Sat.May 25, 2013 - Fri.May 31, 2013

article thumbnail

A Berkeley Commencement Speech, Some Years Ago…

John Battelle's Searchblog

'The post A Berkeley Commencement Speech, Some Years Ago… appeared first on John Battelle's Search Blog. Last week LinkedIn asked me to post a commencement speech , if I had given one, as part of a series they were doing. Turns out, I’ve given two, but the one they wanted was at Berkeley, my alma mater. If you want to read the one I gave at my high school, I’d be happy to post it (I think it’s better), but since I already have the Berkeley one at the ready, here it i

article thumbnail

Ego 2.0 and the tragedy of the shrinking digital commons

Collaboration 2.0

'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done'

85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Government disrupted

ChiefTech

'I first got involved with the Government 2.0 conversation in 2009 , but a lunch time discussion the other day reminded me that the arc of change on that particular wave of change has come to an end here in Australia. This does not mean that Government 2.0 failed or has finished in Australia, but rather the nature and purpose of the conversation has shifted.

article thumbnail

French Data Protection Authority Launches Public Consultation on Digital Right to Be Forgotten

Hunton Privacy

On May 30, 2013, the French Data Protection Authority (“CNIL”) launched a public consultation on the digital “right to be forgotten.”. The CNIL recalled that the principle of a digital “right to be forgotten” is established in the Proposed EU Data Protection Regulation and that this new right will have to be exercised in accordance with freedom of expression, freedom of the press and the duty of remembrance.

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Full First Day of CM Summit, In One Place

John Battelle's Searchblog

'The post The Full First Day of CM Summit, In One Place appeared first on John Battelle's Search Blog. Thanks to our sponsor Google, we got the full first day of last week’s CM Summit, featuring Fred Wilson fresh from the Tumblr deal, Pinterest CEO Ben Silbermann, and about 20 speakers in between for your viewing pleasure. Enjoy! The post The Full First Day of CM Summit, In One Place appeared first on John Battelle's Search Blog.

More Trending

article thumbnail

Ego 2.0 and the tragedy of the shrinking digital commons

Collaboration 2.0

'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done.

49
article thumbnail

Hunton & Williams LLP’s Global Privacy and Data Security Practice Tops Chambers Rankings

Hunton Privacy

Hunton & Williams LLP is pleased to announce the firm’s global Privacy and Data Security practice again ranked in “Band 1” in 2013 Chambers USA , Chambers Global and Chambers UK. Global practice group leader Lisa Sotto , who was recently named among The National Law Journal’s “The 100 Most Influential Lawyers in America,” was recognized in Chambers USA as a “Star” performer, the guide’s highest ranking.

Privacy 40
article thumbnail

Mandatory Data Breach Notification Bill Proposed in Australia

Hunton Privacy

On May 29, 2013, a bill , accompanied by an explanatory memorandum , was proposed in the Australian Parliament that requires businesses and government agencies that experience a serious data breach to notify affected individuals and the Office of the Australian Information Commissioner (“OAIC”). The proposed legislation requires organizations to notify individuals only when they are “significantly affected” by a “serious” data breach.

article thumbnail

Article 29 Working Party Proposes a Definition and Provision on Profiling Within the Proposed EU General Data Protection Regulation

Hunton Privacy

On May 13, 2013, the Article 29 Working Party (the “Working Party”) adopted an Advice Paper on profiling (the “Advice Paper”). The Advice Paper serves as the national data protection authorities’ contribution to the ongoing legislative debate before the European Parliament and the Council of the European Union on the proposed EU General Data Protection Regulation (the “Proposed Regulation”).

Paper 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Privacy Piracy Radio Interview on Cybersecurity with Sotto

Hunton Privacy

On June 3, 2013, Privacy Piracy host Mari Frank will interview Lisa J. Sotto , partner and head of the Global Privacy and Data Security practice at Hunton & Williams LLP, on KUCI 88.9 FM radio in Irvine, California. Listen to the latest developments in cybersecurity, including legal issues businesses should consider when dealing with cybersecurity threats and the types of information being targeted.

article thumbnail

Ego 2.0 and the tragedy of the shrinking digital commons

Collaboration 2.0

'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done.

40