Sat.Apr 05, 2014 - Fri.Apr 11, 2014

article thumbnail

What Is Google?

John Battelle's Searchblog

'The post What Is Google? appeared first on John Battelle's Search Blog. Every so often it’s fun to see what Google says about itself via its autocomplete function. For your enjoyment, a few choice images: The post What Is Google? appeared first on John Battelle's Search Blog.

IT 111
article thumbnail

You Saw It Here First: Information Governance Moves Beyond "Buzzword"

Positively RIM

Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Postal Bureau Issues Personal Information Protection Rules

Hunton Privacy

In March 2014, the State Postal Bureau of the People’s Republic of China (the “SPBC”) formally issued three rules (the “Rules”) establishing significant requirements regarding the protection of personal information: (1) Provisions on the Management of the Security of Personal Information of Postal and Delivery Service Users (the “Security Provisions”); (2) Provisions on the Reporting and Handling of Security Information in the Postal Sector (the “Reporting and Handling Provisions”); and (3) Prov

article thumbnail

Why Information Sharing Precedes Open Data - Coffee Talk

Interactive Information Management

The Agency Deputy CIO (DCIO), Enterprise Architect (EA), IT System/Security Manager (ITSM) and the Open Data Community Evangelist (ODCE) – Over Cafeteria Coffee The DCIO & ITSM at a table, talking about the annual IT budget status. The ODCE drifts over, recognizes the ITSM from a recent agency newsletter. ODCE – "Can I sit here? I wanted to talk to you about opening up data, freeing it, from your system to my Github group.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Else 4.7.14: So Much Information, Precious Little Insight

John Battelle's Searchblog

'The post Else 4.7.14: So Much Information, Precious Little Insight appeared first on John Battelle's Search Blog. Reading over my picks from the past week, I noticed a strong theme – we’re using more and more apps, creating more and more data, but we’re not setting the true value we might from connecting all the dots. Sure, the NSA is – and Facebook, Google, and other large platforms are as well.

More Trending

article thumbnail

Hunton’s Global Privacy and Cybersecurity Practice Tops Chambers Rankings

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Chambers and Partners has listed the firm’s Global Privacy and Cybersecurity practice in Band 1 in the 2014 Chambers Global guide. This is the sixth consecutive year the firm was top ranked in this category. In addition, the firm was newly ranked in the guide’s inaugural Europe-wide Data Protection section, premiering in the top-tier Band 1.

Privacy 40
article thumbnail

EU Data Retention Directive Invalidated

Hunton Privacy

On April 8, 2014, the European Court of Justice ruled that the EU Data Retention Directive is invalid because it disproportionally interferes with the European citizens’ rights to private life and protection of personal data. The Court’s ruling applies retroactively to the day the Directive entered into force. The Court criticized that the Directive: applies to all individuals, electronic communications and traffic data without differentiation, limitation or exception; does not contain objective

article thumbnail

Article 29 Working Party Issues Draft Contractual Clauses for Transfers from EU Data Processors to Non-EU Data Sub-Processors

Hunton Privacy

On March 21, 2014, the Article 29 Working Party (the “Working Party”) issued a Working Document containing draft ad-hoc contractual clauses for transfers of personal data from data processors in the EU to data sub-processors outside the EU (the “Working Document”). Standard contractual clauses (“SCCs”) are one of the mechanisms that provide a legal basis for complying with the EU restrictions on transferring personal data outside the EU.

article thumbnail

Federal Judge Rules on FTC’s Authority to Regulate Data Security

Hunton Privacy

On April 7, 2014, the U.S. District Court for the District of New Jersey issued an opinion in Federal Trade Commission v. Wyndham Worldwide Corporation , allowing the FTC to proceed with its case against the company. Wyndham had argued that the FTC lacks the authority to regulate data security under Section 5 of the FTC Act. The judge rejected Wyndham’s challenge, ruling that the FTC can charge Wyndham with unfair data security practices.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.