Sat.Feb 02, 2013 - Fri.Feb 08, 2013

article thumbnail

An Embarrassment of Pitches

John Battelle's Searchblog

The post An Embarrassment of Pitches appeared first on John Battelle's Search Blog. Man, sometimes you have to venture out onto the real web to realize how far much of the “professional sites” have to travel before they have a viable model. Case in point: The San Jose Mercury News. Today the paper (yeah, I’m calling it that) published an interesting-sounding piece entitled Silicon Valley job growth has reached dot-com boom levels, report says.

Paper 101
article thumbnail

Maintenance is the battleground, innovation the prize

Collaboration 2.0

'Rimini Street''s 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.

80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Choosing an Internet, Digital Interactive Marketing Services Partner - Interviews and RFP/RFIs

Interactive Information Management

How to evaluate your digital, interactive marketing partner, for local and regional businesses - particularly in the Washington DC and Northern Virginia marketing and advertising area. We'll put it out there – as you evaluate prospective partners like KME Internet Marketing to help with web marketing initiatives, gaining exposure for your business and driving new sales from the Internet, this is exactly what you should seek.

article thumbnail

Microsoft Research's Social Computing Symposium 2013

ChiefTech

The theme for Microsoft Research's Social Computing Symposium 2013 was on: "populations and topics we forget to discuss, often hiding in plain sight.". They have published recordings of almost all the sessions. While, I haven't watched all the recordings, these two stand out for me so far: Who’s not on Social Media by Zeynep Tufekci. We spend a lot of time thinking about the people who are using social media, but its important to consider those who aren't and why.

IT 43
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

European Commission Launches Cybersecurity Strategy and Draft Directive on Network and Information Security

Hunton Privacy

On February 7, 2013, the European Commission, together with the High Representative of the Union for Foreign Affairs and Security Policy, launched their cybersecurity strategy for the European Union (“Strategy”). As part of this Strategy, the European Commission also proposed a draft directive on measures to ensure a common level of network and information security (“NIS”) across the EU (the “Directive”).

More Trending

article thumbnail

CIOs must back technology innovation

CGI

CIOs must back technology innovation. ravi.kumarv@cgi.com. Thu, 02/07/2013 - 07:00. It can be damaging to talk about business innovation in technology terms. Unless you’re a company like Apple, which designs or manufactures technology products, your colleagues outside the IT department are likely to question your motivation. They’ll rightly assert that innovation is only legitimate when it supports the business goals.

article thumbnail

Cookies: the UK ICO perspective

Privacy and Cybersecurity Law

We’re now well past the UK grace period for cookie compliance. But what are companies actually doing about this? Are […].

article thumbnail

German Federal Office for Information Security Issues Guidance on Consumerization and BYOD

Hunton Privacy

On February 4, 2013, the German Federal Office for Information Security ( Bundesamt für Sicherheit in der Informationstechnik or “BSI”) published a paper (in German) providing an overview of the information technology risks inherent in consumerization and bring your own device (“BYOD”) strategies. The Paper responds to what the BSI views as a growing trend of employees making personal use of employer IT systems as well as using their personal IT devices for work purposes.

article thumbnail

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.

IT 33
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Singapore’s Personal Data Protection Commission Publishes Consultation Paper

Hunton Privacy

On February 5, 2013, Singapore’s new data protection agency, the Personal Data Protection Commission , published its first consultation paper (the “Paper”) articulating proposals for a data protection regulation. The Paper outlines the Commission’s positions on three key issues: (1) requests for access and correction; (2) transfer of personal data outside of Singapore; and (3) individuals who may act for others under the Personal Data Protection Act (“PDPA”).

article thumbnail

UK Court Rules Criminal Records Checks System Breaches Human Rights

Hunton Privacy

On January 29, 2013, the UK Court of Appeal ruled that the UK criminal records disclosure regime is disproportionate and incompatible with the UK Human Rights Act 1998 (the “Act”). The landmark judgment focused on the case of an appellant named “T,” who had received two “cautions” for stealing two bicycles when he was 11 years old. After a number of years, the appellant had to disclose these cautions twice in connection with required criminal records checks: first, at the age of 17, when he appl

Privacy 40
article thumbnail

Kmart Settles FCRA Class Action for $3 Million

Hunton Privacy

On January 25, 2013, Kmart Corporation (“Kmart”) agreed to a $3 million settlement stemming from allegations that it violated the Fair Credit Reporting Act (“FCRA”) when using background checks to make employment decisions. The FCRA addresses adverse actions taken against consumers based on information in consumer reports and includes numerous requirements relating to the use of such reports in the employment context.

Privacy 40
article thumbnail

California Ruling Finds Song-Beverly Act Does Not Apply to Online Transactions

Hunton Privacy

On February 4, 2013, the Supreme Court of California examined whether Section 1747.08 of the Song-Beverly Credit Card Act (“Song-Beverly”) prohibits an online retailer from requesting or requiring personal identification information from a customer as a condition to accepting a credit card as payment for an electronically downloadable product. In a split decision, the majority of the court ruled that Song-Beverly does not apply to online purchases in which the product is downloaded electronicall

Retail 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.