Sat.Jun 30, 2012 - Fri.Jul 06, 2012

article thumbnail

Quarantining Facebook to control tracking

Collaboration 2.0

By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.

IT 96
article thumbnail

Halfway Through The Year: How’re The Predictions Doing?

John Battelle's Searchblog

It’s time to review how my Predictions 2012 are faring, now that half the year has slipped by (that was fast, no?). One thing that stands out is the timing wrt Twitter – my first two predictions were about the company, and now that I think about it, given the news just this week (and the attendant debate ), I should have realized how the two could be in direct conflict with each other.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.

Cloud 65
article thumbnail

China Proposes Amendments to Regulation on Internet Information Services

Hunton Privacy

In June, China’s National Internet Information Office and its Ministry of Industry and Information Technology jointly published draft amendments to the Regulation on Internet Information Services (the “Regulation”). The amendments update the Regulation to cover new issues related to the rapid development of Internet services in China since the Regulation first took effect on September 25, 2000.

Access 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Penguin, Twitter, and Keyword Research

Interactive Information Management

Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.

More Trending

article thumbnail

Kanban rather than KM

ChiefTech

While studying Lean in general and Kanban in particular (and making the same bias as the KM evangelists, i.e establishing relationships that may not be relevant between two disciplines I’m passionate about) I’ve noticed this common trait with Social Software. By making the flow of work visible through actionable information , these simple tools lower the level of water and allow to surface deeply hidden organisation problems.

IT 54
article thumbnail

HHS Posts Audit Protocol Online

Hunton Privacy

The Department of Health and Human Services Office for Civil Rights (“OCR”) has posted an audit protocol on its website to provide information about the procedures currently being used by OCR as part of its new audit program. The protocol is presented in a sortable table format listing the applicable sections of the relevant rules and the established performance criteria, key activities and audit procedures associated with each section.

article thumbnail

A Common Approach to Federal Enterprise Architecture - Actionable Solutions

Interactive Information Management

The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.

article thumbnail

How Not To Post A Comment

John Battelle's Searchblog

Recently my site has been hit with a ton of “manual spam” – folks who are paid to post short comments in the hope they’ll appear and drive pagerank back to various sites (or perhaps just increase their or their clients’ visibility.) It’s not hard to kill these comments, though it’s a bit of an irritant when they pile up.

IT 65
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The legacy of TQM and lessons for Social Business Design

ChiefTech

Anyone remember Total Quality Management (TQM)? By the early 1990s interest in TQM was beginning to fade. Even it biggest supporters in the US, like Florida Power & Light, eventually "slashed its program because of worker complaints of excessive paperwork". Other simply felt it failed to live up to expectations for improving business performance or return on investment.

IT 49
article thumbnail

Article 29 Working Party Adopts Opinion on Cloud Computing

Hunton Privacy

On July 1, 2012, the Article 29 Working Party (the “Working Party”) adopted WP196 (the “Opinion”) setting out an analysis of the legal framework associated with cloud computing, as well as recommendations directed at both data controllers and data processors in the European Economic Area (the “EEA”). The Opinion identifies two data protection risks associated with the deployment of cloud computing services, namely: (1) lack of control over the data and (2) lack of information on data processing.

Cloud 40
article thumbnail

MicroSD memory cards to be excluded from copyright levies

Privacy and Cybersecurity Law

In a press release entitled “Harper Government Says No to Fees on Memory Cards”, Minister of Industry Christian Paradis announced the […].

article thumbnail

Chrome 20 on Linux and Flash sandboxing

Scary Beasts Security

[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Core Concepts of Social Business

ChiefTech

via informationweek.com. The concepts, not the technologies, of social business pave the road to success. From Social Business By Design by Dion Hinchcliffe and Peter Kim. Permalink.

46
article thumbnail

German Data Protection Authorities Issue Resolution and Guidance Paper on Smart Metering

Hunton Privacy

On June 27, 2012, the Conference of the German Federal and State Data Protection Commissioners (the “Conference”) issued a Resolution and a comprehensive guidance paper regarding data protection compliance with respect to smart metering. Smart metering is the use of intelligent energy networks and meters for monitoring and billing purposes. According to the Resolution, smart meter systems help guarantee a sustainable energy supply in terms of resource efficiency, environmental friendliness and t

Paper 40
article thumbnail

My comment on Delimiter about the Yammer acquisition by Microsoft

ChiefTech

The acquisition is unlikely to have much impact in the short term, although it may give Yammer an advantage when negotiating with some enterprise buyers through their new link to Microsoft. Certainly the acquisition won’t impact the immediate next release of SharePoint. There is of course massive potential to integrate activity streams and other social computing concepts across the Microsoft suite of products.

Cloud 40
article thumbnail

Recording of Kick-Ass Collaboration Everywhere with Confluence from the Atlassian Summit 2012

ChiefTech

via youtube.com. Recorded at the Atlassian Summit, in San Francisco. Permalink.

49
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Social business is more than adding a social layer: A banking example

ChiefTech

Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.