Sat.Jul 26, 2014 - Fri.Aug 01, 2014

article thumbnail

It’s Time For Twitter To Filter Our Feeds. But How?

John Battelle's Searchblog

'The post It’s Time For Twitter To Filter Our Feeds. But How? appeared first on John Battelle's Search Blog. ( image ). “We don’t put an algorithm between you and your feed,” – Twitter exec Adam Bain, March 2013. “Please do.” Me, today. Twitter has always appealed to tinkerers, to makers, to the people who first took up blogging, who championed RSS and HTML in the early days – you know, the people who created the open web.

article thumbnail

Isolating DB2 for z/OS Accounting Data at the WebSphere Application Level

Robert's Db2

Back in the 1990s, almost all of the DB2 for z/OS-accessing transactional applications I encountered were of the CICS variety. Often, a given DB2 subsystem served as the database manager for multiple CICS-based applications. In such cases, isolation of DB2 accounting information (i.e., database activity figures obtained from DB2 accounting trace records) at the application level was not difficult.

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

European Commission Announces EU-Wide Logo and Data Protection Impact Assessment Process for RFID Systems

Hunton Privacy

On July 30, 2014, the European Commission announced two new EU standards to help users of Radio Frequency Identification (“RFID”) smart chips and systems comply with both EU data protection requirements and the European Commission’s 2009 Recommendation on RFID. Among other suggestions, the Recommendation discussed the development of a common European symbol or logo to indicate whether a product uses a smart chip.

Retail 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NewCo Sizzle Reel, SF Sked Are Up!

John Battelle's Searchblog

'The post NewCo Sizzle Reel, SF Sked Are Up! appeared first on John Battelle's Search Blog. It’s hard to describe what it’s like to attend a NewCo till you’ve been to one, but this video, below, should certainly help. It comes right on the heels of NewCo’s SF schedule going up , which for those of you who’ve never been is like announcing the lineup at Bonnaroo for those of us in the NewCo world.

IT 96

More Trending

article thumbnail

How to appraise Hearthstone card values

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

FTC Seeks Public Comment on Telemarketing Sales Rule

Hunton Privacy

On July 31, 2014, the Federal Trade Commission published a notice in the Federal Register indicating that it is seeking public comment on its Telemarketing Sales Rule (“TSR”) as “part of the FTC’s systematic review of all current Commission regulations and guides.” In the press release accompanying the Federal Register notice, the FTC stated that its questions for the public focus on (1) the use and sharing of pre-acquired account information in telemarketing, and (2) issues raised by the use of

Sales 40
article thumbnail

Delaware Enacts New Data Destruction Law

Hunton Privacy

On July 1, 2014, Delaware Governor Jack Markell signed into law a bill that creates new safe destruction requirements for the disposal of business records containing consumer personal information. The new law requires commercial entities conducting business in Delaware to take reasonable steps to destroy their consumers’ “personal identifying information” prior to the disposal of electronic or paper records.

article thumbnail

Nominate Hunton’s Privacy Blog for the ABA Blawg 100 Amici

Hunton Privacy

Once again, the American Bar Association Journal is compiling its annual list of the 100 best legal blogs , and readers are invited to nominate blawgs they “read regularly and think other lawyers should know about.” We would appreciate you showing your support by submitting a nomination for Hunton & Williams’ Privacy and Information Security Law Blog.

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK House of Lords Sub-Committee Criticizes the “Right to Be Forgotten”

Hunton Privacy

The EU Sub-Committee on Home Affairs, Health and Education of the UK House of Lords has published its Second Report for 2013-14, entitled EU Data Protection Law: A ‘Right to Be Forgotten’? (the “Report”). The Report summarizes the findings of the Sub-Committee’s investigation into the right to be forgotten, and was triggered in large part by the European Court of Justice’s (“ECJ’s”) decision in Google v.