Quarantining Facebook to control tracking
Collaboration 2.0
JULY 3, 2012
By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.
Collaboration 2.0
JULY 3, 2012
By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.
John Battelle's Searchblog
JULY 2, 2012
It’s time to review how my Predictions 2012 are faring, now that half the year has slipped by (that was fast, no?). One thing that stands out is the timing wrt Twitter – my first two predictions were about the company, and now that I think about it, given the news just this week (and the attendant debate ), I should have realized how the two could be in direct conflict with each other.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ChiefTech
JULY 2, 2012
I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.
Hunton Privacy
JULY 6, 2012
In June, China’s National Internet Information Office and its Ministry of Industry and Information Technology jointly published draft amendments to the Regulation on Internet Information Services (the “Regulation”). The amendments update the Regulation to cover new issues related to the rapid development of Internet services in China since the Regulation first took effect on September 25, 2000.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Interactive Information Management
JULY 3, 2012
Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
ChiefTech
JUNE 30, 2012
While studying Lean in general and Kanban in particular (and making the same bias as the KM evangelists, i.e establishing relationships that may not be relevant between two disciplines I’m passionate about) I’ve noticed this common trait with Social Software. By making the flow of work visible through actionable information , these simple tools lower the level of water and allow to surface deeply hidden organisation problems.
Hunton Privacy
JULY 5, 2012
The Department of Health and Human Services Office for Civil Rights (“OCR”) has posted an audit protocol on its website to provide information about the procedures currently being used by OCR as part of its new audit program. The protocol is presented in a sortable table format listing the applicable sections of the relevant rules and the established performance criteria, key activities and audit procedures associated with each section.
Interactive Information Management
JULY 2, 2012
The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.
John Battelle's Searchblog
JUNE 30, 2012
Recently my site has been hit with a ton of “manual spam” – folks who are paid to post short comments in the hope they’ll appear and drive pagerank back to various sites (or perhaps just increase their or their clients’ visibility.) It’s not hard to kill these comments, though it’s a bit of an irritant when they pile up.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
ChiefTech
JULY 2, 2012
Anyone remember Total Quality Management (TQM)? By the early 1990s interest in TQM was beginning to fade. Even it biggest supporters in the US, like Florida Power & Light, eventually "slashed its program because of worker complaints of excessive paperwork". Other simply felt it failed to live up to expectations for improving business performance or return on investment.
Hunton Privacy
JULY 4, 2012
On July 1, 2012, the Article 29 Working Party (the “Working Party”) adopted WP196 (the “Opinion”) setting out an analysis of the legal framework associated with cloud computing, as well as recommendations directed at both data controllers and data processors in the European Economic Area (the “EEA”). The Opinion identifies two data protection risks associated with the deployment of cloud computing services, namely: (1) lack of control over the data and (2) lack of information on data processing.
Privacy and Cybersecurity Law
JULY 3, 2012
In a press release entitled “Harper Government Says No to Fees on Memory Cards”, Minister of Industry Christian Paradis announced the […].
Scary Beasts Security
JULY 4, 2012
[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
ChiefTech
JUNE 30, 2012
via informationweek.com. The concepts, not the technologies, of social business pave the road to success. From Social Business By Design by Dion Hinchcliffe and Peter Kim. Permalink.
Hunton Privacy
JULY 2, 2012
On June 27, 2012, the Conference of the German Federal and State Data Protection Commissioners (the “Conference”) issued a Resolution and a comprehensive guidance paper regarding data protection compliance with respect to smart metering. Smart metering is the use of intelligent energy networks and meters for monitoring and billing purposes. According to the Resolution, smart meter systems help guarantee a sustainable energy supply in terms of resource efficiency, environmental friendliness and t
ChiefTech
JULY 2, 2012
The acquisition is unlikely to have much impact in the short term, although it may give Yammer an advantage when negotiating with some enterprise buyers through their new link to Microsoft. Certainly the acquisition won’t impact the immediate next release of SharePoint. There is of course massive potential to integrate activity streams and other social computing concepts across the Microsoft suite of products.
ChiefTech
JULY 2, 2012
via youtube.com. Recorded at the Atlassian Summit, in San Francisco. Permalink.
Advertisement
Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.
ChiefTech
JULY 6, 2012
Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.
Let's personalize your content