban and suburban stores. He felt they were losing sight of their loyal customers and what makes them stay or go.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
I wanted to compare exactly which features are available for these Office 365 plans: Office 365 Business Premium. Office 365 Enterprise E1. Office 365 Enterprise E3. The Office 365 plan comparison page did not give me enough detail. So I checked out the latest Office 365 service comparison page on TechNet (updated 1/28/2015 at the time of this post).
A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.
On March 24, 2015, the CNIL announced the implementation of a new procedure that will simplify the registration formalities for French affiliates of groups that have implemented Binding Corporate Rules (“BCRs”). Currently, the CNIL’s prior authorization is required for each type of data transfer outside of the EU when the transfer is based on BCRs. The CNIL now proposes to issue a single authorization decision to each group that has implemented BCRs.
On March 13, 2015, the U.S. Department of Commerce Internet Policy Task Force (“IPTF”) issued a request for public comment regarding cybersecurity issues affecting the digital economy. The IPTF’s request invites all stakeholders interested in cybersecurity to “identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On March 4, 2015, the House of Representatives of Washington passed a bill ( HB 1078 ), which would amend the state’s breach notification law to require notification to the state Attorney General in the event of a breach and impose a 45-day timing requirement for notification provided to affected residents and the state regulator. The bill also mandates content requirements for notices to affected residents, including (1) the name and contact information of the reporting business; (2) a list of
On March 9, 2015, the Federal Trade Commission announced that it has entered into a Memorandum of Understanding (the “Memorandum”) with the Dutch Data Protection Authority (the “Dutch DPA”). The Memorandum, which does not create legally binding obligations on the FTC or the Dutch DPA, focuses on the following five objectives: cooperating when enforcing applicable privacy laws such as the FTC Act and the Dutch Data Protection Act, including sharing relevant information about complaints; facilitat
CGI Top 5 UK Employer Award. p.butler@cgi.com. Fri, 03/06/2015 - 02:00. Well here goes, my first blog, I hope you enjoy it. I plan to use this channel on a regular basis to share my thoughts on a variety of topics. CGI is a people business. Ensuring that we are providing the best possible environment and culture for our people to build their careers and develop their skills is critical to our success.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On March 4, 2015, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process seeking comments on best practices concerning privacy, transparency and accountability issues related to the use of commercial and private unmanned aircraft systems (“UAS”), otherwise known as drones.
The Canadian Radio-television and Telecommunications Commission (CRTC) announced today that it has issued a Notice of Violation to Quebec-based business Compu-Finder […].
IoT – it’s all about insights. ravi.kumarv@cgi.com. Thu, 03/05/2015 - 04:11. The Internet of things (IoT) is set to generate vast amounts of new data, with some predictions at over 100Billion ‘things’ sending out data on the Internet by 2020. Without new analysis methods, the sheer volume, at best risks the value of data being lost, and at worst, may overwhelm a business completely.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content