Sat.Jan 04, 2014 - Fri.Jan 10, 2014

article thumbnail

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

'The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. CES is a huge event, one that almost everybody in our industry has been to at least once, if not multiple times. I’ve been going for the better part of 25 years, so I’ve seen a lot of change. And after my first day here, the biggest takeaway I’m getting is a sense of deja vu.

article thumbnail

FTC Approves COPPA Parental Consent Mechanism Proposal

Hunton Privacy

On December 23, 2013, the Federal Trade Commission announced that it accepted a proposed mechanism , submitted by Imperium, LLC (“Imperium”), to obtain verifiable parental consent in accordance with the Children’s Online Privacy Protection Rule (the “COPPA Rule”) that came into effect July 1, 2013. The COPPA Rule requires operators of certain websites and online services to obtain a parent’s consent before collecting personal information online from a child under the age of 13.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Listen to Your Customers

CGI

Listen to Your Customers. shobana.lv@cgi.com. Thu, 01/09/2014 - 06:38. Why "Social Listening"? A few years ago, when the chief executive of a medium-sized consumer business mentioned to me in exasperation, “There are 130,000 fans for our brand in a Facebook group that we didn’t create. What do I do about them?” it provided a compelling justification for this question, "Why do Social Listening?".

article thumbnail

Data privacy: a look ahead at 2014

Privacy and Cybersecurity Law

So as the latest Snowdon revelations (oh … and the New Year Holiday fun has subsided) how about we look […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

else 1.6: “Ghosts in the machine”

John Battelle's Searchblog

'The post else 1.6: “Ghosts in the machine” appeared first on John Battelle's Search Blog. Back from the holiday break, we look at data’s influence on culture; glass, both as a material for transmitting bits, and as a wearable interface; and the (im)permanence of data. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

More Trending

article thumbnail

UK ICO to Investigate Only Serious or Repeat Violations

Hunton Privacy

On December 18, 2013, the UK Information Commissioner’s Office (“ICO”) published its proposed strategy for handling complaints, stating that, beginning in April 2014, it will focus its efforts on the investigation of serious and repeat violations of data protection laws. The ICO also intends to publish regular reports highlighting the number of complaints it receives about organizations and enforcement actions it has taken.

article thumbnail

UK ICO Publishes App Developer Guidance

Hunton Privacy

In December 2013, the UK Information Commissioner’s Office (“ICO”) issued non-binding guidance aimed at app developers (the “Guidance”). The Guidance applies to all types of mobile devices, including smart TVs and video game consoles. In the Guidance, the ICO emphasizes that the Data Protection Act 1998 (“DPA”) equally applies to mobile apps as it does to more traditional businesses.