August, 2014

article thumbnail

“Facebook Is a Weatherless World”

John Battelle's Searchblog

'The post “Facebook Is a Weatherless World” appeared first on John Battelle's Search Blog. ( image ). This quote, from a piece in Motherboard , hit me straight between the eyeballs: Facebook…will not let you unFacebook Facebook. It is impossible to discover something in its feeds that isn’t algorithmically tailored to your eyeball.

IT 111
article thumbnail

Nanu Nanu to Robin Williams, Bill Griffin, & Ashley Taylor too.

Daradiction

'Hearing the news about Robin Wililams' death this past week hit me like a dump truck. It felt like losing a family member. I grew up watching "Mork & Mindy" and remember as a kid being so amused by his "nanu nanu's", and inspired by other characters that he played over the years like Good Morning Vietnam, Dead Poet's Society, and Good Will Hunting.

IT 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 10 for z/OS, 1 MB Page Frames, and the Number 6656

Robert's Db2

I recently received an interesting message from a mainframe DB2 person I've known for a long time. At his DB2 10 for z/OS site, 1 MB page frames had recently been made available on the System z servers, and my friend moved to leverage this resource via page-fixed DB2 buffer pools. Nothing unusual there. What's interesting is the information he saw in the output of -DISPLAY BUFFERPOOL commands subsequently entered for the page-fixed pools.

IT 48
article thumbnail

Predicting a Hearthstone opponent’s deck using machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hand-held Motorola CP200 Radios vs. Cellphones Identified as Key to Safety & Reliable DR/Continuity of Operations, for Industry and Government

Interactive Information Management

News reports and incidents regarding issues with reliance on cellphones for event, incident or other monitoring and operations activities requiring mobile communications continues to surface. In this context, those responsible for finding, purchasing and using critical hand-held communications devices are maintaining their use of advanced hand-held radios - including the extremely popular and durable Motorola CP200 handheld radio. ( This is a noteworthy industry perspective, from a KME client pa

More Trending

article thumbnail

My 2014 NewCo SF Schedule: Hard Choices

John Battelle's Searchblog

'The post My 2014 NewCo SF Schedule: Hard Choices appeared first on John Battelle's Search Blog. As I did last year, I picked my NewCo San Francisco schedule early, so I could prepare in advance of the festival this September 10-12. There are nearly 130 extraordinary companies to choose from, so it’s not easy to decide where to spend your time.

Marketing 111
article thumbnail

Why I’m Watching Deep Linking In Mobile

John Battelle's Searchblog

'The post Why I’m Watching Deep Linking In Mobile appeared first on John Battelle's Search Blog. The first ever web page, created by Sir Tim Berners Lee to explain, naturally, the WWW. We are at a turning point in the mobile app ecosystem where deeplinking is becoming a priority and not just a feature. – URX blog. This week marks the beginning of a journey I’m taking to understand “deep linking” in mobile.

Marketing 110
article thumbnail

AdTech Is Alive and Well: I’ll Have the Full Stack, Please

John Battelle's Searchblog

'The post AdTech Is Alive and Well: I’ll Have the Full Stack, Please appeared first on John Battelle's Search Blog. Reading The Information’s piece on Facebook’s reported re-introduction of the Atlas ad-serving technology , I wondered – Does the market really need six or more full stack adtech solutions? Google is the undisputed leader in the field – it’s spent nearly ten years stitching its own technology into acquisitions like DoubleClick (the original

Analytics 102
article thumbnail

NewCo New York 2014: My Chairman’s Picks To Visit

John Battelle's Searchblog

'The post NewCo New York 2014: My Chairman’s Picks To Visit appeared first on John Battelle's Search Blog. Last week I created my schedule for NewCo San Francisco, and wrote about them here. What many folks don’t know is that there are now nine confirmed NewCo festivals around the world. Three weeks after San Francsico, nearly 100 New York companies will be opening their doors and welcoming festival goers in our second annual NewCo New York, Sept. 30th-Oct. 2nd.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DB2 for z/OS: Can a Pooled DBAT Hold Locks?

Robert's Db2

The answer to the question in the title of this post is, "No, it can't -- unless it can." How's that for a hook? OK, a little background. A DBAT is a database access thread. It's the kind of thread that a network-attached application process uses to interact with a DB2 for z/OS system (such a process, also referred to as a DRDA requester, issues SQL statements that get to DB2 by way of the distributed data facility, aka DDF).

IT 48
article thumbnail

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

California Lawmakers Pass Bill to Amend State’s Breach Notification Law

Hunton Privacy

On August 19, 2014, California state legislators made final amendments to a bill updating the state’s breach notification law. The amended bill, which passed the State Senate on August 21 and the Assembly on August 25, is now headed to California Governor Jerry Brown for signature. If signed, the scope of the existing law would extend to apply to entities that “maintain” personal information about California residents.

Sales 40
article thumbnail

Germany Issues Revised Draft Cybersecurity Law

Hunton Privacy

On August 19, 2014, the German Federal Ministry of the Interior published a revised draft cybersecurity law (the “Draft Law”). An earlier version of the law was published in March 2013. The Draft Law is intended to serve as a cornerstone of Germany’s recently-announced digital agenda. “Critical Infrastructure” and Security Requirements. The revised Draft Law will amend a number of laws and provisions relating to IT security.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hunton’s Centre for Information Policy Leadership Submits Comments to NTIA on Big Data

Hunton Privacy

On August 14, 2014, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) submitted its response to the National Telecommunications and Information Administration’s (“NTIA’s”) request for public comment on big data and consumer privacy issues. The NTIA’s request, which follows the White House’s recent study of big data, the May 2014 Big Data Report , and the associated President’s Council of Advisors on Science and Technology Report , seeks further public input on

article thumbnail

Center for Digital Democracy Files Complaint and Calls for FTC Investigation of 30 Safe Harbor-Certified Companies

Hunton Privacy

On August 14, 2014, the Center for Digital Democracy (“CDD”) filed a complaint with the Federal Trade Commission and requested that the Commission investigate 30 companies certified to the U.S.-EU Safe Harbor Framework. In the complaint, CDD maintains that it analyzed 30 data marketing and profiling companies that currently are Safe Harbor-certified and identified the following five overarching themes that CDD claims “underscore the fundamental weakness of the Safe Harbor in its current incarnat

article thumbnail

UK Information Commissioner’s Office Publishes Big Data Report

Hunton Privacy

On July 28, 2014, the UK Information Commissioner’s Office (“ICO”) released a comprehensive report on Big Data and Data Protection (the “Report”). This is the first big data guidance prepared by a European data protection authority. The Report describes what is meant by “big data,” the privacy issues big data raises, and how to comply with the UK’s Data Protection Act in the context of big data.

article thumbnail

APEC Privacy Update – Beijing Meetings

Hunton Privacy

On August 6-10, 2014, the APEC Data Privacy Subgroup (“DPS”) and its parent committee, the Electronic Commerce Steering Group (“ECSG”), met in Beijing, China, for another round of negotiations, meetings and workshops. The Centre for Information Policy Leadership at Hunton & Williams participated as part of the U.S. delegation. The principal focus of the meetings was again on the further implementation of the APEC Cross-Border Privacy Rules (“CBPR”) system and related work relevant to cross-b

Privacy 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Foreign Couple Found Guilty of Illegal Collection of Personal Information in Shanghai

Hunton Privacy

On August 8, 2014, a court in Shanghai found a foreign couple guilty of illegal collection of personal information. British national Peter Humphrey was sentenced to two and a half years of imprisonment and a fine of RMB 200,000, and his wife was sentenced to two years of imprisonment and a fine of RMB 150,000. In addition, Humphrey will be deported after serving his term.

Sales 40
article thumbnail

FTC Approves Another COPPA Safe Harbor Program

Hunton Privacy

On August 6, 2014, the Federal Trade Commission announced that it had approved a safe harbor program submitted by the Internet Keep Safe Coalition (“iKeepSafe”), stating the program provides the “same or greater protections” for children under the age of 13 as those contained in the new Children’s Online Privacy Protection Rule (the “COPPA Rule”). An updated version of the COPPA Rule came into effect July 1, 2013.

Privacy 40
article thumbnail

Illinois Becomes the Latest State to “Ban the Box”

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : Illinois recently joined a growing number of states and municipalities that have passed “ban the box” laws regulating when employers can inquire into an applicant’s criminal history. The Job Opportunities for Qualified Applicants Act was signed into law by Governor Pat Quinn on July 19, 2014.

Privacy 40
article thumbnail

FTC Releases Staff Report Recommending Transparency Improvements for Mobile Shopping Apps

Hunton Privacy

On August 1, 2014, the Federal Trade Commission released a new staff report examining the consumer protection implications of popular mobile device applications that provide shopping and in-store purchase services. The report, What’s the Deal? An FTC Study on Mobile Shopping Apps , details the findings from a recent FTC staff survey that studied consumer rights and data protection issues associated with some of the most popular mobile shopping apps on the market.

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

European Commission Announces EU-Wide Logo and Data Protection Impact Assessment Process for RFID Systems

Hunton Privacy

On July 30, 2014, the European Commission announced two new EU standards to help users of Radio Frequency Identification (“RFID”) smart chips and systems comply with both EU data protection requirements and the European Commission’s 2009 Recommendation on RFID. Among other suggestions, the Recommendation discussed the development of a common European symbol or logo to indicate whether a product uses a smart chip.

Retail 40
article thumbnail

FTC Seeks Public Comment on Telemarketing Sales Rule

Hunton Privacy

On July 31, 2014, the Federal Trade Commission published a notice in the Federal Register indicating that it is seeking public comment on its Telemarketing Sales Rule (“TSR”) as “part of the FTC’s systematic review of all current Commission regulations and guides.” In the press release accompanying the Federal Register notice, the FTC stated that its questions for the public focus on (1) the use and sharing of pre-acquired account information in telemarketing, and (2) issues raised by the use of

Sales 40
article thumbnail

Writing Is Code, Reading Is Visualization

John Battelle's Searchblog

'The post Writing Is Code, Reading Is Visualization appeared first on John Battelle's Search Blog. Yesterday I stumbled onto a fascinating PBS Newshour interview with book designer Peter Mendelsund, well-regarded for his cover treatments of titles ranging from George Dyson’s Turing’s Cathedral to The Girl With The Dragon Tattoo. Mendelsen argued that when we read, we visualize the text, each of us creating a different reality in our minds.

103
103