March, 2016

article thumbnail

Observations on DB2 for z/OS Address Space CPU Utilization

Robert's Db2

Have you ever looked at a DB2 Statistics Long report generated by your DB2 monitor? If so, you might have seen a section containing information about the CPU consumption of the various DB2 address spaces. It would look something like the example below, which reflects activity over a one-hour period of time (similar information might be available as well via an online display provided by your DB2 monitor).

IT 82
article thumbnail

On Tech Leadership

John Battelle's Searchblog

The post On Tech Leadership appeared first on John Battelle's Search Blog. I’ve written a piece over on NewCo that I wanted to also post it here. See below… If your business focus is in technology or the Internet, as mine has been for nearly three decades, it’s quite possible you’ve never heard of the GLOBE Series , a global conference dedicated to sustainability in business.

Mining 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How an improved responsive design and faster site increased visitor engagement by 104%

Elie

This blog post recounts how moving this site to a fast joyful responsive design with a lot of images improved session duration by 104% and decreased bounce rate by 53%

62
article thumbnail

ICO Issues Twelve Step Guidance on Preparing for the EU General Data Protection Regulation

Hunton Privacy

On March 14, 2016, the UK Information Commissioner’s Office (“ICO”) published a guide, Preparing for the General Data Protection Regulation (GDPR) – 12 Steps to Take Now. The guide, which is a high-level checklist with accompanying commentary, sets out a number of points that should inform organizations’ data privacy and governance programs ahead of the anticipated mid-2018 entry into force of the GDPR.

GDPR 53
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

ICO releases 12 step guide on the GDPR

Privacy and Cybersecurity Law

On Monday this week the UK Information Commissioner’s Office released its first guidance on the General Data Protection Regulation (GDPR): […].

GDPR 52

More Trending

article thumbnail

What You Need to Know About the iMessage Security Flaw

Productivity Bytes

Apple has been in the news a lot lately, and most of the stories are about encryption. It’s currently in a battle with the FBI about adding a back door to its encryption software to allow law enforcement to access files on a locked iPhone, and now the software is coming under fire again. Researchers … + Read More. The post What You Need to Know About the iMessage Security Flaw appeared first on Productivity Bytes.

article thumbnail

New Posts…For All You RSS Readers

John Battelle's Searchblog

The post New Posts…For All You RSS Readers appeared first on John Battelle's Search Blog. I’ve been writing a lot at NewCo’s publication, and will continue to do so. But I want to make sure you folks know about that work, so here are links to a couple of new pieces. And The Award for the Best Marketing Execution At SXSW Goes To ….

article thumbnail

A (light hearted and) handy guide to privacy activists for the under 10s

Data Protector

Privacy activists in the olden days There weren’t many privacy activists in the olden days. This was because there was no Internet, and very few people had heard of the Data Protection Commissioner. As it was expensive to make a telephone call, and texts had not yet been invented, it was quite hard to spread rumours and exchange information with lots of people you didn’t know.

Privacy 120
article thumbnail

CIPL’s Bojana Bellamy Testifies on the EU-U.S. Privacy Shield to EU Parliament

Hunton Privacy

On March 17, 2016, Bojana Bellamy , President of the Centre for Information Policy Leadership (“CIPL”), participated on a panel of experts at a hearing in front of the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) about the new EU-U.S. Privacy Shield for commercial transfers of EU personal data to the U.S.

Privacy 49
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The new Polish Surveillance Act – back door for law enforcement

Privacy and Cybersecurity Law

While US mass surveillance is heavily debated across Europe, the new Polish government swiftly moved to adopt a new set […].

article thumbnail

The trend toward pay-as-you-drive insurance

CGI

The trend toward pay-as-you-drive insurance. Anonymous. Wed, 03/23/2016 - 08:26. Almost every insurance company is currently working on providing pay-as-you-drive insurance. Some already have succeeded in launching it, while others are busy preparing to go to market. Insurance based on driving behavior can be very attractive for both the insurer and the insured.

article thumbnail

Metaservices FTW!

John Battelle's Searchblog

The post Metaservices FTW! appeared first on John Battelle's Search Blog. Way back when — well, a few years back anyway— I wrote a series of posts around the idea of “ metaservices.” As I mused, I engaged in a bit of derision around the current state (at that point) of the mobile ecosystem, calling it “ chiclet-ized ” — silos of useful data without a true Internet between them.

IT 53
article thumbnail

HHS Launches Phase 2 of HIPAA Audits

Hunton Privacy

On March 21, 2016, the Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it has commenced Phase 2 of the HIPAA Audit Program. Phase 1 of the HIPAA Audit Program ran from 2011-2012 and produced several notable findings, including that two-thirds of covered entities had not performed a risk assessment as required by the HIPAA Security Rule.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Hunton Webinar on the EU General Data Protection Regulation

Hunton Privacy

On March 9, 2016, Hunton & Williams LLP hosted a webinar regarding the impact of the EU General Data Protection Regulation (“GDPR”) on global companies. Partner Aaron Simpson moderated the session, and speakers included partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto and partner Wim Nauwelaerts. Together, they explored the key components of the GDPR and discussed a roadmap toward compliance.

GDPR 45
article thumbnail

CIPL Launches Project at Amsterdam Workshop on EU General Data Protection Regulation Implementation

Hunton Privacy

On March 16, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP will co-host a one-day workshop in Amsterdam, Netherlands, together with the Dutch Ministry of Security and Justice, to kick off a new long-term CIPL project on the implementation of the EU General Data Protection Regulation (“GDPR”). Under the title “ Towards a Successful and Consistent Implementation of the GDPR ,” the workshop will focus on GDPR issues that require further interpretation and

GDPR 45
article thumbnail

Consumer Financial Protection Bureau Imposes First Ever Data Security Fine

Hunton Privacy

On March 2, 2016, the Consumer Financial Protection Bureau (“CFPB”) reached a settlement with Dwolla, Inc. (“Dwolla”), an online payment system company, to resolve claims that the company made false representations regarding its data security practices in violation of the Consumer Financial Protection Act. Among other things, the consent order imposes a $100,000 fine on Dwolla.

article thumbnail

HHS Releases Guidance on Health Apps and HIPAA Security Rule Crosswalk

Hunton Privacy

Recently, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) published two guidance documents related to HIPAA compliance. To help mobile app developers understand HIPAA compliance obligations, OCR published guidance on the use of mobile health apps (the “Health App Guidance”). OCR also released a crosswalk (the “Crosswalk”) that maps the National Institute of Standards and Technology (“NIST”) Framework for Improving Critical Infrastructure Cybersecurity Framework (

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to Safeguard Privacy and Data Security in Corporate Transactions

Hunton Privacy

Personal information about consumers is the lifeblood of many organizations. Because of the potential value of the information, companies are increasingly focused on privacy and data security issues that arise in the context of mergers, acquisitions, divestitures and related transactions. In many corporate transactions, data is a critical asset that should be addressed as a key deal point.

Privacy 45
article thumbnail

Hunton & Williams Receives Global Band 1 Ranking for Data Protection by Chambers

Hunton Privacy

Chambers & Partners ranked Hunton & Williams LLP’s Global Privacy and Cybersecurity practice in Band 1 in the recently released 2016 Global guide. The firm has been recognized by Chambers Global as a Band 1 firm, global-wide, for data protection for the past nine years. As noted by Chambers Global , the team is a “[t]op-ranked firm with notable strength negotiating with regulators and advising on compliance programmes.”.

Privacy 40
article thumbnail

NERC Report Highlights Lessons Learned from Ukraine Electric Utility Cyber Attack

Hunton Privacy

On March 18, 2016, a report was released by a joint team from the North American Electric Reliability Corporation’s Electricity Information Sharing Analysis Center and SANS Industrial Control Systems. According to the report, the cyber attack against a Ukrainian electric utility in December 2015 that caused 225,000 customers to lose power for several hours was based on months of undetected reconnaissance that gave the attackers a sophisticated understanding of the utility’s supervisory control a

Access 40
article thumbnail

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”). A public comment period on these drafts is now open.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

CNIL Launches Work on Compliance Pack Regarding Connected Vehicles

Hunton Privacy

On March 23, 2016, the Chairwoman of the French Data Protection Authority (“CNIL”) opened proceedings that will lead to the release of a compliance pack on connected vehicles. The CNIL announced that the compliance pack will contain guidelines regarding the responsible use of personal data for the next generation of vehicles. It will assist various stakeholders in the industry prepare for the General Data Protection Regulation.

article thumbnail

HHS Announces Settlements with Health Care System and Medical Research Institute over Potential HIPAA Violations

Hunton Privacy

On March 16, 2016, and March 17, 2016, respectively, the Department of Health and Human Services (“HHS”) announced resolution agreements with North Memorial Health Care of Minnesota (“North Memorial”) and The Feinstein Institute for Medical Research (“Feinstein Institute”) over potential violations of the HIPAA Privacy Rule. North Memorial. The HHS’s Office for Civil Rights (“OCR”) began an investigation of North Memorial, a non-profit health care system based in Minnesota, after North Memorial

article thumbnail

EU Council to Adopt Position at First Reading on the EU General Data Protection Regulation

Hunton Privacy

On March 17, 2016, the Council of the European Union (the “Council”) published a Draft Statement (the “Statement”) regarding the Council’s position at first reading with respect to the adoption of the EU General Data Protection Regulation (“GDPR”). The Statement follows a political agreement on the draft GDPR reached by the Council on February 12, 2016.

GDPR 40
article thumbnail

Hunton Releases Management Guide to the EU General Data Protection Regulation

Hunton Privacy

On March 9, 2016, Hunton & Williams’ Global Privacy and Cybersecurity practice lawyers released a management guide on the EU General Data Protection Regulation (“GDPR”), entitled “ Overview of the EU General Data Protection Regulation ,” addressing the key impacts the new law will have on businesses. This high-level management guide is intended to provide companies with a roadmap to the Regulation, focusing on topics such as expanded territorial scope, data breach notification rules, the One

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The Collaborative Economy – A constant through the ages

CGI

The Collaborative Economy – A constant through the ages. p.butler@cgi.com. Tue, 03/08/2016 - 18:00. The concept of the collaborative economy , also called sharing economy , peer economy and maker movement has been around for hundreds of years. Pre-industrial revolution, local communities used to collaborate and use each other's horses, ploughs and labour to bring in the harvest.

article thumbnail

Managing innovation to sustain growth and prosperity for local governments

CGI

Managing innovation to sustain growth and prosperity for local governments. Anonymous. Wed, 03/09/2016 - 00:42. Cities and regions that want to grow are embracing technology innovation. We see it all over the globe with local governments using newer technology to: Better understand citizen needs and build services around those needs. Increase connectivity between people, places and things.

article thumbnail

Internet of Things (IoT) – Living Happily Ever After?

CGI

Internet of Things (IoT) – Living Happily Ever After? p.butler@cgi.com. Thu, 03/03/2016 - 04:02. table. Part of the pleasure of watching familiar characters in a movie or on a TV show is the anticipation that we experience when we can guess the final outcome, but are intrigued as to how it will happen this time around. The happy ending for the star crossed lovers in a Disney film or the romantic twist in a Bond movie are examples of this genre of entertainment. .

IoT 40