Sat.Jan 28, 2012 - Fri.Feb 03, 2012

article thumbnail

It’s Not Whether Google’s Threatened. It’s Asking Ourselves: What Commons Do We Wish For?

John Battelle's Searchblog

If Facebook’s IPO filing does anything besides mint a lot of millionaires, it will be to shine a rather unsettling light on a fact most of us would rather not acknowledge: The web as we know it is rather like our polar ice caps: under severe, long-term attack by forces of our own creation. And if we lose the web, well, we lose more than funny cat videos and occasionally brilliant blog posts.

IT 111
article thumbnail

Sturgeon's law & the copyright vacuum

Collaboration 2.0

Your on the job contributions in collaborative environments are much more protected than elsewhere digitally, but getting credit for ideas is critical to continued use pattterns

69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Got LOBs? Get DB2 10 for z/OS (Part 1)

Robert's Db2

In my previous entry , I provided information pertaining to the amount of data that can be stored in a LOB column of a mainframe DB2 table (LOBs being DB2 data values that can exceed 32 KB in length). I made brief references in that entry to significant enhancements in LOB data management capabilities delivered via DB2 10 for z/OS. I'll describe those enhancements -- the most significant since LOB support was introduced with DB2 Version 6 -- in a multi-part entry, of which this is part 1.

Mining 48
article thumbnail

Chinese Ministry of Industry and Information Technology Issues New Data Protection Regulations

Hunton Privacy

The Ministry of Industry and Information Technology of the People’s Republic of China (the “MIIT”) recently issued a regulation entitled “Several Provisions on Regulating Market Orders of Internet Information Services” (the “New Regulations”). The New Regulations, which will take effect on March 15, 2012, include significant new data protection requirements applicable to Internet information service providers (“IISPs”).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do You Think The US Government Is Monitoring Social Media?

John Battelle's Searchblog

I had the news on in the background while performing morning ablutions. It was tuned to CBS This Morning – Charlie Rose has recently joined the lineup and my wife, a former news producer, favors both Rose and the Tiffany Network. But the piece that was running as I washed the sleep from my eyes was simply unbelievable. It was about the two unfortunate british tourists detained by Homeland Security over jokes on Twitter about “destroying America” (a colloquialism for partying &#

More Trending

article thumbnail

Anti-Spam Legislation – Coming “soon” to an inbox near you

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) was enacted in December 2010. Heard about it? It’s quite likely that you have, given its […].

IT 40
article thumbnail

UK and U.S. Regulators Introduce New Breach Guidance, Notification Forms

Hunton Privacy

In recent weeks, regulators in California and Illinois have issued guidance on responding to data security breaches, while UK and California authorities released online forms for organizations to use when providing notification of a breach to regulators. In December 2011, the UK Information Commissioner’s Office (“ICO”) released a new breach notification form , reinforcing its expectation that organizations provide notification whether or not such notification is legally required.

Privacy 40
article thumbnail

Facebook Files, Initial Thoughts

John Battelle's Searchblog

Not since Google’s 2004 filing have so many journalists sped-read one document at the same time, eager to glean any possible insight unique to their particular point of view or publication and rush to post it before anyone else. Yes, I’m one of those journalists, I suppose, but I know I have to read this thing for any number of reasons, so I may as well use the race as an excuse to force myself into action.

IT 90
article thumbnail

The dirty secret of browser security #1

Scary Beasts Security

Here's a curiousity that's developing in modern browser security: The security of a given browser is dominated by how much effort it puts into other peoples' problems. This may sound absurd at first but we're heading towards a world where the main browsers will have (with a few notable exceptions): Rapid autoupdate to fix security issues. Some form of sandboxing.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

In Which I Officially Declare RSS Is Truly Alive And Well.

John Battelle's Searchblog

I promise, for at least 18 months, to not bring this topic up again. But I do feel the need to report to all you RSS lovin’ freaks out there that the combined interactions on my two posts – 680 and still counting – have exceeded the reach of my RSS feed (which clocked in at a miserable 664 the day I posted the first missive). And as I said in my original post: If I get more comments and tweets on this post than I have “reach” by Google Feedburner status, well, that’s enough f

IT 88
article thumbnail

RSS Update: Not Dead, But On The Watch List

John Battelle's Searchblog

Since I posted my call to action last week, nearly 600 folks have raised their hands and told me they’re reading this site via RSS. That’s pretty good, given my actual request was buried under 500 words of rambling conjecture, and my Disqus commenting system went down for portions of the first day. Not to mention, my RSS feed has grown by about 90% since the last time I posted the request, yet the number of comments (plus Tweets and other responses) was three times higher.

IT 77
article thumbnail

The Facebook S1 as PDF, Should You Wish It

John Battelle's Searchblog

You know you want your very own Facebook S1 as a PDF document, right? If so, click this link, and it’s yours! Facebook S-1.

IT 85
article thumbnail

NLRB Releases Second Round of Guidance for Social Media Cases

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog , last week, the NLRB’s Acting General Counsel, Lafe Solomon, released a second report containing guidance relating to employee use of social media. This report comes less than six months after the release of the NLRB’s first report on the subject in August 2011. Like the August report , the new release summarizes a number of recent cases decided by the NLRB in which an employee was terminated at least in part because of his or h

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK ICO Encourages Voluntary Data Protection Audits and Advisory Visits

Hunton Privacy

Throughout 2011, the UK Information Commissioner’s Office (“ICO”) escalated its use of data protection audits, encouraging organizations to submit to voluntary audits and seeking to increase its ability to conduct compulsory audits. Currently, the ICO has the authority to compel central government departments to undergo audits, but it would like to extend compulsory audits to include local government, the national health service and the private sector.

article thumbnail

ICO Welcomes European Commission’s Proposed Data Protection Regulation Reforms

Hunton Privacy

On January 25, 2012, the European Commission released a data protection law reform package , including its proposed General Data Protection Regulation (the “Proposed Regulation”). The UK Information Commissioner’s Office (“ICO”) has reacted positively to the Proposed Regulation, in particular commending efforts to strengthen the rights of individuals, the recognition of important privacy concepts such as privacy by design and privacy impact assessments, and new accountability requirements to ens

article thumbnail

What Happens When Sharing Is Turned Off? People Don’t Dance.

John Battelle's Searchblog

One of only two photos to emerge from last night's Wilco concert, image Eric Henegen. Last night my wife and I did something quite rare – we went to a concert on a Sunday night, in San Francisco, with three other couples (Wilco, playing at The Warfield). If you don’t have kids and don’t live in the suburbs, you probably think we’re pretty lame, and I suppose compared to city dwellers, we most certainly are.

Big data 109
article thumbnail

Where Good Ideas Come From: A Tangled Bank

John Battelle's Searchblog

After pushing my way through a number of difficult but important reads, it was a pleasure to rip through Steven Johnson’s Where Good Ideas Come From: A Natural History of Innovation. I consider Steven a friend and colleague, and that will color my review of his most recent work (it came out in paperback last Fall). In short, I really liked the book.

Marketing 103
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

German DPAs Comment on Proposed EU Data Protection Law Reform

Hunton Privacy

On January 26, 2012, the German Data Protection Commissioners (“DPAs”) of the federal states Rhineland-Palatinate and Hesse held a joint press conference to present their views on the European Commission’s legislative proposal for a comprehensive reform of current EU data protection rules. The day before, the European Commission proposed replacing the existing EU Data Protection Directive 95/46/EC with a Regulation that would be directly applicable in all European Member States and therefore not

IT 40