Sat.May 11, 2013 - Fri.May 17, 2013

article thumbnail

Behind the Banner, A Visualization of the Adtech Ecosystem

John Battelle's Searchblog

'The post Behind the Banner, A Visualization of the Adtech Ecosystem appeared first on John Battelle's Search Blog. I’m very proud to announce “ Behind the Banner “, a visualization I’ve been producing Jer Thorp and his team from The Office for Creative Research , underwritten by Adobe as part of the upcoming CM Summit next week.

IT 111
article thumbnail

The business value of social

Collaboration 2.0

'Real time social initiatives are often hamstrung by old fashioned measurement and process paradigms'

94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

KM Australia 2013

ChiefTech

'Last year I attended Ark Group''s KM Australia in Sydney as part of a debate on capturing tacit knowledge using social technologies. This year I''m looking forward to attending as a participant, although you might also find me at different times helping out on the NSW KM Forum ''s "roundtable" that will be setup during the conference. This year''s line up includes representatives from organisations that include University of Oxford, United Nations Development Programme, US Army, U.S.

46
article thumbnail

China Proposes Amendments to Consumer Protection Law

Hunton Privacy

In April 2013, the People’s Republic of China’s General Office of the National People’s Congress published a draft amendment to the Law on the Protection of Consumer Rights and Interests (the “ Proposed Amendment”) and solicited public comments on the Proposed Amendment until May 31, 2013. The Proposed Amendment includes provisions that affect the collection and use of consumer personal information.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DB2 for z/OS Performance Tuning: the Rising Tide and the Home Run

Robert's Db2

I've been working with DB2 for z/OS for about 25 years. During most of that time, I've been actively engaged in performance tuning work -- specifically, performance tuning as it pertains to the CPU and elapsed time associated with application access to data in DB2-managed databases. I've learned that the best results, in terms of efficiency and throughput gains, are achieved via a two-pronged approach that I conceptualize as a rising tide and home runs.

Access 48

More Trending

article thumbnail

Open sourced intranets you can download

ChiefTech

'I like to keep my eyes open for alternative intranet technologies - here are a couple of new options to consider: DCMS Wordpress theme. The developers of the intranet for the Department for Culture, Media & Sport in the UK have open sourced their Wordpress theme. I originally blogged about the DCMS intranet back in March. City of Malmö intranet.

43
article thumbnail

UK Government Publishes Guidance on Submitting Evidence for the Consultation on Cybersecurity Standards

Hunton Privacy

On April 30, 2013, the UK government announced guidance on its consultation on cybersecurity standards (the ”Consultation”). The Consultation was launched in March 2013, and follows the UK government’s recent announcement regarding a cybersecurity partnership initiative to facilitate information-sharing on cyber threats. The Consultation invites organizations to submit evidence in support of their preferred organizational standard, be it a new standard, an existing standard or one standard compr

article thumbnail

When a porn site masquerades as the apple app store

Elie

The next time you think you’re buying an iOS app from Apple’s online store, be warned: it could be a lookalike site. Recently I was redirected via an ad to an Apple-spoofing site at Badoink.

IT 48
article thumbnail

The business value of social

Collaboration 2.0

'Real time social initiatives are often hamstrung by old fashioned measurement and process paradigms.

45
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do the Bring-Your-Own-Device (BYOD) benefits really add up?

ChiefTech

'From CFO magazine, an interesting financial perspective on the value of BYOD - quoting from a Nucleus Research paper they warn: "Companies can’t reap the full benefits of a bring-your-own-device policy for employees if they reimburse monthly voice and data charges. But the benefits may not be all that great anyway.". The basic argument here is that the productivity benefits claimed about BYOD are unsubstantiated and it typically doesn''t add up financially, unless companies shift part or all th

Paper 54
article thumbnail

UK Government Launches Cybersecurity Standards Call for Evidence

Hunton Privacy

In March 2013, the UK government launched its consultation on cybersecurity standards (the “Consultation”) following the government’s recent announcement regarding a cybersecurity partnership initiative to facilitate information sharing on cyber threats. Currently there are a number of different cybersecurity standards and guidance documents, and the government seeks to provide clarity to the private sector by endorsing one of the standards.

article thumbnail

FTC Reminds Companies of Impending COPPA Deadline

Hunton Privacy

On May 15, 2013, the Federal Trade Commission announced that it sent educational letters to over 90 businesses that appear to collect personal information from children under the age of 13, reminding them of the impending July 1 deadline for compliance with the updated Children’s Online Privacy Protection Rule (the “Rule”). The letters were sent to domestic and foreign companies that may be collecting information from children that is now considered “personal information” under the Children’s On

article thumbnail

UK ICO Report Highlights Uncertainty on Cost of Data Protection Reform

Hunton Privacy

On May 14, 2013, London Economics published the results of an independent survey commissioned by the UK Information Commissioner’s Office (“ICO”) to help understand the challenges that the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”) may present to UK businesses (the “Report”). The Report highlights a lack of understanding of the Proposed Regulation by UK businesses.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Obama Administration Considering Electronic Surveillance Proposal to Address “Going Dark” Problem

Hunton Privacy

The Obama Administration is in the process of finalizing its review of a statutory electronic surveillance proposal initially developed by the FBI, and is expected to support the introduction of a modified version as legislation. The proposal addresses concerns raised by law enforcement and national security agencies regarding the widening gap between their legal authority to intercept real-time electronic communications pursuant to a court order, and the practical difficulties associated with a

article thumbnail

Sotto Speaks on CBS News on the Right to Be Forgotten

Hunton Privacy

On May 10, 2013, CBS News interviewed two cybersecurity authorities to discuss the growing debate of privacy online. In the feature, entitled “ Should there be a ‘right to be forgotten’ online? ,” Lisa J. Sotto , partner and head of the Privacy and Data Security practice at Hunton & Williams LLP, talked about the problem of individuals’ rights to delete their online activity.

Privacy 40
article thumbnail

The business value of social

Collaboration 2.0

'Real time social initiatives are often hamstrung by old fashioned measurement and process paradigms.

40