June, 2013

article thumbnail

Excellent Content Marketing: Dear NSA…

John Battelle's Searchblog

'The post Excellent Content Marketing: Dear NSA… appeared first on John Battelle's Search Blog. This short Slideshare deck , an extremely clever satire of the now infamous NSA slide deck , should be Slideshare’s marketing calling card. Echoes of the Tide and Oreo executions that are getting such plaudits recently. Love it. Dear NSA, let me take care of your slides. from Emiland.

Marketing 110
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social innovation with purposeful mobile apps

ChiefTech

'Yes, yes, I know this is just marketing. But even so, its nice to see social innovation enabled by mobile apps being highlighted. This 10 minute video highlights the following apps: Skyscape - a clinical decision-support tool. galileo - a clinical app, for amputees. Thornton Media - apps to help save endangered North American indigenous languages. It interesting to consider these examples in the light of the just released Australian Federal government''s mobile roadmap (PDF).

article thumbnail

Hunton and Williams Hosts Cornell University’s Privacy and Data Security Symposium

Hunton Privacy

On June 18, 2013, the New York office of Hunton & Williams LLP office hosted Cornell University’s Privacy and Data Security Symposium, Privacy, Security & Your Data – Concerns in a Changing World. The program focused on global privacy and cybersecurity issues, including protecting the personal information of Internet users, balancing user privacy with law enforcement concerns, and implementing responsible data stewardship and governance.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Architectural Significance

CGI

Architectural Significance. ravi.kumarv@cgi.com. Fri, 06/14/2013 - 08:00. I’ve lost count of the number of times I’ve seen systems architecture done badly. This is wearisome, and can be avoided. Poor architecture tends to come either from inexperienced architects (too wedded to technology specifics, or too dependent on formal method) or from overly-experienced architects (stuck in a groove, or too independent of method).

Risk 40

More Trending

article thumbnail

Hasta La Alta Vista, Baby.

John Battelle's Searchblog

'The post Hasta La Alta Vista, Baby. appeared first on John Battelle's Search Blog. I just saw the news that Yahoo! is “sunsetting” Alta Vista , one of the first “good” search engines. This makes me a little misty, as Alta Vista was the search engine I used BG – Before Google – and it had a real shot at *being* Google, had its various owners not utterly screwed it up over the years.

IT 109
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

article thumbnail

HHS Publishes Technical Corrections to January 25, 2013, HIPAA Privacy, Security, and Enforcement Rules

HIPAA

June 7, 2013. Today, HHS published in the Federal Register “ Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules ” that were published on January 25, 2013, as the Final Rule: “ Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.” Acc

Privacy 28
article thumbnail

German DPA Assesses Data Protection Compliance of Adobe Analytics

Hunton Privacy

The Bavarian data protection authority recently updated its compliance initiative regarding online tracking tools to include Adobe’s online tracking product ( Adobe Analytics (Omniture) ). As with previous initiatives of this nature , the underlying analyses were carried out in an automated manner, using a program specifically developed by the Bavarian data protection authority to verify compliance.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DB2 for z/OS Business Analytics: Moving the Queries to the Data

Robert's Db2

In the world of business, data has become the coin of the realm. Organizations that effectively leverage their informational assets tend to outperform peers and rivals. Given the value of data in today's marketplace, it's no wonder that companies are keenly focused on data security and availability, and on data delivery mechanisms that will keep pace with business growth.

article thumbnail

Does technology-led social innovation in Australia have to be blue-sky?

ChiefTech

'I''ll get to the point of this blog post in a moment… but first: I blogged about FutureGov''s Australian Patchwork pilot back in March. This is a recording of FutureGov''s Dominic Campbell presenting at a "BlueSky" session hosted by The Australian Centre for Social Innovation (TACSI): TACSI - BlueSky FutureGov from TACSI on Vimeo. Its well worth listening to the whole ~40 minutes of Dominic''s presentation.

article thumbnail

The Book Lives On

John Battelle's Searchblog

'The post The Book Lives On appeared first on John Battelle's Search Blog. Faithful readers will recall that about three months ago, I announced my return to FM as CEO. I also mentioned that the projects I’d been working on – notably OpenCo and The Book , would have to be retooled given my new commitment to the company I started back in 2005 (when I last wrote a book).

Mining 102
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Cloud 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HHS Publishes Technical Corrections to January 25, 2013, HIPAA Privacy, Security, and Enforcement Rules

HIPAA

June 7, 2013. Today, HHS published in the Federal Register “ Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules ” that were published on January 25, 2013, as the Final Rule: “ Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.” Acc

Privacy 28
article thumbnail

Bojana Bellamy to Assume Presidency of the Centre for Information Policy Leadership at Hunton and Williams LLP

Hunton Privacy

The Centre for Information Policy Leadership at Hunton & Williams LLP is pleased to announce that Bojana Bellamy, global director of data privacy for Accenture, will be joining the firm as president of the Centre, effective September 2, 2013. Current Centre President, Marty Abrams, who is retiring on September 1, will stay on as an advisor to the Centre.

article thumbnail

DB2 10 for z/OS and Enterprise Identity Mapping

Robert's Db2

You've probably seen this type of commercial many times on television: a frazzled individual vents his or her frustration over the difficulty of accomplishing some task, and finally cries out, "There must be a better way!" At which point the announcer chimes in, with a smooth and confident voice, "There is!" And then you get the product pitch (and it all concludes with the smiling, nodding approval of the formerly rattled, now happy-in-accomplishment user of the promoted product or service).

article thumbnail

Mary’s Annual Internet Trends

John Battelle's Searchblog

'The post Mary’s Annual Internet Trends appeared first on John Battelle's Search Blog. Waaay back in the late 1990s, I started a conference called the Internet Summit. My co-producers were Bill Gurley, who remains one of the giants in venture over at Benchmark, and Mary Meeker, who was at that point the best analyst in the Internet space, at Morgan Stanley.

IT 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Belgian Privacy Commission’s New Guidance on Information Security

Hunton Privacy

In recent months, the Belgian media has reported on a significant increase in data breaches. In December 2012, the National Belgian Railway Company inadvertently published 1.46 million sets of customer data online. The rise in data security incidents has caught the attention of the Belgian Privacy Commission, which has the authority to make recommendations on any matter relating to the application of the fundamental data protection principles in the Belgian Data Protection Act of December 8, 199

article thumbnail

European Commission Issues Technical Implementing Measures for Data Breach Notification by Telecom Operators and ISPs

Hunton Privacy

On June 24, 2013, the European Commission announced new technical implementing measures that address the EU data breach notification requirement for telecom operators and internet service providers (“ISPs”). Based on a Commission Regulation , these companies must: notify the competent national authority of the incident (or at least provide an initial description thereof) within 24 hours after detection of the breach; outline which data are affected and what measures have been or will be taken by

article thumbnail

Hunton and Williams LLP Global Privacy and Cybersecurity Practice Top Ranked in Legal 500 United States, EMEA Guides

Hunton Privacy

Hunton & Williams LLP proudly announces that the firm’s global Privacy and Cybersecurity practice was top-ranked in both The Legal 500 United States and EMEA 2013 guides. This is the fourth consecutive year that the practice has been listed in “Tier 1” by The Legal 500 United States. “We are very pleased that our global Privacy and Cybersecurity practice has maintained its position as one of the top practices in the world,” said firm Managing Partner Wally Martinez.

Privacy 40
article thumbnail

PLI Cybersecurity Program on July 1, 2013

Hunton Privacy

On July 1, 2013, Practising Law Institute (“PLI”) hosts its first symposium on Cybersecurity 2013: Managing the Risk in New York. Hunton & Williams partner Lisa J. Sotto is the Chair of the event. The program features timely cybersecurity topics, including the threat landscape, the legal environment (such as the Obama Administration’s Executive Order on Cybersecurity ), and how companies can manage cybersecurity incidents when they occur and seek to prevent cyber attacks before they occur.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

UK ICO Launches 2012/13 Annual Report

Hunton Privacy

On June 20, 2013, the UK Information Commissioner’s Office (“ICO”) launched its Annual Report and Financial Statements for 2012/13 (the “Report”). Introducing the Report , Information Commissioner Christopher Graham strongly emphasized that, as consumers become increasingly aware of their information rights, good privacy practices will become a commercial benefit and a business differentiator.

FOIA 40
article thumbnail

European Data Protection Supervisor Issues Opinion on EU Cybersecurity Strategy

Hunton Privacy

On June 14, 2013, the European Data Protection Supervisor (the “EDPS”) issued an Opinion regarding a joint communication by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy, Cyber Security Strategy of the European Union: an Open, Safe and Secure Cyberspace (the “Strategy”), as well as the European Commission’s proposed draft directive to ensure uniformly high security measures for network and information security across the EU (the “NIS Dir

article thumbnail

Texas Enacts Law Requiring Warrants to Search Emails

Hunton Privacy

On June 14, 2013, Texas Governor Rick Perry signed a bill requiring law enforcement agencies to obtain warrants before accessing customer electronic data held by email service providers. Introduced on March 4, 2013, the bill passed unanimously in both the Texas House and Senate on May 7 and May 22, respectively. The law takes effect immediately. The law amends the Texas Code of Criminal Procedure to require a warrant for the search and seizure of electronic customer data held in electronic stora

article thumbnail

Jessica Rich Named FTC Director of Consumer Protection

Hunton Privacy

On June 17, 2013, the Federal Trade Commission announced that FTC Chair Edith Ramirez has appointed Jessica Rich as Director of the Bureau of Consumer Protection. Rich has served in several leadership roles in the FTC’s Bureau of Consumer Protection during her 20-year tenure with the agency. Most recently, she served as Associate Director of the Division of Financial Practices.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

HHS Settles with Shasta Regional Medical Center

Hunton Privacy

On June 13, 2013, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $275,000 settlement with Shasta Regional Medical Center (“Shasta”) that pertained to impermissible disclosures of protected health information (“PHI”) by Shasta officials to the media, as well as to Shasta’s entire workforce. In late 2011, Shasta officials disclosed detailed information about a patient’s medical treatment to three separate media outlets without the patient’s authorization.

Privacy 40
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

Cloud 40
article thumbnail

Massive Online Data Collection Class Action Lawsuit Moves Forward

Hunton Privacy

On June 11, 2013, the United States Court of Appeals for the Seventh Circuit denied software maker comScore, Inc.’s petition to appeal class certification in a litigation related to comScore software that allegedly collected extensive data from consumers’ computers without authorization. The plaintiffs alleged that comScore (an online analytics company) gathered data from consumers’ computers through software that it bundled with third-party software, such as free screensavers, games, music-copy