Sat.Oct 25, 2014 - Fri.Oct 31, 2014

article thumbnail

My NewCo Los Angeles Picks

John Battelle's Searchblog

'The post My NewCo Los Angeles Picks appeared first on John Battelle's Search Blog. I love LA. There, I said it. Yes, I made my entire career and life up here in the Bay Area, and the Dodgers bother me immensely. But I was born in LA, I grew up there, and every time I get back, I get homesick for the light, the warm air, the heady nonsense, and – lately – the extraordinary business culture that’s been brewing these past five or ten years.

IT 86
article thumbnail

Software Robots – friend or foe?

CGI

Software Robots – friend or foe? p.butler@cgi.com. Fri, 10/31/2014 - 04:00. Robotics are not new. They have existed in manufacturing for many years and their potential has been showcased again by Honda in the form of New ASIMO , which I personally think is a fantastic piece of engineering. But what are software robots? Software Robots, or Robotic Process Automation to use its correct name, is the “application of technology that allows employees in a company to configure computer software or a ‘

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FCC Announces Intended $10 Million Fine in First Data Security Case

Hunton Privacy

On October 24, 2014, the Federal Communications Commission announced that it intends to impose a $10 million fine on TerraCom, Inc. (“TerraCom”) and YourTel America, Inc. (“YourTel”) for violating privacy laws relating to their customers’ personal information. This announcement marks the FCC’s first enforcement action in the data security arena as well as its largest privacy action to date.

article thumbnail

ARMA's Morph to IG Positive

Positively RIM

ARMA International is all-in on Information Governance. I am not privy to ARMA Board meetings, nor have I talked about this with the staff HQ. But walking into the annual conference in San Diego this week, the switch from RIM to IG was inescapable. Traditionalists may bemoan the blurring focus, seeing it as a dilution of discipline or a paean to fashionable modernity.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Else 10.27.14 – Assange Takes on Google

John Battelle's Searchblog

'The post Else 10.27.14 – Assange Takes on Google appeared first on John Battelle's Search Blog. ( image ) So what are the most powerful, important, noteworthy stories of the past ten or so days? Read on to find out… Assange: Google Is Not What It Seems – Newsweek. Julian Assange veers between wild eyed conspiracy theory and, well, level-headed conspiracy theory in this rather factless but quite compelling read.

IT 83

More Trending

article thumbnail

FCC Joins the Global Privacy Enforcement Network

Hunton Privacy

On October 28, 2014, the Federal Communications Commission announced that it has joined the Global Privacy Enforcement Network (“GPEN”), a network of approximately 50 privacy enforcement authorities from around the world. The FCC is the second U.S. privacy enforcement authority to join GPEN. The other U.S. member, the Federal Trade Commission, helped establish the network in 2010.

Privacy 40
article thumbnail

Toward Goals

Positively RIM

ARMA 2014 – the conference and expo – met in San Diego this week. Here's my initial impression and a differentiator from past meetings: More devotees of Records & Information Management/Governance now recognize that their efforts must enhance and support movement toward their organizations’ goals. In the private sector, that generally means contributing to black ink on the balance sheet.

article thumbnail

UK Government Seeks Stronger Enforcement Powers Against Nuisance Callers and Texters

Hunton Privacy

The UK government has announced proposals designed to make it easier for the Information Commissioner’s Office (“ICO”) to fine companies responsible for nuisance calls and text messages. Under the proposals, the current maximum fine of £500,000 would remain unchanged, but the threshold for imposing fines would be lowered. The rules regarding nuisance calls and texts in the UK are contained in the Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) and are enforced by t

article thumbnail

Council of the European Union Proposes Risk-Based Approach to Compliance Obligations

Hunton Privacy

The Council of the European Union has published proposed revisions to the compliance obligations of data controllers and data processors included in Chapter IV of the forthcoming EU General Data Protection Regulation (“Regulation”). This proposal was led by the current Italian Presidency and the revisions reflect input from representatives of the national governments of the EU Member States.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

California Attorney General Releases New Report with Findings and Recommendations on 2013 Data Breaches

Hunton Privacy

On October 28, 2014, California Attorney General Kamala D. Harris announced the release of the second annual California Data Breach Report. The report provides information on data breaches reported to California’s Attorney General in 2012 and 2013. Overall, 167 breaches were reported by 136 different entities to California’s Attorney General in 2013.