This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The post It’s Time to Flip the Bit on Publishing and Data appeared first on John Battelle's Search Blog. ( image BI ). My god, do we like to talk about ourselves. That’s my takeaway from the recent algae-bloom of writing around ad blocking and fraud lately – most of it tinged with apocalyptic implications for the future of independent publishing.
On September 23, 2015, Advocate General of the European Court of Justice Yves Bot issued his Opinion in the case of Max Schrems , which is currently pending before the Court of Justice of the European Union (the “CJEU”). In the opinion, the Advocate General provided his views concerning two key issues related to the U.S.-EU Safe Harbor Framework: (1) the powers of national data protection authorities to investigate and suspend international data transfers made under the Safe Harbor Framework and
George Despres. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.
Over the past few years, I've done a lot of writing and presenting and talking about ways in which large-scale z Systems memory resources (which I refer to as Big Memory) can be leveraged so as to enhance the performance of DB2 for z/OS subsystems and related applications. While I very much like to see z/OS LPARs with memory sizes of 100 GB or more, I DON'T like to see situations in which organizations stop well short of exploiting Big Memory to maximum positive effect with regard to DB2 perform
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
The importance of STEM and Digital Skills. shobana.lv@cgi.com. Wed, 09/30/2015 - 04:53. I was fortunate enough to address a terrific audience of senior civil servants recently at Civil Service Live, Edinburgh. The conference provided some real food for thought and I wanted to share the points I raised during my talk which focused on the critical issue of STEM skills in Scotland.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
The importance of STEM and Digital Skills. shobana.lv@cgi.com. Wed, 09/30/2015 - 04:53. I was fortunate enough to address a terrific audience of senior civil servants recently at Civil Service Live, Edinburgh. The conference provided some real food for thought and I wanted to share the points I raised during my talk which focused on the critical issue of STEM skills in Scotland.
The post Do It Right. Not Fast. Right. appeared first on John Battelle's Search Blog. (Cross posted to LI and Medium. Cuz that’s how we roll these days). If you’ve never blown it big time using email — you will. I have several times — in fact, I just did it earlier this evening. And gaaaah!, I wish technology had an answer for the clear and present danger that is myself, rushing through an afternoon, trying to GSD and hit inbox zero.
On August 14 and August 26, 2015, the Conference of the Data Protection Commissioners of the Federal Government and the Federal States ( Länder ) issued a detailed position paper (“Position Paper”) and a press release on the main issues for the trilogue negotiations on the proposed EU General Data Protection Regulation (the “Regulation”). In the Position Paper and press release, the participating German Data Protection Commissioners (“German DPAs”) request the trilogue partners to focus on the f
Dale Moore is a UK-based content specialist and contributing author at Jinfo. Jinfo research is at the heart of the business information industry. Every day they work with information pros who are reimagining information services. Their focus is on aligning information services with corporate strategy and initiatives. The following is a summary of Dale’s comprehensive review of Attensa. “The ethos behind the Attensa platform, as a knowledge management and current awareness tool, is n
And neither should you. It's true that for years, mine was among a chorus of DB2 specialists' voices that placed a lot of emphasis on monitoring DB2 buffer pool hit ratios (there are variations with respect to calculating this ratio, but the basic formula is (GETPAGEs - synchronous reads) / GETPAGEs). Some years ago, it dawned on me (and on others -- and for some folks earlier than for me) that I'd been focusing on the wrong buffer pool performance metric.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Insurer Hosted Pricing – getting (and staying) ahead of the curve. p.butler@cgi.com. Thu, 10/01/2015 - 01:51. The pace of business and the pressure of market change are substantial challenges for insurers. The need to be responsive and provide fast pricing is critical. In an era when other industries such as travel , have platforms that enable them to provide pricing information within seconds, customers now expect immediate responses.
The post Where I’ll Be During NewCo SF & Oakland Next Month appeared first on John Battelle's Search Blog. (cross posted from the NewCo blog ). NewCo’s San Francisco & Oakland festivals are less than a month away, and they will be our largest, most diverse events ever. More than 225 Bay area companies will be opening their doors to 3,000+ attendees.
When novelist William Gibson said, “[t]he future is already here, it’s just not very evenly distributed,” he may have had innovation like blockchain technology in mind. In the near future, blockchain may become the new architecture of a reinvented global financial services infrastructure. The technology – a distributed, consensus-driven ledger that enables and records encrypted digital asset transfers without the need of a confirming third party – is revolutionary to global financial services, w
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.
Better sharing of data among government agencies is vital if we want to protect our most vulnerable citizens. p.butler@cgi.com. Tue, 09/22/2015 - 03:10. The UK government is already beginning to embrace using information to help citizens, and is in the process of shifting its agenda from “resolution” to “prevention”. Rather than fix problems as they arise, the idea is to identify issues that cause harm to vulnerable children and adults and to stop them from happening.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The post The Myth of Valley DoucheBaggery appeared first on John Battelle's Search Blog. (Warning, loads of unabashed cursing ahead). Everyone’s definition of what makes a person or a company “douchey” varies, but we all know ’em when we see them. Douchebag behavior is kind of like the Supreme Court definition of pornography : You know it when you see it.
On September 29, 2015, the Court of Justice of the European Union (“CJEU”) announced that it will deliver its judgment in the Schrems vs. Facebook case on October 6, 2015. The CJEU’s judgment will be the final ruling in the case, and comes after the Advocate General’s Opinion regarding Safe Harbor earlier this week. Typically, the CJEU delivers its ruling approximately three to six months after publication of the Advocate General’s opinion.
On September 2, 2015, the French Data Protection Authority (“CNIL”) published the results of an Internet sweep of 54 websites visited by children and teenagers. The sweep was conducted in May 2015 to assess whether websites that are directed toward, frequently used by or popular among children comply with French data protection law. As we previously reported , the sweep was coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection author
On September 15, 2015, Judge Magnuson of the U.S. District Court for the District of Minnesota certified a Federal Rule of Civil Procedure 23(b)(3) class of financial services institutions claiming damages from Target Corporation’s 2013 data breach. The class consists of “all entities in the United States and its Territories that issued payment cards compromised in the payment card data breach that was publicly disclosed by Target on December 19, 2013.”.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On September 15, 2015, the Office of Compliance, Inspections and Examinations (“OCIE”) at the U.S. Securities and Exchange Commission (“SEC”) issued a Risk Alert outlining its latest cybersecurity examination priorities for SEC-registered broker-dealers and investment advisers. In addition to what we have previously reported , this Risk Alert is the latest in a series of announcements on cybersecurity from OCIE.
On August 20, 2015, the Bavarian Data Protection Authority (“DPA”) issued a press release stating that it imposed a significant fine on a data controller for failing to adequately specify the security controls protecting personal data in a data processing agreement with a data processor. The DPA stated in the press release that the data processing agreement did not contain sufficient information regarding the technical and organizational measures to protect the personal data.
On September 17, 2015, the Seventh Circuit rejected Neiman Marcus’ petition for a rehearing en banc of Remijas v. Neiman Marcus Group, LLC, No. 14-3122. In Remijas , a Seventh Circuit panel found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach that resulted in hackers gaining access to customers’ credit and debit card information.
On September 22, 2015, the Securities and Exchange Commission (“SEC”) announced a settlement order (the “Order”) with an investment adviser for failing to establish cybersecurity policies and procedures, and published an investor alert (the “Alert”) entitled Identity Theft, Data Breaches, and Your Investment Accounts. The Order with R.T. Jones Capital Equities Management, Inc.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On September 8, 2015, representatives from the U.S. Government and the European Commission initialed a draft agreement known as the Protection of Personal Information Relating to the Prevention, Investigation, Detection and Prosecution of Criminal Offenses (the “Umbrella Agreement”). The European Commission’s stated aim for the Umbrella Agreement is to put in place “a comprehensive high-level data protection framework for EU-U.S. law enforcement cooperation.
On September 17, 2015, Prime Minister David Cameron issued a Written Ministerial Statement , announcing that policy responsibility for data protection issues and the UK Information Commissioner’s Office (the “ICO”) will both be transferred from the Ministry of Justice (the “MoJ”) to the Department for Culture, Media & Sport , (the “DCMS”) with the changes taking effect on the same date.
On September 2, 2015, the Information Commissioner’s Office (the “ICO”) announced an investigation into the data sharing practices of charities in the United Kingdom. The announcement follows the publication of an article in a UK newspaper highlighting the plight of Samuel Rae, an elderly man suffering from dementia. In 1994, Rae completed a survey, which resulted in a charity collecting his personal data.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content