Sat.Mar 09, 2013 - Fri.Mar 15, 2013

article thumbnail

Who Owns The Right to Filter Your Feed?

John Battelle's Searchblog

The post Who Owns The Right to Filter Your Feed? appeared first on John Battelle's Search Blog. (image) Last week I was in Salt Lake City for the Adobe Summit, on a stage the size of a parking lot. After some opening remarks about how the world is increasingly lit with data, I brought out Adam Bain, President of Global Revenue for Twitter. (He Vined it, natch.

IT 110
article thumbnail

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

111
111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 95
article thumbnail

The latest version of award winning technology now available

Preservica

I am excited to announce the release of the latest version award winning SDB technology, SDB4.3.1 now available. So what’s in the new in this version 4.3.1? Advanced Search Filtering allowing complex queries using metadata and content. Improved user interface for reviewing the audit trail. Generic metadata viewing to allow the use of any metadata schema.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

I’ve Turned Full Feeds Back On

John Battelle's Searchblog

The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog. I heard you all , and I just made my RSS feed full text and images again. Thanks for all your feedback, and we’ll just have to live with the fraudsters. Till we don’t. Which will probably be never! The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog.

71

More Trending

article thumbnail

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email. However, the Financial Times reports that Atos are making progress: "Almost two years on, zero email has not only begun to take hold within Atos, but the initiative has attracted interest from a growing number of business leaders.". (Sorry, the link above might get paywalled when you click on it).

IT 75
article thumbnail

German Ministry Publishes Draft Law for Cybersecurity Breach Notification

Hunton Privacy

On March 5, 2013, the German Federal Ministry of the Interior published proposed amendments (in German) to the German Federal Office for Information Security Law. These proposed amendments are significant because they establish a new duty to notify the German Federal Office for Information Security in the event of a cybersecurity breach. The proposed amendments apply only to operators of critical infrastructure in the energy, IT and telecommunications, transport and traffic, health, water, food,

article thumbnail

Google Reader is dead tech walking

ChiefTech

The moment some of us have been dreading. Google quietly announce : "We launched Google Reader in 2005 in an effort to make it easy for people to discover and keep tabs on their favorite websites. While the product has a loyal following, over the years usage has declined. So, on July 1, 2013, we will retire Google Reader. Users and developers interested in RSS alternatives can export their data, including their subscriptions, with Google Takeout over the course of the next four months.".

IT 55
article thumbnail

What's coming in IBM Connections 4.5

ChiefTech

Luis Benitez's slides from IBM Connect 2013 with more detail about Connections 4.5 have now been published: ID301 - What’s Coming in IBM Connections from Luis Benitez. Luis explains that IBM Connections now comes in 3 flavours: IBM Connections Suite 4.5 - social + content + unified communications (this is what I'll demo tomorrow). IBM Connections Content Manager 4.5 - social + content.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

49
article thumbnail

Case study: The Hub by SAS

ChiefTech

SAS launched The Hub, based on Socialcast , in 2011. In a case study they explain that SAS had a number of requirements, including: "All communications would have to be maintained behind the firewall (for security reasons) while seamlessly integrating with other internal business systems such as SharePoint.". That is, Socialcast was deployed on premise (unlike Yammer and similar solutions, which offer a cloud-only deployment model).

article thumbnail

Disclosure of Cybersecurity Risks in SEC Filings on the Rise

Hunton Privacy

As reported in The Washington Post , large financial institutions are increasingly disclosing cyber attacks, and potential vulnerability to cyber threats, in their annual reports filed with the Securities and Exchange Commission. Numerous banks disclosed such attacks in their 2012 reports, even in cases where the ongoing threat of the attacks did not result in any material harm to the institution.

article thumbnail

Google Enters into Multi-State Wi-Fi Settlement

Hunton Privacy

On March 12, 2013, Connecticut Attorney General George Jepsen announced that a coalition of 38 states had entered into a $7 million settlement with Google Inc. (“Google”) regarding its collection of unsecured Wi-Fi data via the company’s Street View vehicles between 2008 and 2010. The settlement is the culmination of a multi-year investigation by the states that we first reported on in 2010.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ICO Opens Public Consultation on Proposed Code of Practice for the UK Press

Hunton Privacy

The UK Information Commissioner’s Office has opened a public consultation on a proposed code of practice for the press (the “Consultation”). Pursuant to Section 51 of the UK Data Protection Act 1998 (the “DPA”), the ICO has the authority to issue industry codes of practice. On November 29, 2012, Lord Justice Leveson published a report on his inquiry into the culture, practices and ethics of the UK press.

IT 40
article thumbnail

FTC Releases Report on the Increased Use of Mobile Payments

Hunton Privacy

On March 8, 2013, the Federal Trade Commission issued a staff report entitled Paper, Plastic… or Mobile? An FTC Workshop on Mobile Payments (the “Report”). The Report is based on a workshop held by the FTC in April 2012 and highlights key consumer and privacy issues resulting from the increasingly widespread use of mobile payments. Although the FTC recognizes the benefits of mobile payments, such as ease and convenience for consumers and potentially lower transaction costs for merchants, the Rep

Privacy 40
article thumbnail

Massachusetts Court Ruling Benefits Plaintiff in Zip Code Case

Hunton Privacy

On March 11, 2013, in Tyler v. Michaels Stores, Inc. , the Massachusetts Supreme Judicial Court effectively reinstated the suit against the retailer by answering favorably for the plaintiff three certified questions from the United States District Court for the District of Massachusetts regarding Massachusetts General Laws Chapter 93, Section 105(a) entitled “Consumer Privacy in Commercial Transactions” (“Section 105(a)”).

Retail 40
article thumbnail

UK Court of Appeal Overturns Damages Award for Inaccurate Credit Reference Records

Hunton Privacy

On February 20, 2013, the UK Court of Appeal issued its decision in Smeaton v Equifax Plc , [2013] EWCA Civ 108 , overturning an award of damages to an individual about whom a credit reference agency had maintained an inaccurate record. Facts of the Case. In 2001, a bankruptcy order was made against the claimant, but this order was later rescinded. At that time, the credit reference agency, Equifax, did not have a way to automatically check for changes to bankruptcy orders, such as withdrawal or

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.