Sat.Jul 06, 2013 - Fri.Jul 12, 2013

article thumbnail

A Social, Elastic Model for Paid Content

John Battelle's Searchblog

'The post A Social, Elastic Model for Paid Content appeared first on John Battelle's Search Blog. I was interested to read today that Esquire is currently experimenting with a per-article paywall. For $1.99, you can read a 10,000-word piece about a neurosurgeon who claims to have visited heaven. Esquire’s EIC on the experiment: “… great journalism—and the months that go into creating it—isn’t free.

Sales 109
article thumbnail

The great convergence

Collaboration 2.0

'Talking SMAAC and actually achieving business goals are two very different things as digital business needs mature'

89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wolters Kluwer swaps a static intranet for an enterprise social network

ChiefTech

'The idea of replacing a traditional or static intranet with enterprise social network is an idea that has been floating around for sometime. However, opinion is quite divided - some will tell you can''t and shouldn''t be done, while others will urge you on to just do it. In this case study global information services and publishing company, Wolters Kluwer group, made a deliberate decision to replace their intranet with Yammer.

IT 67
article thumbnail

Stored Communications Act Can Apply to Reading Personal Emails on a Former Employee’s Company-Issued Device

Hunton Privacy

On June 5, 2013, the United States District Court for the Northern District of Ohio denied an employer’s motion to dismiss, holding that the Stored Communications Act (“SCA”) can apply when an employer reads a former employee’s personal emails on a company-issued mobile device that was returned when the employment relationship terminated. The defendants, Verizon Wireless (“Verizon”) and the manager who allegedly read the plaintiff’s emails, argued that the SCA applies only to computer hacking sc

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Brand Pride

John Battelle's Searchblog

'The post Brand Pride appeared first on John Battelle's Search Blog. The Citi float at the Pride Parade in New York. About 200 Citi employees marched behind the float, many riding “Citibikes,” one of Citi’s most visible marketing programs in NYC. Last week I was fortunate to be in New York City over the weekend, accompanied by most of my family.

More Trending

article thumbnail

Rentokil Initial's Google Sites intranet

ChiefTech

'This post is part of series looking at alternative intranets, using cloud-based platforms, like Google Apps and Salesforce. Rentokil Initial (RI) is a 110-year old company, which now employs over 60,000 employees in over 60 countries across Europe, North America, Asia Pacific and Africa. They were a early adopter of Google Apps and also use other hosted solutions in its business, such as Workday SaaS for HR, ServiceNow cloud-based services for automating IT operations, SAP’s Ariba for procureme

Cloud 49
article thumbnail

HHS Announces 1.7 Million Dollar Settlement with WellPoint for Potential HIPAA Privacy and Security Rule Violations

Hunton Privacy

On July 11, 2013, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $1.7 million settlement with WellPoint Inc. following a security breach that affected over 600,000 individuals. The WellPoint settlement relates to an Internet-based application database that was not properly secured, resulting in the online exposure of health insurance applicants’ electronic protected health information (“ePHI”), including names, addresses and Social Security numbers, for

Privacy 40
article thumbnail

Getting Value from New Data Sources in Policing – Part 1, Citizen Engagement

CGI

Getting Value from New Data Sources in Policing – Part 1, Citizen Engagement. ravi.kumarv@cgi.com. Thu, 07/11/2013 - 08:00. In June, I presented at the UK Police Strategy Forum on ‘ Gaining value from your data & leveraging new data sources’, so I thought I’d share a few of my own observations from the event. The 2 days brought together Chief Constables, Chairs, Chief Execs, Chief Tech Officers, and Heads of Department from Police Authorities across the UK, including some of the UK’s biggest

article thumbnail

The great convergence

Collaboration 2.0

'Talking SMAAC and actually achieving business goals are two very different things as digital business needs mature.

40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Halfway Into 2013, How’re The Predictions Doing?

John Battelle's Searchblog

'The post Halfway Into 2013, How’re The Predictions Doing? appeared first on John Battelle's Search Blog. Over the past few years I’ve taken to reviewing my annual predictions once half the year’s gone by. This weekend I realized exactly that had occurred. It’s been quite a six months, I must say. Personally I took back the reigns at a company I founded in 2005, found a co-author for my book, and hired a CEO for the company I started last year (he starts next week).

article thumbnail

Colombia Issues Data Protection Regulations

Hunton Privacy

On June 27, 2013, the Colombian Ministry of Commerce, Industry and Tourism issued regulations pursuant to the country’s new data protection law. The regulations, entitled Decreto Número 1377 de 2013, por el cual se reglamenta parcialmente la Ley 1581 de 2012 , address a variety of topics, including the following: Consent requirements relating to the collection of personal data; Restrictions on the processing of children’s personal data; Content and delivery of privacy notices; Cross-border data

article thumbnail

Swiss DPA Issues Its 20th Annual Report

Hunton Privacy

On June 28, 2013, the Swiss Federal Data Protection and Information Commissioner (“FDPIC”) issued its 20th annual Report of Activities (the “Report”), highlighting the FDPIC’s main activities during the period from April 2012 to March 2013. The Report is available in French and in German, and the FDPIC also has prepared a summary of the Report in English.

IT 40
article thumbnail

The great convergence

Collaboration 2.0

'Talking SMAAC and actually achieving business goals are two very different things as digital business needs mature.

40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.