September, 2015

article thumbnail

It’s Time to Flip the Bit on Publishing and Data

John Battelle's Searchblog

The post It’s Time to Flip the Bit on Publishing and Data appeared first on John Battelle's Search Blog. ( image BI ). My god, do we like to talk about ourselves. That’s my takeaway from the recent algae-bloom of writing around ad blocking and fraud lately – most of it tinged with apocalyptic implications for the future of independent publishing.

Mining 104
article thumbnail

Advocate General of the European Court of Justice Issues Opinion Regarding Safe Harbor

Hunton Privacy

On September 23, 2015, Advocate General of the European Court of Justice Yves Bot issued his Opinion in the case of Max Schrems , which is currently pending before the Court of Justice of the European Union (the “CJEU”). In the opinion, the Advocate General provided his views concerning two key issues related to the U.S.-EU Safe Harbor Framework: (1) the powers of national data protection authorities to investigate and suspend international data transfers made under the Safe Harbor Framework and

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Oft-Overlooked DB2 for z/OS Big Memory Exploitation Play

Robert's Db2

Over the past few years, I've done a lot of writing and presenting and talking about ways in which large-scale z Systems memory resources (which I refer to as Big Memory) can be leveraged so as to enhance the performance of DB2 for z/OS subsystems and related applications. While I very much like to see z/OS LPARs with memory sizes of 100 GB or more, I DON'T like to see situations in which organizations stop well short of exploiting Big Memory to maximum positive effect with regard to DB2 perform

IT 48
article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Insurer Hosted Pricing – getting (and staying) ahead of the curve

CGI

Insurer Hosted Pricing – getting (and staying) ahead of the curve. p.butler@cgi.com. Thu, 10/01/2015 - 01:51. The pace of business and the pressure of market change are substantial challenges for insurers. The need to be responsive and provide fast pricing is critical. In an era when other industries such as travel , have platforms that enable them to provide pricing information within seconds, customers now expect immediate responses.

More Trending

article thumbnail

Do It Right. Not Fast. Right.

John Battelle's Searchblog

The post Do It Right. Not Fast. Right. appeared first on John Battelle's Search Blog. (Cross posted to LI and Medium. Cuz that’s how we roll these days). If you’ve never blown it big time using email — you will. I have several times — in fact, I just did it earlier this evening. And gaaaah!, I wish technology had an answer for the clear and present danger that is myself, rushing through an afternoon, trying to GSD and hit inbox zero.

IT 90
article thumbnail

German Data Protection Commissioners Issue Position Paper on Proposed EU General Data Protection Regulation

Hunton Privacy

On August 14 and August 26, 2015, the Conference of the Data Protection Commissioners of the Federal Government and the Federal States ( Länder ) issued a detailed position paper (“Position Paper”) and a press release on the main issues for the trilogue negotiations on the proposed EU General Data Protection Regulation (the “Regulation”). In the Position Paper and press release, the participating German Data Protection Commissioners (“German DPAs”) request the trilogue partners to focus on the f

Paper 61
article thumbnail

I Don't Worry About DB2 for z/OS Buffer Pool Hit Ratios

Robert's Db2

And neither should you. It's true that for years, mine was among a chorus of DB2 specialists' voices that placed a lot of emphasis on monitoring DB2 buffer pool hit ratios (there are variations with respect to calculating this ratio, but the basic formula is (GETPAGEs - synchronous reads) / GETPAGEs). Some years ago, it dawned on me (and on others -- and for some folks earlier than for me) that I'd been focusing on the wrong buffer pool performance metric.

Mining 48
article thumbnail

Russia’s new data law

Privacy and Cybersecurity Law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their […].

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The importance of STEM and Digital Skills

CGI

The importance of STEM and Digital Skills. shobana.lv@cgi.com. Wed, 09/30/2015 - 04:53. I was fortunate enough to address a terrific audience of senior civil servants recently at Civil Service Live, Edinburgh. The conference provided some real food for thought and I wanted to share the points I raised during my talk which focused on the critical issue of STEM skills in Scotland.

article thumbnail

Information Sharing is the Grease in Workplace Collaboration

Attensa

We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.

IT 40
article thumbnail

Where I’ll Be During NewCo SF & Oakland Next Month

John Battelle's Searchblog

The post Where I’ll Be During NewCo SF & Oakland Next Month appeared first on John Battelle's Search Blog. (cross posted from the NewCo blog ). NewCo’s San Francisco & Oakland festivals are less than a month away, and they will be our largest, most diverse events ever. More than 225 Bay area companies will be opening their doors to 3,000+ attendees.

article thumbnail

Blockchain, Cybersecurity and Global Finance

Hunton Privacy

When novelist William Gibson said, “[t]he future is already here, it’s just not very evenly distributed,” he may have had innovation like blockchain technology in mind. In the near future, blockchain may become the new architecture of a reinvented global financial services infrastructure. The technology – a distributed, consensus-driven ledger that enables and records encrypted digital asset transfers without the need of a confirming third party – is revolutionary to global financial services, w

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

By: Ray Ban Sunglasses

Cybrary

Ray Ban Sunglasses. Ray-Ban is the global leader in premium eyewear market and by far the best-selling eyewear brand in the world£¡.

article thumbnail

Schrems v. Irish Data Protection Commissioner: some further thoughts

Privacy and Cybersecurity Law

As the dust begins to settle after the headline-grabbing Advocate General opinion in the Schrems v. Irish Data Protection Commissioner […].

40
article thumbnail

Better sharing of data among government agencies is vital if we want to protect our most vulnerable citizens

CGI

Better sharing of data among government agencies is vital if we want to protect our most vulnerable citizens. p.butler@cgi.com. Tue, 09/22/2015 - 03:10. The UK government is already beginning to embrace using information to help citizens, and is in the process of shifting its agenda from “resolution” to “prevention”. Rather than fix problems as they arise, the idea is to identify issues that cause harm to vulnerable children and adults and to stop them from happening.

article thumbnail

CJEU Announces Date for Judgment on Safe Harbor

Hunton Privacy

On September 29, 2015, the Court of Justice of the European Union (“CJEU”) announced that it will deliver its judgment in the Schrems vs. Facebook case on October 6, 2015. The CJEU’s judgment will be the final ruling in the case, and comes after the Advocate General’s Opinion regarding Safe Harbor earlier this week. Typically, the CJEU delivers its ruling approximately three to six months after publication of the Advocate General’s opinion.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CNIL Publishes Internet Sweep Results and New Guidelines for Websites Aimed at Children

Hunton Privacy

On September 2, 2015, the French Data Protection Authority (“CNIL”) published the results of an Internet sweep of 54 websites visited by children and teenagers. The sweep was conducted in May 2015 to assess whether websites that are directed toward, frequently used by or popular among children comply with French data protection law. As we previously reported , the sweep was coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection author

article thumbnail

Target Data Breach Litigation: District Court Certifies Class of Financial Institutions

Hunton Privacy

On September 15, 2015, Judge Magnuson of the U.S. District Court for the District of Minnesota certified a Federal Rule of Civil Procedure 23(b)(3) class of financial services institutions claiming damages from Target Corporation’s 2013 data breach. The class consists of “all entities in the United States and its Territories that issued payment cards compromised in the payment card data breach that was publicly disclosed by Target on December 19, 2013.”.

article thumbnail

SEC Issues Top Cybersecurity Priorities for Broker-Dealers and Investment Advisers

Hunton Privacy

On September 15, 2015, the Office of Compliance, Inspections and Examinations (“OCIE”) at the U.S. Securities and Exchange Commission (“SEC”) issued a Risk Alert outlining its latest cybersecurity examination priorities for SEC-registered broker-dealers and investment advisers. In addition to what we have previously reported , this Risk Alert is the latest in a series of announcements on cybersecurity from OCIE.

article thumbnail

German DPA Fines Data Controller for Inadequate Data Processing Agreement

Hunton Privacy

On August 20, 2015, the Bavarian Data Protection Authority (“DPA”) issued a press release stating that it imposed a significant fine on a data controller for failing to adequately specify the security controls protecting personal data in a data processing agreement with a data processor. The DPA stated in the press release that the data processing agreement did not contain sufficient information regarding the technical and organizational measures to protect the personal data.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Seventh Circuit Denies En Banc Review For Data Breach Class Action

Hunton Privacy

On September 17, 2015, the Seventh Circuit rejected Neiman Marcus’ petition for a rehearing en banc of Remijas v. Neiman Marcus Group, LLC, No. 14-3122. In Remijas , a Seventh Circuit panel found that members of a putative class alleged sufficient facts to establish standing to sue Neiman Marcus following a 2013 data breach that resulted in hackers gaining access to customers’ credit and debit card information.

article thumbnail

SEC Announces Settlement Order and Publishes Investor Alert

Hunton Privacy

On September 22, 2015, the Securities and Exchange Commission (“SEC”) announced a settlement order (the “Order”) with an investment adviser for failing to establish cybersecurity policies and procedures, and published an investor alert (the “Alert”) entitled Identity Theft, Data Breaches, and Your Investment Accounts. The Order with R.T. Jones Capital Equities Management, Inc.

article thumbnail

U.S.-EU Data Transfer Agreement for Law Enforcement Nearing Completion

Hunton Privacy

On September 8, 2015, representatives from the U.S. Government and the European Commission initialed a draft agreement known as the Protection of Personal Information Relating to the Prevention, Investigation, Detection and Prosecution of Criminal Offenses (the “Umbrella Agreement”). The European Commission’s stated aim for the Umbrella Agreement is to put in place “a comprehensive high-level data protection framework for EU-U.S. law enforcement cooperation.

article thumbnail

Changes to Policy Responsibility for the UK ICO

Hunton Privacy

On September 17, 2015, Prime Minister David Cameron issued a Written Ministerial Statement , announcing that policy responsibility for data protection issues and the UK Information Commissioner’s Office (the “ICO”) will both be transferred from the Ministry of Justice (the “MoJ”) to the Department for Culture, Media & Sport , (the “DCMS”) with the changes taking effect on the same date.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

ICO to Investigate Data Sharing for Marketing by UK Charities

Hunton Privacy

On September 2, 2015, the Information Commissioner’s Office (the “ICO”) announced an investigation into the data sharing practices of charities in the United Kingdom. The announcement follows the publication of an article in a UK newspaper highlighting the plight of Samuel Rae, an elderly man suffering from dementia. In 1994, Rae completed a survey, which resulted in a charity collecting his personal data.

article thumbnail

Best practices for building strong mobile biometric authentication

CGI

Best practices for building strong mobile biometric authentication. ravi.kumarv@cgi.com. Wed, 09/09/2015 - 21:21. Strong authentication of mobile users is an increasingly important issue for enterprises and commercial entities. While it is likely impossible to have perfect authentication security, taking care while engineering an authentication scheme can result in lowering risk to an acceptable level.

article thumbnail

IoT – It’s all about data insights

CGI

IoT – It’s all about data insights. narmada.devarajan. Thu, 09/10/2015 - 02:03. The Internet of Things (IoT) is set to generate vast amounts of new data, with some predictions citing that over 100 billion “things” will send out data over the Internet by 2020. Without new analysis methods, this sheer volume at best risks the value of data being lost and, at worst, may overwhelm a business completely.

IoT 40