September, 2013

article thumbnail

Get Out of Your Office, And Into The Modern Working City: OpenCo SF Is Live!

John Battelle's Searchblog

'The post Get Out of Your Office, And Into The Modern Working City: OpenCo SF Is Live! appeared first on John Battelle's Search Blog. I’m bustin’ with pride to announce that after great festivals in London , New York , and Detroit , OpenCo is returning next month to its home base of San Francisco, and the lineup is 135 companies strong *.

Access 110
article thumbnail

Federal Court: Non-Public Facebook Wall Posts Are Protected Under the Federal Stored Communications Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , No. 2:11-CV-3305 (WMJ) (D.N.J. Aug. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The (untold) price of doing local search

Elie

Nearly everyone loves mobile apps that can perform local searches, get directions, or find the nearest decent restaurant. But what’s not so obvious is that these local apps can have hidden bandwidth costs — meaning that, in some cases, they can run up your phone bill in ways you might not expect.

48
article thumbnail

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Talking about user adoption at the NSW KM Forum on 24th September, 2013

ChiefTech

'This month, I''ve been invited to talk about user adoption at the NSW KM Forum : Why is user adoption of new workplace information technologies - such as SharePoint - so difficult, yet people appear to have no difficulty learning how to use Facebook or Candy Crush? I''ll be talking about: What is user adoption? And should we even be talking about "users" and "adoption"?

More Trending

article thumbnail

The Best Platform for Incubation Is the Web

John Battelle's Searchblog

'The post The Best Platform for Incubation Is the Web appeared first on John Battelle's Search Blog. ( image ) Yesterday in the course of my seemingly endless attempt to stay current in this industry, I came across this article on VentureBeat: Searching for the next Zuckerberg: A day in the life of a Lightspeed Fellow. It chronicles the experiences of the chosen few who have made it into a VC-backed incubator, focusing on two Stanford students who are trying to create a new sensor for lap

Sales 108
article thumbnail

Singapore Personal Data Protection Commission Issues Guidelines

Hunton Privacy

On September 24, 2013, the Singapore Personal Data Protection Commission (the “Commission”) published guidelines to facilitate implementation of the Singapore Personal Data Protection Act (the “PDPA”). The Advisory Guidelines on Key Concepts in the Personal Data Protection Act and the Advisory Guidelines on the Personal Data Protection Act for Selected Topics provide explanations of concepts underlying the data protection principles in the PDPA, and offer guidance on how the Commission may inter

article thumbnail

DB2 10 for z/OS: Take Advantage of "Native" SQL User-Defined Functions

Robert's Db2

Lots and lots of mainframe DB2 people know about the native SQL procedure technology delivered with DB2 9 for z/OS. That was, in my opinion, the most important enhancement of this aspect of DB2 functionality since stored procedures were introduced in the mid-1990s with DB2 for z/OS Version 4 (I've blogged multiple times about native SQL procedures, starting with an entry I posted a few years ago to the blog I maintained while working as an independent DB2 consultant).

article thumbnail

LexisNexis Data Breached - But Your Unique Identity is Much More Than Data Stolen Over the Internet

Interactive Information Management

In light of this week's LexisNexis Data Breach report, it's worthwhile to explore the true value and usefulness of this kind of data that might be stolen from you. Sensitive, personal data (PII, or "Personally Identifiable Data") is usually protected, but no protection is guaranteed if outside your complete control in any way – most people should assume their most-used data reflecting their personal identity (like SSNs, tel #s, DOB) is already public , if not already being used illegimately.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A retrospective look at the Magic Quadrant for Social Software in the Workplace, 2007-2013

ChiefTech

'In this new post on the Ripple Effect Group blog , I decided to take a retrospective look at Gartner''s Magic Quadrant for Social Software in the Workplace since 2007. One of my observations is that over the last 4 years over half the vendors have remained fairly constant in the quadrant. This means there are some mature offerings out there in the market, but there is still room for plenty of competition in this space.

article thumbnail

A road-map to sending “commercial electronic messages” under CASL

Privacy and Cybersecurity Law

Let’s take stock of the information currently available on Canada’s Anti-Spam Legislation (CASL). First, there is the Act itself. Next, […].

article thumbnail

Search and Immortality

John Battelle's Searchblog

'The post Search and Immortality appeared first on John Battelle's Search Blog. Funny thing, there I was two days ago, at Google’s annual conference , watching Larry Page get asked questions so pliant in nature they couldn’t be called softballs. They were more like tee balls – little round interrogatives gingerly placed on a plastic column for Page to swat out into the crowd.

Libraries 106
article thumbnail

California Amends Online Privacy Policy Law to Require Tracking Disclosures

Hunton Privacy

On September 27, 2013, California Governor Jerry Brown signed into law a bill amending the California Online Privacy Protection Act (“CalOPPA”) to require website privacy notices to disclose how the site responds to “Do Not Track” signals, and whether third parties may collect personal information when a consumer uses the site. Although the changes to the law do not prohibit online behavioral advertising, this is the first law in the United States to impose disclosure requirements on website ope

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DB2 for z/OS Hash-Organized Data: an Interesting Performance Story

Robert's Db2

A lot of DB2 for z/OS people know about the hash mode of organizing data in a table -- something introduced with DB2 10 (I've blogged about this topic multiple times, most recently in an entry I posted a few months ago ). The basics of hash-organization of data (this as opposed to traditional cluster-based data organization) are pretty straightforward: you select for a table a hash key (which could be comprised of a single column or a concatenation of multiple columns, as long as each key value

Access 48
article thumbnail

else 9.23: From “Pulp to Prototype” and Other Good Reads

John Battelle's Searchblog

'The post else 9.23: From “Pulp to Prototype” and Other Good Reads appeared first on John Battelle's Search Blog. This week we’ve been thinking a lot about driverless cars and related data-driven innovations in transportation. (We even saw one up close this week at Google Zeitgeist.) We looked at Google’s newest effort to extend life with data in its new company, Calico.

article thumbnail

else 9.9: We Got Yer Star Trek Right Here

John Battelle's Searchblog

'The post else 9.9: We Got Yer Star Trek Right Here appeared first on John Battelle's Search Blog. This week in our round up we look at near-future advances in body scanners, self-driving sensors, and robots. We also read about what happens next as the internet’s fundamental trust architecture is on shaky grounds with the latest NSA revelations.

article thumbnail

else 9.30: The “Monkeys with Typewriter” Algorithm

John Battelle's Searchblog

'The post else 9.30: The “Monkeys with Typewriter” Algorithm appeared first on John Battelle's Search Blog. This week, the blind see with data, algorithms are uncovered, networks are analyzed, and data remains siloed. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis the best way is to subscribe to the “else” feed either as an email newsletter or through RSS.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

At Google Zeitgest 2013: A Conversation with Mark Kelly, featuring Gabby Giffords

John Battelle's Searchblog

'The post At Google Zeitgest 2013: A Conversation with Mark Kelly, featuring Gabby Giffords appeared first on John Battelle's Search Blog. For the past four years I’ve been honored to help moderate portions of Google’s annual Zeitgeist conference , which assembles a powerful lineup of speakers each year in the Arizona desert. I hosted the last segment of the day, and sat down with astronaut Mark Kelly, who is known for his career as a fighter pilot and Space Shuttle commander, a

82
article thumbnail

else 9.3: Staring at the Tiny Screens

John Battelle's Searchblog

'The post else 9.3: Staring at the Tiny Screens appeared first on John Battelle's Search Blog. This week: Gartner’s latest hype cycle addresses the relationship between humans and machines, moral panics about our attention and time resurface, UPS optimizes drop offs around the happiness of drivers, Bitcoin’s regulatory environment gets messy, and data brokers take steps towards improved consumer transparency.

Privacy 70
article thumbnail

else 9.16: Start Making Sense

John Battelle's Searchblog

'The post else 9.16: Start Making Sense appeared first on John Battelle's Search Blog. This week, we’re excited about what the new M7 sensors mean for iPhone activity tracking, we’re thinking about how to rebuild trust in the internet and tech companies post-Snowden, and we’re listening to some music that plays with the boundaries between analog and digital.

article thumbnail

Senate Commerce Committee Broadens Data Broker Investigation

Hunton Privacy

On September 25, 2013, Senator Jay Rockefeller (D-WV), Chair of the Senate Committee on Commerce, Science and Transportation, expanded his investigation of the data broker industry by asking twelve popular health and personal finance websites to answer questions about their data collection and sharing practices. In letters to the companies , Senator Rockefeller requested detailed information about the websites’ privacy practices, including: whether the company collects health, family, financial

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Data Protection Commissioners Adopt a Declaration and Several Resolutions at 35th International Conference

Hunton Privacy

On September 23 and 24, 2013, a declaration and eight resolutions were adopted by the closed session of the 35th International Conference of Data Protection and Privacy Commissioners and have been published on the conference website. This blog post provides an overview of the declaration and the most significant resolutions. Warsaw Declaration on the “Appification of Society”.

Privacy 40
article thumbnail

UK ICO Publishes New Breach Notification Guidance for Telecom Operators and ISPs

Hunton Privacy

On September 26, 2013, the UK Information Commissioner’s Office (“ICO”) published new breach notification guidance (the “Guidance”), applicable to telecom operators, Internet service providers (“ISPs”) and other public electronic communications service (“ECS”) providers. The UK Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) implement the revised e-Privacy Directive 2009/136/EC, and contain wide-ranging rules on marketing and advertising by telephone, fax, email an

article thumbnail

Lon Berk Discusses Recent Cyber Attack on New York Times

Hunton Privacy

Recent months have seen a significant increase in highly-publicized cyber attacks and cybersecurity incidents, including an August 2013 attack on The New York Times’ website that shut down the site twice in two weeks. Unsurprisingly, there also has been an upswing in the demand for, and underwriting of, cyber insurance. In a recent Law360 article, Takeaways from Recent Cyberattack on New York Times, Hunton & Williams Insurance Litigation & Counseling partner Lon Berk considers whether a

article thumbnail

California Expands Online Privacy Law to Bolster Protection for Minors

Hunton Privacy

On September 23, 2013, California Governor Jerry Brown signed a bill that adds “Privacy Rights for California Minors in the Digital World” to the California Online Privacy Protection Act (“CalOPPA”). The new CalOPPA provisions prohibit online marketing or advertising certain products to anyone under age 18, and require website operators to honor requests made by minors who are registered users to remove content the minor posted on the site.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

HIPAA Omnibus Rule Compliance Deadline Has Arrived

Hunton Privacy

Today, September 23, 2013, marks the deadline for compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Omnibus Rule that was issued in January 2013. Covered entities, business associates and subcontractors that access, use or disclose protected health information (“PHI”) will need to take the following actions: For Covered Entities : Review and modify HIPAA privacy policies and procedures to address the new definition of “marketing” in the HIPAA Privacy Rule

article thumbnail

Hunton Privacy Attorneys Featured Among New York Super Lawyers

Hunton Privacy

Hunton & Williams LLP is pleased to announce that several privacy lawyers were named to the New York Metro Super Lawyers list for 2013. For the eighth consecutive year, Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was selected as a New York Super Lawyer. She also was featured in the latest edition of New York Super Lawyers Magazine in an article entitled “ The Queen of Breach: Privacy Expert Lisa Sotto Goes Public.

Privacy 40
article thumbnail

Commissioner Reding Comments on EU General Data Protection Regulation Negotiations

Hunton Privacy

On September 6, 2013, Vice-President of the European Commission and Commissioner for Justice, Fundamental Rights and Citizenship Viviane Reding traveled to Berlin where she commented on the status of the negotiations on the proposed EU General Data Protection Regulation (the “Proposed Regulation”). Commissioner Reding indicated that she was looking for Germany to become involved in the discussions about the Proposed Regulation at the highest level, and she argued in favor of stricter regulations

IT 40