Remove tag opinion
article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

Finally, users must be allowed to delete their individual tagging. those that impact public opinion) must be registered with the relevant authority (the CAC) and a security assessment will need to be undertaken. Use of certain specified algorithms (e.g.

article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

Part-of-speech (POS) tagging: POS tagging facilitates semantic analysis by assigning grammatical tags to words (e.g., Some common techniques include the following: Sentiment analysis : Sentiment analysis categorizes data based on the nature of the opinions expressed in social media content (e.g.,

Mining 56
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NY Appeals Court Extends Discoverability of Social Media Photos to “Tagged” Photos: eDiscovery Case Law

eDiscovery Daily

It’s rare that we can include the entire case opinion in our blog post, but, in perhaps the shortest case ruling we’ve ever covered, here is that case opinion. He was “tagged,” thus allowing him access to them, and others were sent to his phone. Case opinion link courtesy of eDiscovery Assistant. So, what do you think?

Mining 44
article thumbnail

China finalises its Generative AI Regulation

Data Protection Report

the CAC) commence supervisory checks on the generative AI service, co-operate with them, explain the source, size and types of the training data, tagging rules and the mechanisms and principles of the algorithm and provide necessary technology and data, etc., for support and assistance. for support and assistance.

article thumbnail

This is the old ChiefTech blog.: Brad's talks about his presentation on tagging and the enterprise

ChiefTech

Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Thursday, 14 February 2008 Brad's talks about his presentation on tagging and the enterprise Brad Hinton has written a series of posts about his Tagging and the Enterprise at a conference last week.

Paper 40
article thumbnail

Subresource Integrity and Upgrade-Insecure-Requests are Now Supported in Microsoft Edge

Troy Hunt

Edge now joins the other major browsers in rejecting any script which doesn't hash down to the value specified in the integrity tag. And before anyone starts, no, I don't work for Microsoft but I do have strong opinions I voice to them on a regular basis!

IT 49
article thumbnail

This is the old ChiefTech blog.: All Systems Go!

ChiefTech

Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Ill tag this post with "stupid") Ive just renewed it, but it may take a bit of time to come online again. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. I know, I know!

Paper 40