Sat.Aug 17, 2013 - Fri.Aug 23, 2013

article thumbnail

Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win

John Battelle's Searchblog

'The post Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win appeared first on John Battelle's Search Blog. I spent today at the first-ever Boing Boing Ingenuity , a two-day hackathon cum “vaudeville show” – truly Boing Boing brought to life. It made me so proud to see the essence of conversational marketing at work – a major brand adding deep value to a community, an independent publisher realizing its dream of celebrating its voice and community through a uniq

Marketing 109
article thumbnail

ABW requires more than wireless computing

ChiefTech

'Its no surprise that a story about Activity Based Working (ABW) appeared in Fairfax newspaper''s IT section - after all, ABW is underpinned by the right information technology. In this instance, the Australian federal Department of Human Services (DHS) will trial ABW with 110 staff in a Canberra office. A range of supporting technologies will be deployed that include a practical mix of wireless networking, follow-me printing and voice-over internet protocol (VoIP).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New EU Breach Regulation in Force

Hunton Privacy

This week a new breach notification regulation takes effect across the EU. The Regulation on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC (the “Regulation”) specifies the technical measures of how Internet service providers, telecommunications providers and other public electronic communications service (“ECS”) providers must notify of data breaches.

article thumbnail

Is US Culture Veering Toward The Dark and Deadpan?

John Battelle's Searchblog

'The post Is US Culture Veering Toward The Dark and Deadpan? appeared first on John Battelle's Search Blog. ( image ) According to Wikipedia , “deadpan” is a uniquely American neologism less than a century old. The term arose from the slang term “pan,” for face: “Keep a dead pan,” a gangster told an associate in 1934′s The Gay Bride.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Federal Court Finds No Reasonable Expectation of Privacy in Computer Files Shared on a Public Network

Hunton Privacy

On August 1, 2013, the United States District Court for the District of Minnesota denied a criminal defendant’s motion to suppress, holding that the defendant had no reasonable expectation of privacy in computer files he shared on a peer-to-peer network. In U.S. v. Hoffman , police used a software program to monitor multiple peer-to-peer networks for IP addresses that investigators had previously identified as possibly associated with child pornography.

Privacy 40

More Trending

article thumbnail

Digital disruption - is technology disrupting us or are we disrupting with technology?

ChiefTech

'"The phrase ‘digital disruption’ is quite a misnomer because no technology truly disrupts unless it disrupts what we do and how we do it, not just what we do it with. This then begs the question: Is technology disrupting us or are we disrupting with technology?". Cross-posted from the DISRUPT.SYDNEY and Ripple Effect Group blogs.

IT 40
article thumbnail

else 8.19: Why We Should Replace the Turing Test

John Battelle's Searchblog

'The post else 8.19: Why We Should Replace the Turing Test appeared first on John Battelle's Search Blog. ( image ) Among many other things (we usually add 20-30 items into our book’s Evernote account each week), this past week we read about developments in brain-computer interfaces, and how connecting smart devices introduces new vulnerabilities.

Mining 94