May, 2014

article thumbnail

Do You Have a Mission or…Are You *On* A Mission? On Being a NewCo

John Battelle's Searchblog

'The post Do You Have a Mission or…Are You *On* A Mission? On Being a NewCo appeared first on John Battelle's Search Blog. A sampling of NewCos from our 2013 NYC festival. (Cross posted from the NewCo blog …). About a year ago I wrote a piece outlining the kinds of companies we were looking for as we began the first full year of the NewCo festival circuit.

Marketing 106
article thumbnail

The End of 'Social'

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world.

102
102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Some Matters Pertaining to Nested DB2 Stored Procedures

Robert's Db2

I worked recently with some IT people who were themselves engaged in the development and enhancement of a high-volume application that accesses DB2 for z/OS data by way of stored procedures (the client side of the application communicates with the target DB2 system via the distributed data facility, also known as DDF). Various actions implemented and plans formulated by this IT team serve to effectively illustrate some important points regarding the nesting of DB2 stored procedures ("nesting," i

IT 48
article thumbnail

Using big data to understand users' privacy concerns

Elie

Worries about big data and privacy are all over the news, but our new research shows that big data can also help better understand users' privacy concerns.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google to Give Effect to Right to Remove Personal Data from Search Results

Hunton Privacy

On May 30, 2014, Google posted a web form that enables individuals to request the removal of URLs from the results of searches that include that individual’s name. The web form acknowledges that this is Google’s “initial effort” to give effect to the recent and controversial decision of the Court of Justice of the European Union in Costeja , widely described as providing a “right to be forgotten.

More Trending

article thumbnail

Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web?

John Battelle's Searchblog

'The post Viacom v. Cable One: A Foreshadowing of Things To Come in The Battle for the Open Web? appeared first on John Battelle's Search Blog. Viacom’s rather one-sided POV on why its blocked web access for Cable One providers. Image via @TheLadyH86. So it’s come to this. We’re all familiar with disputes between cable providers and their content partners – it happens all the time.

Access 100
article thumbnail

The end of 'social': Is the digital enterprise leaving you behind?

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.

45
article thumbnail

Some zIIP Things of Which DB2 for z/OS People Should be Aware

Robert's Db2

zIIP is short for System z Integrated Information Processor. It's a so-called specialty engine for an IBM mainframe server. The zIIP raison d'etre is reduced cost of computing on the System z platform, accomplished in two ways: 1) zIIP engines cost less than general-purpose processors (often referred to as CPs -- short for central processors), and 2) zIIP engines do not factor into the cost of software that runs in z/OS LPARs. zIIP engines aren't new (they were introduced in 2006), but there are

IT 48
article thumbnail

Programmatic Needs Context

John Battelle's Searchblog

'The post Programmatic Needs Context appeared first on John Battelle's Search Blog. Today Digiday published a piece I wrote about the lack of context in the display advertising marketplace. Check it out, I’ve posted it below as well for posterity. — Before the rise of programmatic buying and “audience retargeting,” most quality brand media was purchased based on a very particular contextual signal –- even if the market didn’t really call it that.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Else 5.19.14: I Too, Shall Be Forgotten (At Least By Europe)

John Battelle's Searchblog

'The post Else 5.19.14: I Too, Shall Be Forgotten (At Least By Europe) appeared first on John Battelle's Search Blog. ( image ) If ever you wanted proof we are renegotiating our social contract in the Internet age, this week’s roundup of the best links provides plenty of fodder. Onwards… The Myths & Realities Of How Of The EU’s New “Right To Be Forgotten” In Google Works - MarketingLand Google and other search engines will have to hew to new EU rules.

article thumbnail

Else 5.5.14: Stay Sober, My Friend (And Watch Your F8)

John Battelle's Searchblog

'The post Else 5.5.14: Stay Sober, My Friend (And Watch Your F8) appeared first on John Battelle's Search Blog. ( image ) Cinco de Mayo on a Monday? What fresh hell is this? Just another week of links worth reading, if you care about the most muscular narrative in our beer-goggled world. Facebook (and Wired) dominated thanks to news from it F8 developer conference, but policy and politics were not far behind.

IT 81
article thumbnail

FTC Issues Report on Data Broker Industry, Recommends Legislation

Hunton Privacy

On May 27, 2014, the Federal Trade Commission announced the release of a new report entitled Data Brokers: A Call for Transparency and Accountability , detailing the findings of an FTC study of nine data brokers, representing a cross-section of the industry. The Report concludes that the data broker industry needs greater transparency and recommends that Congress consider enacting legislation that would make data brokers’ practices more visible and give consumers more control over the collection

article thumbnail

Canadian Prime Minister Nominates Next Privacy Commissioner

Hunton Privacy

On May 28, 2014, Canadian Prime Minister Stephen Harper nominated Daniel Therrien as the next Privacy Commissioner of Canada. If approved, Therrien would take over from the interim Privacy Commissioner Chantal Bernier, who has been serving in this role after the previous Commissioner Jennifer Stoddart’s term ended in December 2013. Therrien is currently Assistant Deputy Attorney General of the Public Safety, Defence and Immigration Portfolio at the Department of Justice.

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hunton’s Global Privacy and Cybersecurity Practice Tops Chambers USA 2014 Rankings

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Chambers and Partners has listed the firm’s Global Privacy and Cybersecurity practice in Band 1 in the 2014 Chambers USA guide. This is the seventh consecutive year the firm was top ranked in this category. In addition, partner and chair of the firm’s Global Privacy and Cybersecurity practice group Lisa Sotto again was recognized as a “Star” performer (the guide’s highest ranking) for privacy and data security.

Privacy 40
article thumbnail

Hunton Global Privacy Update – May 2014

Hunton Privacy

On May 14, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program provided a global overview of some of the most debated topics in data protection and privacy, including cross-border data flows, global data breach issues and the EU Cybersecurity Directive.

Privacy 40
article thumbnail

Virginia Governor McAuliffe Appoints Paul Tiao to Virginia Cyber Security Commission

Hunton Privacy

On May 16, 2014, Virginia Governor Terry McAuliffe announced the members of the Virginia Cyber Security Commission, including the appointment of Hunton & Williams LLP’s Paul M. Tiao. Tiao, one of eleven citizen members elected to the group, is a partner in the firm’s Global Privacy and Cybersecurity Practice Group. “The cybersecurity issues facing both the Commonwealth and the nation are substantial,” said Tiao.

article thumbnail

FTC Seeks Privacy Protection for Personal Information in Bankruptcy Proceeding

Hunton Privacy

On May 23, 2014, the Federal Trade Commission announced that the FTC’s Bureau of Consumer Protection sent a letter to the court overseeing the bankruptcy proceedings for ConnectEDU Inc. (“ConnectEDU”), an education technology company, warning that the proposed sale of the company’s assets raises privacy concerns. ConnectEDU’s assets include personal information collected from students, high schools and community colleges in connection with the company’s website and affiliated services.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EU Court of Justice Upholds Right to Erasure in Google Search Case

Hunton Privacy

On May 13, 2014, the European Court of Justice (the “ECJ”) rendered its judgment in Google Spain S.L. and Google Inc. v Agencia Española de Protección de Datos (Case C-131/12, “ Google v. AEPD ” or the “case”). The case concerns a request made by a Spanish individual, Mr. Costeja, to the Spanish Data Protection Authority (Agencia Española de Protección de Datos or “AEPD”) to order the removal of certain links from Google’s search results.

article thumbnail

FCC Reaches Settlement Over Alleged Do-Not Call Registry Violations

Hunton Privacy

On May 19, 2014, the Federal Communications Commission announced that Sprint Corporation agreed to pay $7.5 million to settle an FCC Enforcement Bureau investigation stemming from allegations that the company failed to honor consumers’ requests to opt out of telemarketing calls and texts. Sprint also agreed to implement a two-year plan to help ensure future compliance with Do-Not-Call registry rules.

article thumbnail

California Attorney General Releases Guidance on Recent Changes to CalOPPA

Hunton Privacy

On May 21, 2014, California Attorney General Kamala D. Harris issued guidance for businesses (“Guidance”) on how to comply with recent updates to the California Online Privacy Protection Act (“CalOPPA”). The recent updates to CalOPPA include requirements that online privacy notices disclose how a site responds to “Do Not Track” signals, and whether third parties may collect personal information about consumers who use the site.

Privacy 40
article thumbnail

The end of 'social': Is the digital enterprise leaving you behind?

Collaboration 2.0

'We''re leaving the era of standalone social networks and moving to a far more interconnected world. The digital enterprise approach combines vestigial point solutions and legacy applications into cohesive next generation systems of engagement.

40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Sotto Speaks on the Importance of Cross-Border Data Transfers to Global Prosperity

Hunton Privacy

Hunton & Williams LLP, in coordination with the U.S. Chamber of Commerce, recently issued a report entitled Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , highlighting the benefits of cross-border data transfers to businesses in the international marketplace. The report underscores the importance of developing data transfer mechanisms that protect privacy and facilitate the free-flow of data, and also explores opportunities for new data transfe

Privacy 40
article thumbnail

French Data Protection Authority Unveils 2013 Annual Activity Report

Hunton Privacy

On May 19, 2014, the French Data Protection Authority (the “CNIL”) published its Annual Activity Report for 2013 (the “Report”) highlighting its main accomplishments in 2013 and outlining some of its priorities for the upcoming year. The Report discusses the proposed EU General Data Protection Regulation , and reiterates the CNIL’s main concerns with the proposal, namely: The one-stop-shop mechanism: according to the CNIL, it needs to provide better protection for individuals and allow for overs

article thumbnail

Singapore Personal Data Protection Commission Publishes Two Advisory Guidelines and Anticipates Promulgation of PDPA Regulations

Hunton Privacy

On May 16, 2014, the Singapore Personal Data Protection Commission (the “Commission”) published advisory guidelines for the implementation of its Personal Data Protection Act (the “PDPA”) for two industry sectors. The guidelines were published on the same day on which the Commission held its well-attended Personal Data Protection Seminar focusing on international perspectives on data governance.

article thumbnail

FTC Approves Consent Orders with Companies that Marketed Genetically Customized Nutritional Supplements

Hunton Privacy

On May 12, 2014, the Federal Trade Commission announced that it has approved final consent orders with two companies that marketed genetically customized nutrition supplements. In addition to charges that the companies’ claims regarding the effectiveness of their products were not sufficiently substantiated, the settlements also allege that the companies misrepresented their privacy and security practices.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

EEOC Suffers Another Loss in Its Crusade Against Employer Background Checks

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On April 9, 2014, the Sixth Circuit of Appeals not only affirmed summary judgment in EEOC v. Kaplan Higher Education Corp., et al. but also chastised the Equal Employment Opportunity Commission (“EEOC”) for applying a flawed methodology in its attempts to prove that using credit checks as a pre-employment screen had an unlawful disparate impact against African-American applicants.

IT 40
article thumbnail

Sotto Addresses Cybersecurity Threat Preparation and Response

Hunton Privacy

On May 7, 2014, IronBox Secure File Transfer hosted a webinar featuring “Queen of Breach” attorney Lisa Sotto, who shared her top tips in the event of a data breach. Lisa Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, discussed the current cyber risk landscape and led participants through a hypothetical data breach scenario.

article thumbnail

U.S. Chamber of Commerce and Hunton Release Report on the Importance of Cross-Border Data Transfers to Global Prosperity

Hunton Privacy

On May 12, 2014, the U.S. Chamber of Commerce released a report highlighting the benefits of cross-border data transfers across all sectors of the economy. Hunton & Williams LLP’s Global Privacy and Cybersecurity team developed the report with the Chamber of Commerce. The report, Business Without Borders: The Importance of Cross-Border Data Transfers to Global Prosperity , presents pragmatic solutions for developing international mechanisms that both protect privacy and facilitate cross-bord

Privacy 40