article thumbnail

Business strategy examples

IBM Big Data Hub

It’s also essential to understand an organization’s market position, as the following business strategy examples will show. Some examples of business strategies that embody these foundational theories are explored below. The initiative was accompanied by a social media campaign to bolster the brand’s reach.

article thumbnail

Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech…

John Battelle's Searchblog

The post Predictions 2015: Uber, Google, Apple, Beacons, Health, Nest, China, Adtech… appeared first on John Battelle's Search Blog. Last year, for example, I predicted that 2014 would be the year that the Internet would “adopt the planet as its cause.” So what might happen in 2015?

Marketing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My Schedule For NewCo New York 2015

John Battelle's Searchblog

The post My Schedule For NewCo New York 2015 appeared first on John Battelle's Search Blog. Look at Coachella , for example. So here are my picks for NewCo NYC 2015: Day 1: Tuesday, May 12, 2015. Day 2: Wednesday, May 13, 2015. Day 2: Thursday, May 14 th , 2015. There are six stages to chose from.

article thumbnail

From iPhone to NT AUTHORITYSYSTEM – exploit ‘Printconfig’ dll with a real-world example

Security Affairs

From iPhone to NT AUTHORITYSYSTEM – As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. But what does Apple’s iPhone have to do with it?? Well, keep on reading… ( sorry no ).

article thumbnail

Deadline for Compliance with Russian Localization Law Set for September 1, 2015

Hunton Privacy

On December 31, 2014, Russian President Vladimir Putin signed legislation to move the deadline for compliance to September 1, 2015, for Federal Law No. The compliance deadline was then moved to January 1, 2015, before being changed to September 1, 2015 in the legislation signed by President Putin.

article thumbnail

Federal Privacy Commissioner Published Guidance on What Is “Sensitive” Personal Information

Data Protection Report

For example, basic contact details may appear relatively innocuous. For example, in the case of a technology company, customer phone numbers, email addresses, device type and a history of tech support interactions may be used by fraudsters in pursuit of tech support scams to deceive individuals. Health Information. Reputational Harm.

Privacy 125
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Back in 2015, a security researcher decided to make that very point when he claimed to have hacked a plane , accessed the thrust system, and made it fly higher than intended. For example, as noted previously there’s the ED-202A guidelines in Europe and DO-326A in the U.S., That doesn’t mean there aren’t cyberthreats out there.

Risk 239