September, 2014

article thumbnail

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

'The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up. Recently I began a walkabout of sorts, with a goal of ameliorating my rather thin understanding of the mobile marketplace. If you read me closely, you know I’ve been more than frustrated with what I call the “ chicletized world ” of disconnected mobile apps.

Marketing 112
article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Article 29 Working Party States Principles in EU Data Protection Law Apply to Big Data

Hunton Privacy

On September 16, 2014, the Article 29 Working Party (the “Working Party”) adopted a Statement on the impact of the development of big data on the protection of individuals with regard to the processing of their personal data in the EU (“Statement”). This two-page Statement sets forth a number of “key messages” by the Working Party on how big data impacts compliance requirements with EU privacy law, with the principal message being that big data does not impact or change basic EU data protection

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Are your drivers eco-friendly?

CGI

Are your drivers eco-friendly? shobana.lv@cgi.com. Mon, 09/22/2014 - 05:00. A number of companies have been investing in coaching services for professional drivers with the goal of teaching them how to reduce fuel usage, as well as other eco-driving skills. To succeed, a clear perception of the variations in fuel consumption that can be attributed to driving behaviour is required.

Paper 40

More Trending

article thumbnail

Every Company Is An Experience Company

John Battelle's Searchblog

'The post Every Company Is An Experience Company appeared first on John Battelle's Search Blog. Illustration by Craig Swanson and idea by James Cennamo. Some years ago while attempting to explain the thinking behind my then-startup Federated Media, I wrote that all brands are publishers (it was over on the FM blog, which the new owners apparently have taken down – a summary of my thinking can be found here ).

Retail 106
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 83
article thumbnail

DC, Northern Virginia Digital Strategy - for Businesses, Agencies, Nonprofits - Upcoming NVTC.org Committee Meetings 2014-2015

Interactive Information Management

Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015. Or join the NVTC now to participate! Hear from other #NVTC business and government members, sharing information regarding the approach to a Digital Strategy, executing and sustaining it for innovative business value.

article thumbnail

Appeals Court Holds User Consent Required to Enforce Website Terms of Use

Hunton Privacy

A recent decision by the United States Court of Appeals for the Ninth Circuit reinforces the importance of obtaining affirmative user consent to website Terms of Use for website owners seeking to enforce those terms against consumers. In Nguyen v. Barnes & Noble Inc. , the Ninth Circuit held that Barnes & Noble’s website Terms of Use (“Terms”) were not enforceable against a consumer because the website failed to provide sufficient notice of the Terms, despite having placed conspicuous hy

Retail 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool.

article thumbnail

Managing SharePoint User Access

JKevinParker

What is the best way to manage individual users' access to SharePoint sites? Through AD security groups inside corresponding SharePoint groups. I prefer to keep the names consistent between SharePoint and AD security groups. Example Permission Groups for SharePoint. AD Security Group SharePoint Group SharePoint Permission Level. WebApp1_Site1_InfoManagers WebApp1_Site1_InfoManagers Manage Information.

Access 40
article thumbnail

We’re Innumerate, Which Is Why We Love Visualizations

John Battelle's Searchblog

'The post We’re Innumerate, Which Is Why We Love Visualizations appeared first on John Battelle's Search Blog. This weekend I reviewed my notes from a few weeks of late summer meetings, and found this gem from a conversation with Mike Driscoll, the CEO and co-founder of data analytics firm MetaMarkets. MetaMarkets helps adtech firms make sense of the reams of data they collect each day (hour, minute, second…).

Analytics 104
article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 50
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DB2 for z/OS: DDF, Stored Procedures, and SET CURRENT PACKAGESET

Robert's Db2

Recently, I was talking with people from a company's IT department about modernizing their mainframe application architecture.Among other things, we discussed increasing the company's use of stored procedures for DB2 for z/OS data access. That prompted some questions around the use of the DB2 SQL statement SET CURRENT PACKAGESET in stored procedures called by DRDA requesters (these being calls that would get to DB2 via the distributed data facility, or DDF).

Access 48
article thumbnail

Article 29 Working Party Issues an Opinion on Internet of Things

Hunton Privacy

On September 22, 2014, the Article 29 Working Party (the “Working Party”) released an Opinion on the Internet of Things (the “Opinion”) that was adopted during the last plenary session of the Working Party in September 2014. With this Opinion, the Working Party intends to draw attention to the privacy and data protection challenges raised by the Internet of Things and to propose recommendations for the stakeholders to comply with the current EU data protection legal framework.

article thumbnail

Exile for the BBC Micro; some elegant solutions

Scary Beasts Security

[Prelude: sorry, this has nothing to do with security whatsoever. Feel free to bail now if you're not interested in a classic 1980's game, and rest assured that non-security posts to this blog will remain extremely rare.] The BBC Micro game Exile , released in 1988, has a realistic claim for the best game ever. I lost months of my youth to this game.

IT 20
article thumbnail

Transformation strategies for building a “cloud-enabled” enterprise

CGI

Transformation strategies for building a “cloud-enabled” enterprise. shobana.lv@cgi.com. Fri, 09/12/2014 - 08:00. Cloud-enabled enterprises take a “cloud-first” approach to IT service delivery, taking advantage of cloud capabilities offered by external suppliers instead of building them in house. However, purchasing many different types of cloud services from multiple suppliers in an ad-hoc fashion leads to a highly fragmented IT environment, which, in turn, will negate the many benefits of clou

Cloud 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing

John Battelle's Searchblog

'The post Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing appeared first on John Battelle's Search Blog. ( image ) This past week’s links are rife with people asking hard questions of Google and Facebook, and so much the better, I’d warrant. You don’t get to the lead position without raising questions.

Marketing 103
article thumbnail

The energy sector's perfect storm

Collaboration 2.0

'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?

article thumbnail

DB2 for z/OS: Avoiding zIIP Engine Contention Issues

Robert's Db2

In an entry posted a few months ago to this blog, I touched on several matters pertaining to mainframe zIIP engines and the use of these processors by DB2 for z/OS. Based on recent experience, I feel that it's important to further highlight a particular zIIP-related issue: zIIP engine contention. Through this post, I want to explain what zIIP contention is, why you want to avoid it, how you can spot it, and what you can do about it.

IT 48
article thumbnail

FTC Settles COPPA Violation Charges Against Yelp and TinyCo

Hunton Privacy

On September 17, 2014, the Federal Trade Commission announced that the online review site Yelp, Inc., and mobile app developer TinyCo, Inc., have agreed to settle separate charges that they collected personal information from children without parental consent, in violation of the Children’s Online Privacy Protection Rule (the “COPPA Rule”). Yelp. According to the FTC’s complaint against Yelp, from 2009 to 2013, Yelp app users had to provide information such as their name, email address, ZIP code

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Life Break: Go See “Take Me To The River”

John Battelle's Searchblog

'The post Life Break: Go See “Take Me To The River” appeared first on John Battelle's Search Blog. It’s rare I write about things not directly related to the Internet industry, but the film Take Me To The River , a multi-year project helmed by my friend and colleague Martin Shore, is certainly worthy of a detour. If you love music, any kind of music, this film is a must.

IT 97
article thumbnail

A Print Magazine Launch? What?!!! California Sunday Is Coming

John Battelle's Searchblog

'The post A Print Magazine Launch? What?!!! California Sunday Is Coming appeared first on John Battelle's Search Blog. A year or so ago Chas Edwards, a colleague, pal, and member of the founding team at Federated Media, came to my office for a catch up. I had heard he was cooking up a new venture, but I didn’t know the details. Little did I know what Chas and his new partner Douglas McGray had up their sleeve – a new *print* magazine built specifically for California.

article thumbnail

A Big Day For The Internet

John Battelle's Searchblog

'The post A Big Day For The Internet appeared first on John Battelle's Search Blog. Today scores of big companies are taking symbolic action to defend the essential principles of an open Internet, and I support them. That’s why, on your first visit here today, you’ll see the “spinning ball of death” up on the right. For more information about the Internet Slowdown, head here.

79
article thumbnail

Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft

John Battelle's Searchblog

'The post Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft appeared first on John Battelle's Search Blog. I’m easing back into this weekly Else column, or put another way, I missed last week’s Else due to preparations for NewCo SF , which I’m proud to say was a huge success. This week is Detroit, then New York, London, Boulder, LA, Palo Alto, but I get ahead of myself.

Privacy 72
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The battle for the bank in your pocket

Collaboration 2.0

'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?

Paper 40
article thumbnail

French Data Protection Authority Reviews 100 Websites During EU Cookies Sweep Day

Hunton Privacy

On September 18, 2014, the French Data Protection Authority (the “CNIL”) announced plans to review 100 French websites on September 18-19, 2014. This review is being carried out in the context of the European “cookies sweep day” initiative, an EU online compliance audit. The Article 29 Working Party organized this joint action, which runs from September 15-19, 2014, to verify whether major EU websites are complying with EU cookie law requirements.

article thumbnail

Article 29 Working Party to Establish a Common Approach on the Right to be Forgotten for All EU Data Protection Authorities

Hunton Privacy

On September 18, 2014, the Article 29 Working Party (the “Working Party”) announced its decision to establish a common approach to the right to be forgotten (the “tool-box”). This tool-box will be used by all EU data protection authorities (“DPAs”) to help address complaints from search engine users whose requests to delete their search result links containing their personal data were refused by the search engines.