March, 2015

article thumbnail

A Few Questions For Publishers Contemplating Facebook As A Platform

John Battelle's Searchblog

'The post A Few Questions For Publishers Contemplating Facebook As A Platform appeared first on John Battelle's Search Blog. Well, it’s happening. According to no less authoritative source than The New York Times , The New York Times is preparing to plant a taproot right inside the highly walled garden that is Facebook. As Times’ executives contemplate moving The Grey Lady squarely under the rather constrictive confines of Facebook’s terms of service , they may be comforting themselves with

Access 110
article thumbnail

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

'France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

Marketing 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The DB2-Managed Data Archiving Feature of DB2 11 for z/OS

Robert's Db2

Over the past year and a half, I have been talking to lots of people about DB2 11 for z/OS. In the course of these discussions and presentations, I've noticed something interesting pertaining to the DB2-managed data archiving capability delivered with this latest release of the DBMS: a) it is one of the more misunderstood features of DB2 11, and b) when people do understand what DB2-managed archiving is about, it becomes one of the DB2 11 features about which they are most enthusiastic.

article thumbnail

FTC Forms Office of Technology Research and Investigation

Hunton Privacy

On March 23, 2015, the Federal Trade Commission announced the formation of the Office of Technology Research and Investigation (“OTRI”), which the FTC describes as “an office designed to expand the FTC’s capacity to protect consumers in an age of rapid technological innovation.”. The OTRI will succeed and expand the focus of the FTC’s previously-created Mobile Technology Unit, which focused on consumer protection issues relating to mobile technologies.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

ECJ case on Safe Harbor

Privacy and Cybersecurity Law

The ECJ heard arguments, this week, in the action against the Irish Data Protection Commissioner that Safe Harbor should be […].

More Trending

article thumbnail

What’s NewCo? These Videos Will Help

John Battelle's Searchblog

'The post What’s NewCo? These Videos Will Help appeared first on John Battelle's Search Blog. The NewCo festival model is counter-intuitive, so we made these videos to help explain what the fuss is all about. I thought I’d share them here. The first one features folks talking about their experience attending festivals, and the second one features host company presentors doing the same.

86
article thumbnail

Digital washing can wreck your strategic business planning

Collaboration 2.0

'Like France''s 1930''s Maginot Line, ''digital washing'' of old ideas and lack of forward thinking has the potential to create strategic disaster in a highly competitive world where speed to market and agility are key.

article thumbnail

DB2 for z/OS: Non-Disruptively Altering a Native SQL Procedure

Robert's Db2

Not long ago, I was contacted by a DB2 for z/OS DBA who wanted to run a situation by me. On one of his organizations' mainframe DB2 systems -- a system with very high transaction volumes and very stringent application availability requirements -- there was a native SQL procedure for which the ASUTIME specification had to be changed. The DBA wanted to see if I could help him to find a non-disruptive way to effect this stored procedure modification.

IT 48
article thumbnail

FTC to Host Workshop on Cross-Device Tracking

Hunton Privacy

On November 16, 2015, the Federal Trade Commission will host a workshop in Washington, D.C., to examine the benefits and privacy risks associated with “cross-device tracking.” The workshop intends to highlight the types of cross-device tracking techniques and how businesses and consumers can benefit from these practices. The workshop also will address related privacy and security risks, and discuss whether self-regulatory programs apply to these practices.

Privacy 45
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cyber Vulnerability in Wind Turbines

Privacy and Cybersecurity Law

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to […].

IT 40
article thumbnail

Managing customer data as an asset at Nissan Europe

CGI

Managing customer data as an asset at Nissan Europe. ravi.kumarv@cgi.com. Mon, 03/16/2015 - 16:32. Improved campaign conversion rates using preferred channels. 1.5X more effective campaign conversions by targeting less…to spend less. 2.5X more effective campaign conversions by targeting better…to win more. Nissan Europe achieved these inspiring results by partnering with CGI to establish a customer master data management platform.

article thumbnail

With Meridian, Sovrn Levels the Playing Field For Publishers

John Battelle's Searchblog

'The post With Meridian, Sovrn Levels the Playing Field For Publishers appeared first on John Battelle's Search Blog. A long, strange, and ultimately rewarding trip, that’s what many involved in the past ten years at Federated Media, Lijit, and now sovrn Holdings might say. One year ago, give or take, we sold FM’s assets to LIN Media , and created sovrn Holdings , a programmatic data business focused on one mission: to foster an ecosystem where independent and influential publis

article thumbnail

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ? All valid questions. There must have been a conversation between executives and the IT department at the Secretary of State’s office about this, and it’s fascinating to imagine how that conversation went

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools.

article thumbnail

Centre for Information Policy Leadership Holds Privacy Consultations in Brazil

Hunton Privacy

As part of its ongoing Brazil outreach initiative, a delegation of the Centre for Information Policy Leadership at Hunton & Williams (“CIPL”) is in Brasilia and Rio de Janeiro the week of March 23, 2015. The delegation will meet with Brazilian government representatives, organizations and experts to discuss global privacy law and best practice developments and other issues of mutual interest, as well as a joint global privacy dialogue workshop in Brazil planned for later this year.

Privacy 40
article thumbnail

UK Announces investment in digital currencies

Privacy and Cybersecurity Law

UK Chancellor, George Osborne, announced yesterday, a £10 million boost from government for digital currency such as Bitcoin. This was […].

article thumbnail

Staying connected with customers in the age of big data

CGI

Staying connected with customers in the age of big data. Anonymous. Mon, 03/16/2015 - 01:28. The owner of a large supermarket chain approached CGI with how difficult it is to retain customers and attract new ones, especially in their large urban and suburban stores. He felt they were losing sight of their loyal customers and what makes them stay or go.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Feature Differences in Office 365 Plans

JKevinParker

I wanted to compare exactly which features are available for these Office 365 plans: Office 365 Business Premium. Office 365 Enterprise E1. Office 365 Enterprise E3. The Office 365 plan comparison page did not give me enough detail. So I checked out the latest Office 365 service comparison page on TechNet (updated 1/28/2015 at the time of this post).

article thumbnail

Business Associate Agreements – a First Look at Indemnification

HIPAA

A party’s responsibilities under HIPAA generally come from two sources – the law itself and the business associate agreement entered into between the covered entity (the health care provider or health plan) and the business associate (its vendor). While all parts of a business associate agreement are important, there are certain terms that are most likely to affect the parties’ liability and obligations.

article thumbnail

CNIL Simplifies Registration Requirements for International Data Transfers Based on BCRs

Hunton Privacy

On March 24, 2015, the CNIL announced the implementation of a new procedure that will simplify the registration formalities for French affiliates of groups that have implemented Binding Corporate Rules (“BCRs”). Currently, the CNIL’s prior authorization is required for each type of data transfer outside of the EU when the transfer is based on BCRs. The CNIL now proposes to issue a single authorization decision to each group that has implemented BCRs.

article thumbnail

IPTF Issues Request for Public Comment Regarding Cybersecurity Issues Affecting the Digital Economy

Hunton Privacy

On March 13, 2015, the U.S. Department of Commerce Internet Policy Task Force (“IPTF”) issued a request for public comment regarding cybersecurity issues affecting the digital economy. The IPTF’s request invites all stakeholders interested in cybersecurity to “identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Montana and Washington State Propose Amendments to Data Breach Legislation

Hunton Privacy

On March 4, 2015, the House of Representatives of Washington passed a bill ( HB 1078 ), which would amend the state’s breach notification law to require notification to the state Attorney General in the event of a breach and impose a 45-day timing requirement for notification provided to affected residents and the state regulator. The bill also mandates content requirements for notices to affected residents, including (1) the name and contact information of the reporting business; (2) a list of

article thumbnail

FTC Enters into Memorandum of Understanding with Dutch Data Protection Authority

Hunton Privacy

On March 9, 2015, the Federal Trade Commission announced that it has entered into a Memorandum of Understanding (the “Memorandum”) with the Dutch Data Protection Authority (the “Dutch DPA”). The Memorandum, which does not create legally binding obligations on the FTC or the Dutch DPA, focuses on the following five objectives: cooperating when enforcing applicable privacy laws such as the FTC Act and the Dutch Data Protection Act, including sharing relevant information about complaints; facilitat

Privacy 40
article thumbnail

CGI Top 5 UK Employer Award

CGI

CGI Top 5 UK Employer Award. p.butler@cgi.com. Fri, 03/06/2015 - 02:00. Well here goes, my first blog, I hope you enjoy it. I plan to use this channel on a regular basis to share my thoughts on a variety of topics. CGI is a people business. Ensuring that we are providing the best possible environment and culture for our people to build their careers and develop their skills is critical to our success.

IT 40
article thumbnail

NTIA Announces New Multistakeholder Process on Drone Privacy

Hunton Privacy

On March 4, 2015, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process seeking comments on best practices concerning privacy, transparency and accountability issues related to the use of commercial and private unmanned aircraft systems (“UAS”), otherwise known as drones.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

IoT – it’s all about insights

CGI

IoT – it’s all about insights. ravi.kumarv@cgi.com. Thu, 03/05/2015 - 04:11. The Internet of things (IoT) is set to generate vast amounts of new data, with some predictions at over 100Billion ‘things’ sending out data on the Internet by 2020. Without new analysis methods, the sheer volume, at best risks the value of data being lost, and at worst, may overwhelm a business completely.

IoT 40
article thumbnail

Department of Education Releases Guidance for Schools Regarding Terms of Service Offered by Providers of Online Educational Services

Hunton Privacy

On February 26, 2015, the Department of Education’s Privacy Technical Assistance Center (“PTAC”) issued guidance to assist schools, school districts and vendors with understanding the primary laws regulating student privacy and how compliance with those laws may be affected by Terms of Service (“TOS”) offered by providers of online educational services and mobile applications.

article thumbnail

Third Circuit Hears Oral Arguments in FTC v. Wyndham

Hunton Privacy

On March 3, 2015, the Third Circuit heard oral arguments in FTC v. Wyndham Worldwide Corp. (“Wyndham”) on whether the FTC has the authority to regulate private companies’ data security under Section 5 of the FTC Act. As we previously reported , on June 26, 2012, the FTC announced that it had filed suit against Wyndham and three of its subsidiaries alleging that the company posted misleading representations on Wyndham websites regarding how the company safeguarded customer information.