July, 2014

article thumbnail

It’s Time For Twitter To Filter Our Feeds. But How?

John Battelle's Searchblog

'The post It’s Time For Twitter To Filter Our Feeds. But How? appeared first on John Battelle's Search Blog. ( image ). “We don’t put an algorithm between you and your feed,” – Twitter exec Adam Bain, March 2013. “Please do.” Me, today. Twitter has always appealed to tinkerers, to makers, to the people who first took up blogging, who championed RSS and HTML in the early days – you know, the people who created the open web.

article thumbnail

Isolating DB2 for z/OS Accounting Data at the WebSphere Application Level

Robert's Db2

Back in the 1990s, almost all of the DB2 for z/OS-accessing transactional applications I encountered were of the CICS variety. Often, a given DB2 subsystem served as the database manager for multiple CICS-based applications. In such cases, isolation of DB2 accounting information (i.e., database activity figures obtained from DB2 accounting trace records) at the application level was not difficult.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to find undervalued Hearthstone cards automatically

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Delaware Enacts New Data Destruction Law

Hunton Privacy

On July 1, 2014, Delaware Governor Jack Markell signed into law a bill that creates new safe destruction requirements for the disposal of business records containing consumer personal information. The new law requires commercial entities conducting business in Delaware to take reasonable steps to destroy their consumers’ “personal identifying information” prior to the disposal of electronic or paper records.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Are we about to see a step change in digital transformation?

CGI

Are we about to see a step change in digital transformation? p.butler@cgi.com. Tue, 07/22/2014 - 03:00. People have been talking about digital transformation to the enterprise front and back office for some time, especially where they are client or citizen facing. Some progress has been made, but you would not necessarily call it transformational on a large scale yet.

More Trending

article thumbnail

On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video

John Battelle's Searchblog

'The post On Media, Ro Khanna, the NSA, and the Future of the Internet: Bloomberg Video appeared first on John Battelle's Search Blog. I had a chance to go on Bloomberg today and co-host with Cory and Emily, which was fun. They asked me about my post on Monday , and I answered thusly: I also got to help interview David Medine, who chairs the privacy task force for the Obama Administration: And Ro Khanna, who is running for Congress in the heart of Silicon Valley: And lastly, I got to opine

Privacy 100
article thumbnail

DB2 for z/OS Buffer Pool Enlargement is NOT Just an Elapsed Time Thing

Robert's Db2

A couple of weeks ago, I got a question from a mainframe DB2 DBA about the impact of DB2 buffer pool enlargement on application and system performance. This individual had requested an increase in the size of a buffer pool on his system, and the system administration team had agreed to implement the change; however, one of the system administrators told the DBA that while the larger buffer pool would improve elapsed times for application processes accessing objects assigned to the pool, no CPU e

article thumbnail

How to appraise Hearthstone card values

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Nominate Hunton’s Privacy Blog for the ABA Blawg 100 Amici

Hunton Privacy

Once again, the American Bar Association Journal is compiling its annual list of the 100 best legal blogs , and readers are invited to nominate blawgs they “read regularly and think other lawyers should know about.” We would appreciate you showing your support by submitting a nomination for Hunton & Williams’ Privacy and Information Security Law Blog.

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

EU Data Protection Regulation: Update

Privacy and Cybersecurity Law

The EU Data Protection Regulation was discussed, yesterday, at the Privacy Laws & Business conference in Cambridge, UK. Here is […].

Privacy 40
article thumbnail

Digital Accountability and Transparency Act (DATA Act)

JKevinParker

On May 9, 2014, President Barack Obama signed the Digital Accountability and Transparency Act (DATA Act), Public Law No. 113-101, which had been passed unanimously by both the House of Representatives and the Senate. —Data Transparency Coalition ( [link] ). The above statement is great news for everyone in the United States who cares about efficiency and transparency in the federal government.

article thumbnail

NewCo Sizzle Reel, SF Sked Are Up!

John Battelle's Searchblog

'The post NewCo Sizzle Reel, SF Sked Are Up! appeared first on John Battelle's Search Blog. It’s hard to describe what it’s like to attend a NewCo till you’ve been to one, but this video, below, should certainly help. It comes right on the heels of NewCo’s SF schedule going up , which for those of you who’ve never been is like announcing the lineup at Bonnaroo for those of us in the NewCo world.

IT 96
article thumbnail

Content Marketing And the New Mainstream

John Battelle's Searchblog

'The post Content Marketing And the New Mainstream appeared first on John Battelle's Search Blog. ( image ) On the eve of our third annual P&G Signal (a private event I’ve produced for P&G these past few years) comes this piece in HBR : The Content Marketing Revolution. Just this morning I was reflecting on the speed with which the idea that “all brands are publishers” has moved from evangelical blog post to standard business practice – less than four years s

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Else 7.7.14: You’re Not A Target Till You Are

John Battelle's Searchblog

'The post Else 7.7.14: You’re Not A Target Till You Are appeared first on John Battelle's Search Blog. The past week brought fresh revelations about how the NSA targets US citizens, and new insights on the founders of Google, the history of technology, and ongoing stories from Facebook and the EU. To the links… In NSA-intercepted data, those not targeted far outnumber the foreigners who are – The Washington Post - This is a long-ish read, but please, if you read only one s

IT 74
article thumbnail

UK House of Lords Sub-Committee Criticizes the “Right to Be Forgotten”

Hunton Privacy

The EU Sub-Committee on Home Affairs, Health and Education of the UK House of Lords has published its Second Report for 2013-14, entitled EU Data Protection Law: A ‘Right to Be Forgotten’? (the “Report”). The Report summarizes the findings of the Sub-Committee’s investigation into the right to be forgotten, and was triggered in large part by the European Court of Justice’s (“ECJ’s”) decision in Google v.

article thumbnail

Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization

Hunton Privacy

On July 22, 2014, the Data Security Council of India (“DSCI”) announced that it has deemed Vodafone India Limited (“Vodafone”) a “DSCI Privacy Certified” organization. The certification, which is designed to help companies “demonstrate the privacy practices to relevant stakeholders and enhance trust,” is the first for a telecommunications company in India.

Privacy 40
article thumbnail

FTC Updates COPPA FAQs on Obtaining Verifiable Parental Consent

Hunton Privacy

On July 16, 2014, the Federal Trade Commission posted revisions to its Frequently Asked Questions that provide guidance on complying with the Children’s Online Privacy Protection Rule (the “COPPA Rule”). The revisions, which are in Section H of the FAQs, address the COPPA Rule requirement that operators of certain websites and online services obtain a parent’s consent before collecting personal information online from a child under the age of 13.

Privacy 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

New Cybersecurity Center to Be Established in Belgium

Hunton Privacy

On July 17, 2014, the Belgian government announced that it has finalized its Royal Decree on the establishment of a Cybersecurity Center ( Centrum Cyber Security België or Centre Cyber Security Belgique ). The Cybersecurity Center’s tasks would be to monitor the country’s cybersecurity and manage cyber incidents. It also would oversee various cybersecurity projects, formulate legislative proposals relating to cybersecurity, and issue standards and guidelines for securing public sector IT systems

article thumbnail

UK ICO Releases Its Annual Report for 2013/2014

Hunton Privacy

On July 15, 2014, the UK Information Commissioner’s Office (“ICO”) released its Annual Report for 2013/14 (the “Report”). Entitled Effective, Efficient – and Busier than Ever, the Report illustrates the rapid growth of data protection and freedom of information issues in the UK in the past year. It highlights the fact that the ICO has received increasing numbers of questions and complaints from members of the public, processed record numbers of cases, and issued its highest ever level of f

IT 40
article thumbnail

UK Government Announces Emergency Data Retention Law

Hunton Privacy

On July 10, 2014, the UK government announced plans to introduce emergency data retention rules, publishing the Data Retention and Investigatory Powers Bill (the “Bill”) along with explanatory notes and draft regulations. The publication of the Bill follows the European Court of Justice’s April 2014 declaration that the EU Data Retention Directive (the “Directive”) is invalid.

article thumbnail

French Data Protection Authority Announces Cookie Law Compliance Inspections to Begin in October

Hunton Privacy

On July 11, 2014, the French Data Protection Authority (the “CNIL”) announced that, starting in October 2014, it will conduct on-site and remote inspections to verify whether companies are complying with its new guidance on the use of cookies and other technologies. These inspections will take place in connection with the European “cookies sweep day” initiative, which will be launched from September 15 – 19, 2014.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

FTC Files Complaint Against Amazon.com for Unauthorized In-App Charges in Kids’ Apps

Hunton Privacy

On July 10, 2014, the Federal Trade Commission announced that it filed a complaint against Amazon.com, Inc. (“Amazon”) for failing to obtain the consent of parents or other account holders prior to billing them for in-app charges incurred by children. According to the complaint, Amazon, which offers children’s apps through its Appstore, bills Amazon account holders in real money for virtual items that children obtain within an app ( i.e. , “in-app” charges).

article thumbnail

Florida Amends Breach Notification Law to Cover Health Data, Tighten Notice Deadline and Require State Regulator Notification

Hunton Privacy

On June 20, 2014, Florida Governor Rick Scott signed a bill into law that repeals and replaces the state’s existing breach notification statute with a similar law entitled the Florida Information Protection Act (Section 501.171 of the Florida Statutes) (the “Act”). Below is a summary of several key changes the Act makes to the previous breach notification statute: The Act revises the definition of “breach of security” to cover “unauthorized access” of electronic data containing personal informat

article thumbnail

Hunton Introduces Report on the Importance of Cross-Border Data Transfers to Global Prosperity in Europe

Hunton Privacy

Hunton & Williams, in collaboration with the U.S. Chamber of Commerce, recently issued Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , a report which highlights the benefits of cross-border data transfers to businesses in the international marketplace. The report underscores the importance of developing data transfer mechanisms that protect privacy and facilitate the free-flow of data, and also explores opportunities for new data transfer regime

Privacy 40
article thumbnail

Russian Parliament Adopts Internet Privacy Bill Requiring Data Localization

Hunton Privacy

Last week, the Russian Parliament adopted a bill amending portions of Russia’s existing legislation on privacy, information technology and data protection. Among other provisions, the law would create a “data localization” obligation for companies engaged in the transmission or recording of electronic communications over the Internet. Such companies would be required to store copies of the data for a minimum of six months in databases that must be located within the Russian Federation.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

PCLOB Report Concludes NSA’s Non-U.S. Surveillance Program Is Lawful

Hunton Privacy

On July 2, 2014, the Privacy and Civil Liberties Oversight Board (“PCLOB”) held a public meeting to finalize the release of a report concluding that the National Security Agency’s (“NSA’s”) collection of electronic communications from targets reasonably believed to be non-U.S. persons located outside the United States has operated lawfully within its statutory limitations.

article thumbnail

Rethinking Records Management with SharePoint: An AIIM Webinar

JKevinParker

On May 28, 2014, I had the privilege of being the featured speaker for an AIIM webinar called "Rethinking Records Management with SharePoint". The webinar was sponsored by Microsoft, who shared their own story of records management success with SharePoint, demonstrating that they practice what they preach. As the featured speaker, I was the independent voice from the industry and spoke on the features of SharePoint that are best for electronic records management.

article thumbnail

European Commission Issues Cloud Service Level Agreement Standardization Guidelines

Hunton Privacy

On June 26, 2014, the European Commission issued guidelines on the standardization of service level agreements for cloud services providers (the “Guidelines”). In the context of the European Cloud Computing Strategy , launched by the European Commission in September 2012, the Guidelines focus on security and data protection in the cloud. They are based on the understanding that standardization will improve the clarity of service level agreements (“SLAs”) for cloud services in the European Union.

Cloud 40