Sat.Aug 05, 2017 - Fri.Aug 11, 2017

article thumbnail

Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem

PerezBox

The Managed WordPress ecosystem welcomes a new entrant – Automattic. Today they officially announced that WordPress.com Business now supports plugins and third-party themes. I am fascinated by the move because. Read More. The post Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem appeared first on PerezBox.

IT 78
article thumbnail

No. Social Terrorists Will Not Win

John Battelle's Searchblog

The post No. Social Terrorists Will Not Win appeared first on John Battelle's Search Blog. A small group of social terrorists have hijacked the rational discourse led by society’s most accomplished, intelligent, and promising organizations. (cross posted from NewCo Shift ). Let’s start with this: Google is not a perfect company. It’s easy to cast it as an omniscient and evil villain, the leader of a millennium-spanning illuminati hellbent on world subjugation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

First Enforcement Actions Brought Pursuant to China’s Cybersecurity Law

Hunton Privacy

In the wake of China’s Cybersecurity Law going into effect on June 1, 2017, local authorities in Shantou and Chongqing have brought enforcement actions against information technology companies for violations of the Cybersecurity Law. These are, reportedly, the first enforcement actions brought pursuant to the Cybersecurity Law. Recently, Chongqing’s municipal Public Security Bureau’s cybersecurity team identified a violation of the Cybersecurity Law during a routine inspection.

article thumbnail

One Way to Innovate

Getting Information Done

This was a guest blog post at Leaders Press On: I had dinner this summer with someone I respect as a thought leader and innovator. We had a great conversation and discussion about a new project I am working on to disrupt the traditional model for IT and Information Governance consulting. As we talked and bounced ideas off each other, an innovative creative synergy emerged that resulted in some new and novel ideas.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Open your archive – unlock the value: SAA Archives 2017

Preservica

I recently returned from the Society of American Archivists (SAA) annual members conference in Portland, Oregon. This year close to 2,000 attendees made this SAA’s largest west coast conference ever. Preservica regularly attends and sponsors this event, and it’s always great to reconnect with industry professionals, as well as our many customers & friends.

More Trending

article thumbnail

FTC Posts Fourth Blog in Its “Stick with Security” Series

Hunton Privacy

On August 11, 2017, the FTC published the fourth blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled Stick with Security: Require secure passwords and authentication , examines five effective security measures companies can take to safeguard their computer networks.

article thumbnail

GDPR – a framework to improve business

CGI

GDPR – a framework to improve business. ravi.kumarv@cgi.com. Wed, 08/09/2017 - 04:42. UK industry faces some significant challenges in the coming months and years. Apart from the obvious business environment challenges caused by Brexit, with the consequential loss of confidence and the weak pound, there are some very significant underlying challenges that are constraining growth.

GDPR 40
article thumbnail

German court: monitoring of employees by key logger is not allowed

Data Protection Report

The German federal labor court held in a recent decision ( Bundesarbeitsgericht , 27 July 2017 – case no. 2 AZR 681/16) that the use of evidence obtained through the use of key logger software is not permitted under current German privacy law, if there is no suspicion of a criminal offense. Such monitoring is only allowed when an employer has a concrete suspicion of a criminal offense by an employee or any other serious breach of duty in a specific case.

article thumbnail

No. Social Terrorists Will Not Win

John Battelle's Searchblog

A small group of social terrorists have hijacked the rational discourse led by society’s most accomplished, intelligent, and promising organizations. (cross posted from NewCo Shift ). Let’s start with this: Google is not a perfect company. It’s easy to cast it as an omniscient and evil villain, the leader of a millennium-spanning illuminati hellbent on world subjugation.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Nationwide Agrees to Pay $5.5 Million to Settle Multistate Data Breach Investigation

Hunton Privacy

On August 9, 2017, Nationwide Mutual Insurance Co. (“Nationwide”) agreed to a $5.5 million settlement with attorneys general from 32 states in connection with a 2012 data breach that exposed the personal information of over 1.2 million individuals. . The settlement comes on the heels of a multistate investigation into the circumstances surrounding the breach.

article thumbnail

Confetti Distribution Devices

Archives Blogs

Instead of featuring a dashing magician, this week we’re featuring a delightful celebratory page from a catalog of magic supplies. The 1898 Martinka & Co. catalog from which this page is taken is part of our John H. Percival Magic Collection. (The “German” mentioned in the descriptive text references an 18th or 19th century social dance accompanied by plays and games.).

22
article thumbnail

Comparing Media Vaulting to Cloud Storage

Archive Document Data Storage

A single data loss incident can have a devastating effect on your business. That’s why it’s important to have a secure and reliable backup solution. If you’re wondering whether to back up to the cloud or to store your data tapes in an offsite media vault, don’t worry. In this blog post, we help you decide which option offers the best data protection solution.

Cloud 40
article thumbnail

No. Social Terrorists Will Not Win

John Battelle's Searchblog

A small group of social terrorists have hijacked the rational discourse led by society’s most accomplished, intelligent, and promising organizations. (cross posted from NewCo Shift ). Let’s start with this: Google is not a perfect company. It’s easy to cast it as an omniscient and evil villain, the leader of a millennium-spanning illuminati hellbent on world subjugation.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK Government Releases Statement of Intent Regarding Data Protection Bill

Hunton Privacy

On August 7, 2017, the UK Government’s Department for Culture, Media and Sport published a Statement of Intent setting out the planned reforms to be included in the forthcoming Data Protection Bill, which we previously reported is expected to be laid before the UK Parliament in early September. The EU General Data Protection Regulation (“GDPR”) is set to become law in the UK on May 25, 2018, without the need for national implementing law.

article thumbnail

Call for Proposals: 2018 Creative Fellowship

Archives Blogs

It’s that time of year again: PPL is accepting proposals for our 2018 Creative Fellowship. This year, we’re looking for an artist working in the field of performance (theater, dance, performance art, puppetry, acrobatics, etc) to make new, research-based work related to the theme of our 2018 exhibition: hair! Details on the Creative Fellowship, requirements, and application guidelines can be found here.

IT 20
article thumbnail

D.C. Circuit’s Article III Standing Decision Deepens Appellate Disagreement

Hunton Privacy

On August 1, 2017, a unanimous three-judge panel for the D.C. Circuit reversed the dismissal of a putative data breach class action against health insurer CareFirst, Attias v. CareFirst, Inc. , No. 16-7108, slip op. (D.C. Cir. Aug. 1, 2017), finding the risk of future injury was not too speculative to establish injury in fact under Article III. . The litigation arose from a 2014 data breach involving various types of identifying data.

article thumbnail

Privacy and Data Security Risks in M&A Transactions: Video Series

Hunton Privacy

In a video roundtable series, Hunton & Williams LLP partners Lisa J. Sotto and Steven M. Haas and special counsel Allen C. Goolsby , along with Stroz Friedberg’s co-president Eric M. Friedberg and Lee Pacchia of Mimesis Law, discuss the special consideration that should be given to privacy and cybersecurity risks in corporate transactions. In M&A transactions, it is critical for parties to consider the risks and potential liabilities associated with inadequate privacy and cybersecurity p

Risk 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

On August 4, 2017, the FTC published the third blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled “ Stick with security: Control access to data sensibly ,” details key security measures businesses can take to limit unauthorized access to data in their possession.

IT 40
article thumbnail

My New Column – Please Sign Up!

John Battelle's Searchblog

Hi Searchblog readers. I know it’s been a while. But I’m writing a new column over at NewCo Shift, and instead of posting it verbatim here every other day (it comes out three times a week), I figured I’d let you know, and if you’d like to read it (my musings are pretty Searchbloggy, to be honest), you can get it right in your inbox by signing up for the NewCo Daily newsletter right here.

article thumbnail

Eleanor Roosevelt Salutes Helen Keller

Archives Blogs

It is 1955, and though she is seventy-four years old, Helen Keller, celebrity, author, and activist for the disabled, is about to embark on another journey, this one a staggering 40,000-mile tour of India, Pakistan, Burma, the Philippines and Japan. A banquet is held in her honor at which telegrams from President Eisenhower and other notables are read, speeches by the ambassadors to the countries she intends to visit are heard, and, finally, former First Lady Eleanor Roosevelt addresses the worl

article thumbnail

Flambeau at your fingertips

Archives Blogs

Front Page of the Flambeau following the 1994 Seminole football win at the Orange Bowl. It has been a long time coming to get to this point but I’m happy to announce that we have finally cataloged and completed the upload of the FSU newspaper, Florida Flambeau from 1915 to 1996. This was a massive undertaking for the Digital Library Center and we didn’t even do the scanning!

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.