Sat.Jun 09, 2012 - Fri.Jun 15, 2012

article thumbnail

Apple To Kill Ping, Add Facebook

John Battelle's Searchblog

( image ) I know you all know that Apple has cut a deal to integrate Facebook , because of the relentless coverage of Apple’s developer conference this week. However, I just saw this story from ATD: Apple’s Ping to End With a Thud in Next Release of iTunes And thought to myself – “Hey, didn’t I predict that a while back?

IT 98
article thumbnail

Microsoft to marry Yammer

Collaboration 2.0

The old guard are marrying off upstart competitors into their product portfolios. B is he battle for supremacy among Microsoft, IBM, SAP and Oracle still relevant — and has it scarred long-term relationships with customers?

IT 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Embracing Mobile at the Australian Broadcasting Corporation

ChiefTech

Mobile 2012 Manuela Davidson View more presentations from CeBIT Australia via slideshare.net. Presentation by Manuela Davidson about the ABC's journey into mobile. Davidson advises: "Forget mobile phone, think mobile computing". Permalink.

52
article thumbnail

UK ICO Opens Public Consultation on Draft Anonymization Code of Practice

Hunton Privacy

On May 31, 2012, the UK Information Commissioner’s Office (“ICO”) published a draft anonymization code of practice (the “Code”) which will be open to public consultation until August 23, 2012. The purpose of the Code is to provide organizations with guidance on how personal data can be anonymized successfully, and how to assess the risk of individuals being identified using data that has been anonymized.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Do Not Track Is An Opportunity, Not a Threat

John Battelle's Searchblog

This past week’s industry tempest centered around Microsoft’s decision to implement “Do Not Track” (known as “DNT”) as a default on Internet Explorer 10, a browser update timed to roll out with the company’s long-anticipated Windows 8 release. Microsoft’s decision caught much of the marketing and media industry by surprise – after all, Microsoft itself is a major player in the advertising business , and in that role has been a strong proponen

More Trending

article thumbnail

The view from San Francisco

ChiefTech

via headshift.com.au. I was in San Francisco a few weeks ago for the excellent Atlassian Summit. I used some of my time there to catch up with some people from Netvibes, SAP, Socialcast and Yammer and over on the Headshift Asia Pacific blog I've written up my observations about that visit. Permalink.

40
article thumbnail

NTIA Launches Development Process for Privacy Code of Conduct for Mobile Apps

Hunton Privacy

On June 15, 2012, the National Telecommunications and Information Administration (“NTIA”) announced that, in response to a substantial number of comments it received regarding mobile privacy issues, it will convene its first multistakeholder meeting on July 12 to begin the process of developing a code of conduct that promotes transparency in the mobile application context.

Privacy 40
article thumbnail

Interoperability: Facilitating the Global Flow of Data

Hunton Privacy

As policymakers around the world consider revisions to existing privacy and data protection law, they often refer to “interoperability” as a mechanism to facilitate the flow of data across national and regional borders. Reports released this year by the Obama Administration and the Federal Trade Commission recognize the value of interoperability to the growth of the digital economy and improving privacy compliance.

Paper 40
article thumbnail

FCC Issues Revised Rules Curbing Telemarketing Calls and Text Messages

Hunton Privacy

On June 11, 2012, the Federal Communications Commission published in the Federal Register its final revised rules requiring prior express written consent for all autodialed or prerecorded telemarketing “calls” to wireless phones, and for prerecorded telemarking calls to residential lines. The FCC takes the position that the “calls” covered by this written consent requirement include essentially all marketing-oriented text messages.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Announces Settlements Relating to P2P Data Breaches

Hunton Privacy

On June 7, 2012, the Federal Trade Commission announced settlement agreements with two businesses that allegedly exposed customers’ sensitive personal information by allowing peer-to-peer (“P2P”) file-sharing software to be installed on their company computers and networks. In its complaint against Franklin’s Budget Car Sales (“Franklin”), a Georgia automobile dealership that also provides financing services to its customers, the FTC alleged that Franklin failed to implement reasonable security

article thumbnail

Matt Moore on Content Management Interoperability Services (CMIS)

ChiefTech

Content Management Interoperability Services (CMIS) is an emerging standard that allows compliant Enterprise Content Management (ECM) systems to share documents. This article discusses the reasons for the emergence of CMIS and outlines some of the key elements of the standard. It outlines the response by one vendor (Nuxeo) and the use of the CMIS by Dutch local government.

ECM 40
article thumbnail

FTC Fines Data Broker $800,000 for Alleged FCRA Violations

Hunton Privacy

On June 12, 2012, the Federal Trade Commission announced a settlement agreement with data broker Spokeo, Inc. (“Spokeo”). The FTC alleged that Spokeo operated as a consumer reporting agency and violated the Fair Credit Reporting Act (“FCRA”), and that certain of its advertisements were deceptive in violation of Section 5 of the FTC Act. The proposed settlement order imposes a $800,000 civil penalty on Spokeo and prohibits future violations of the FCRA.

Sales 40
article thumbnail

Webcast on Preparing for a New U.S. Privacy Landscape

Hunton Privacy

On May 24, 2012, Hunton & Williams LLP and Jordan Lawrence Group hosted a webcast on “ Preparing for a New U.S. Privacy Landscape: An Overview of the FTC and White House Frameworks.” The webcast featured Lisa J. Sotto , partner and head of the Global Privacy and Data Security practice at Hunton & Williams, Aaron P. Simpson , partner at Hunton & Williams, and Rebecca Perry, Executive Vice President of Professional Services of Jordan Lawrence Group.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Article 29 Working Party Issues Opinion on Cookie Consent Exemption

Hunton Privacy

On June 7, 2012, the Article 29 Working Party (the “Working Party”) adopted an Opinion analyzing the exemptions to the prior opt-in consent requirement for cookies. Although the Opinion focuses on cookies, the Working Party also notes that the same analysis applies to any technology allowing information to be stored or accessed on a user’s computer or mobile device.