November, 2014

article thumbnail

Google: The Information-First Conglomerate

John Battelle's Searchblog

'The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014. Last week Google CEO Larry Page got the Fortune magazine cover treatment , the latest of many such pieces attempting to quantify Google’ sprawling business. The business press is obsessed with answering the question of whether we’ve reached “ Peak Google.” (Clearly Fortune’s opinion is that we have not, given they

Marketing 111
article thumbnail

The remote control tower ….the remote control airport? Enabled by the Internet of Things.

CGI

The remote control tower ….the remote control airport? Enabled by the Internet of Things. ravi.kumarv@cgi.com. Wed, 11/26/2014 - 02:06. Aviation is growing and operational, regulatory, security, and commercial expectations are changing , and this is placing pressure on the associated airport infrastructure, much of which can require enormous redesign and capital expenditure to meet these challenges.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hunton Global Privacy Update – November 2014

Hunton Privacy

On November 18, 2014, Hunton & Williams’ Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. The program covered a number of privacy and data protection topics, including a report on the International Conference of Data Protection and Privacy Commissioners , highlights on the Council of the European Union’s proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the fo

Privacy 40
article thumbnail

Is IG a new package and labeling of RIM?

Positively RIM

Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Using E-mail for Direct Marketing: Do You Know the Rules?

Managing Your Information

I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.

More Trending

article thumbnail

Whither the Public Commons? Enter The Private Corporation

John Battelle's Searchblog

'The post Whither the Public Commons? Enter The Private Corporation appeared first on John Battelle's Search Blog. ( image ) From time to time a piece reminds us that we are in a slow, poorly articulated struggle over what we hold as a public commons. That was the case with Vanity Fair’s Man and Uber Man , a profile of Uber’s Travis Kalanick by Kara Swisher.

article thumbnail

Enabling Data Driven Business Models

CGI

Enabling Data Driven Business Models. p.butler@cgi.com. Thu, 11/13/2014 - 04:06. The business world is changing at a rate we would not have believed ten years ago. My colleague Ian Watts, CGI’s Director of Consulting, uses the phrase ‘change is the constant, it’s the rate of acceleration for different industries that we need to understand’ , which I think captures the challenge businesses are grappling with quite well.

B2C 40
article thumbnail

Centre’s Risk Workshop II in Brussels Emphasizes that Risk-Based Approach to Privacy Does Not Change Legal Obligations but Helps Calibrate Their Effective Implementation

Hunton Privacy

On November 18, 2014, the Centre for Information Policy Leadership at Hunton & Williams (the “Centre”) held the second workshop in its ongoing work on the risk-based approach to privacy and a Privacy Risk Framework. Approximately 70 Centre members, privacy regulators and other privacy experts met in Brussels to discuss the benefits and challenges of the risk-based approach, operationalizing risk assessments within organizations, and employing risk analysis in enforcement.

Risk 40
article thumbnail

New Records Technology: Structured Data Archiving

Positively RIM

Care for an example of how IT, Legal, and Records need to work together (commonly known as Information Governance?) Here’s one development: Technology at ARMA International is a fascinating mélange. Each year, we see incremental improvements. There are faster scanners, increasingly subtle analytics, greater capacities, more resolution, less-volatile media, and more.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Internet Big Five: Doubling In Three Years On A Trillion Dollar Base

John Battelle's Searchblog

'The post The Internet Big Five: Doubling In Three Years On A Trillion Dollar Base appeared first on John Battelle's Search Blog. From time to time I have tracked what I call the “Internet Big Five” – the key platform technology companies that are driving the Internet economy. Nearly three years ago I wrote the first of this series – The Internet Big Five.

Marketing 110
article thumbnail

Else 11.03.14: It’s Over, Google. Now What?

John Battelle's Searchblog

'The post Else 11.03.14: It’s Over, Google. Now What? appeared first on John Battelle's Search Blog. ( image ) Our friends in the press have decided that search has had its decade in the sun, and I can’t disagree, at least as it was known before. The question of how it becomes something else is still very much afoot, but not solved.

article thumbnail

TRUSTe Reaches Settlement with FTC Over Alleged FTC Act Violations

Hunton Privacy

On November 17, 2014, the Federal Trade Commission announced that data privacy certifier True Ultimate Standards Everywhere, Inc. (“TRUSTe”) has agreed to settle charges that the company deceived consumers about its recertification program and misrepresented that it was a non-profit entity in violation of Section 5 of the FTC Act. TRUSTe offers a variety of assessments and certifications (“Certified Privacy Seals”) for online business websites and mobile applications.

Privacy 40
article thumbnail

Court Orders Debt Brokers to Notify Consumers Following FTC Allegations of Unlawful Disclosure of Personal Information

Hunton Privacy

On November 12, 2014, the Federal Trade Commission announced that in response to FTC complaints, a federal court has ordered two debt brokerage companies to notify over 70,000 consumers whose sensitive personal information was posted on a public website by the debt brokerage companies. The two defendants are debt brokers that sell portfolios of consumer debt for eventual collection by third party debt collectors.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IAPP Europe Data Protection Congress 2014

Hunton Privacy

Join us at the International Association of Privacy Professionals (“IAPP”) Data Protection Congress in Brussels, November 18-20, 2014. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Internet of Things, Data Protection and Security: What are the Legal Challenges, and How Do We Overcome Them? Preconference Workshop: Tuesday, November 18, 2:00 p.m.

Privacy 40
article thumbnail

Ebola and Other Health Emergencies Create Workplace Privacy Dilemmas

Hunton Privacy

Hunton & Williams Labor & Employment partner Susan Wiltsie reports: Fears of a worldwide Ebola pandemic appear to have abated, but the tension between workplace safety and employee privacy, thrown into relief by this health emergency, remains an issue relevant to all employers. Any potential health threat created by contagious illness requires employers to plan and put into effect a reasonable response, including policies governing the terms and conditions under which employees may be re

Privacy 40
article thumbnail

Does the advance of smart devices mean the end of the World Wide Web as we know it?

CGI

Does the advance of smart devices mean the end of the World Wide Web as we know it? sarah.robins@cgi.com. Wed, 11/12/2014 - 05:05. In many ways the Internet provides a platform which aggregates data from content providers and adds a user friendly, consistent presentation layer for easy consumption. Information is created and published online; it is indexed and sorted, manipulated for various devices and then remains there to be consumed at our leisure.

article thumbnail

UK ICO Issues Code of Practice Regarding the Use of Surveillance Cameras

Hunton Privacy

On October 15, 2014, the UK Information Commissioner’s Office (“ICO”) published a code of practice regarding the use of surveillance cameras (“Code of Practice”). The Code of Practice explains how the legal requirements of the Data Protection Act 1998 apply to operators of surveillance cameras. Practical and technological advancements have led to a wide variety of surveillance camera technologies that differ from traditional CCTV ( e.g. , Automatic Number Plate Recognition cameras and body-worn

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

GPEN Holds Workshop on the Use of Publicity as a Regulatory Compliance Technique

Hunton Privacy

On November 1, 2014, the Global Privacy Enforcement Network (“GPEN”) posted a media release on their workshop held on October 12, 2014, in Mauritius on the use of publicity as a regulatory compliance technique. The workshop, attended by 44 commissioners and staff from around the world, focused on different issues concerning privacy enforcement, including the effectiveness of monetary penalties in enforcing data protection laws and the diverse approaches to enforcement publicity.

article thumbnail

New Payment Technologies Should Reduce Demand for Cyber Insurance

Hunton Privacy

Hunton & Williams Insurance Litigation & Counseling partner Lon Berk reports: As the demand for cyber insurance has skyrocketed, so too has the cost. One broker estimates that sales in 2014 will double from the $1 billion premium collected in 2013. Much of the increase in demand and cost has been the result of the widely publicized hacks of the point-of-sale systems at large retailers, and the primary emphasis of most cyber policies is to address liability arising from such events.

article thumbnail

German Court Asks European Court of Justice if IP Addresses are Personal Data

Hunton Privacy

On October 28, 2014, the German Federal Court of Justice referred the question of whether an IP address constitutes personal data under the EU Data Protection Directive 95/46/EC (“EU Data Protection Directive”) to the European Court of Justice (“ECJ”). The German court referred the question to the ECJ for a preliminary ruling in connection with a case that arose in 2008 when a German citizen challenged the German federal government’s storage of the dynamic IP addresses of users on government web

article thumbnail

“One-Stop-Shop” Under the Proposed EU Regulation: A Way Forward

Hunton Privacy

This week, the Article 29 Working Party (“Working Party”) prepares to debate various proposals on the “one-stop-shop” mechanism under the proposed EU General Data Protection Regulation (“Regulation”). Hunton & Williams’ Global Privacy and Cybersecurity practice and its Centre for Information Policy Leadership submitted a strategy paper on the one-stop-shop to the Working Party.

Paper 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Federal District Court Grants Motion to Dismiss a Class Action Alleging Impermissible Sharing of Personal Information Under the Video Privacy Protection Act

Hunton Privacy

On October 8, 2014, the United States District Court for the Northern District of Georgia granted Cartoon Network, Inc.’s (“Cartoon Network’s”) motion to dismiss a putative class action alleging that Cartoon Network’s mobile app impermissibly disclosed users’ personally identifiable information (“PII”) to a third party data analytics company under the Video Privacy Protection Act (“VPPA”).

Privacy 40
article thumbnail

Supreme Court of Canada Extends Deadline for Amending Alberta PIPA

Hunton Privacy

On October 30, 2014, the Supreme Court of Canada extended the deadline for the province of Alberta to amend its Personal Information Protection Act (“PIPA”). In November 2013, the Supreme Court of Canada declared PIPA invalid because it interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms.

Privacy 40
article thumbnail

FFIEC Announces Plans to Update Cybersecurity Guidance in Wake of Cybersecurity Assessments

Hunton Privacy

On November 3, 2014, the Federal Financial Institutions Examination Council (“FFIEC”), on behalf of its members, released a report entitled FFIEC Cybersecurity Assessment General Observations (the “Report”) that contains observations from recent cybersecurity assessments conducted at over 500 community financial institutions as part of the FFIEC cybersecurity examination work program.

article thumbnail

The Web Will Kill Apps

John Battelle's Searchblog

'The post The Web Will Kill Apps appeared first on John Battelle's Search Blog. Lots of the “apps are killing the web” meme going around these days, with the latest batch of casket sealant come from no greater validator of commonly agreed upon wisdom than the Wall St. Journal. “The Web Is Dying; Apps Are Killing It” argues Christopher Mims, and it’s hard to argue with him given the preponderance of current evidence.

IT 111
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Massachusetts Attorney General Reaches Settlement with Boston Hospital Over Data Security Allegations

Hunton Privacy

On November 21, 2014, Massachusetts Attorney General Martha Coakley announced that Boston hospital Beth Israel Deaconess Medical Center (“BIDMC”) has agreed to pay a total of $100,000 to settle charges related to a data breach that affected the personal and protected health information of nearly 4,000 patients and employees. In its complaint, the Attorney General alleged that a trespasser entered an unlocked office of a BIDMC physician and stole a personal laptop containing unencrypted names, So