Sat.Aug 04, 2012 - Fri.Aug 10, 2012

article thumbnail

From “I” Space to “I” and “We” Space

ChiefTech

workspace design historically mirrored the organizational chart, with people jockeying to be as close as possible to the seat of all power – the CEO. But now that information revolution has made information the new seat of power, there is much more flexibility in workspace design. Historically, all sorts of technologies have impacted phyiscal workplace design.

111
111
article thumbnail

Here We Go Again: The Gray Market in Twitter and Facebook

John Battelle's Searchblog

So, casually reading through thi s Fast Company story about sexy femle Twitter bots , I come across this astounding, unsubstantiated claim: My goal was to draw a straight line from a Twitter bot to the real, live person whose face the bot had stolen. In the daily bot wars–the one Twitter fights every day, causing constant fluctuations in follower counts even as brands’ followers remain up to 48% bot –these women are the most visible and yet least acknowledged victims There is w

Marketing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Targeted social communication comes of age

Collaboration 2.0

With Facebook's first earnings call post IPO the digitally connected business world came of age, with hype to be replaced by alignment with the financial world's demand for demonstrated effectiveness.

article thumbnail

The Star Wars Pointer Scene and Information Architecture

JKevinParker

Have you ever noticed that a lot of movies that win the accolades of film critics are often difficult to follow? Many of them do poorly at the box office. But why is this so if they are so "good" according to the experts? One of the key reasons for the success of the Star Wars films is George Lucas' ability to tell a compelling story in a way the masses can understand.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

An Introduction to Work Objects via the DoubleDutch Blog

ChiefTech

1) Human interactions and engagement revolve around Social Objects 2) Social Objects also exist in the workplace (“Work Objects”), such as customers, projects, and products 3) The current dominant collaboration app in the enterprise, Email, does a poor job of organizing content and engagement around work objects. 4) Structure on the input side allows for superior data organization and analytics 5) This disconnect between email and work objects is a problem (for companies), and an opportunity (fo

More Trending

article thumbnail

FTC Fines Employee Background Screening Company $2.6 Million for Alleged FCRA Violations

Hunton Privacy

On August 8, 2012, the Federal Trade Commission announced a settlement agreement with employment screening company HireRight Solutions, Inc. (“HireRight”). In its first enforcement action against an employment background screening company for Fair Credit Reporting Act (“FCRA”) violations, the FTC alleged that HireRight functioned as a consumer reporting agency, but failed to comply with certain FCRA requirements.

article thumbnail

The National Archives of Latvia chooses Tessella and Tieto to preserve Latvia’s digital heritage

Preservica

I am pleased to announce that we will be working with the National Archives of Latvia who have become the thirteenth organisation to deploy Preservica SDB which is proving to be the long term preservation solution of choice in this demanding sector. read more.

article thumbnail

Sequestration Planning Benefits from Enterprise Architecture-Driven Value Engineering

Interactive Information Management

The next 5 months portend a spectacle of US Congressional battles to be waged ahead of the pending, mandatory “sequester” - automatic, mandatory federal government spending reductions of about $1 Trillion over 9 years, in non-exempt, discretionary appropriations, set to take effect 1/2/2013. Forward-thinking planners in government IT organizations, in large Programs that depend upon IT, and among the Systems Integration (SI) community are likely to dust off Enterprise Architecture skills for ana

article thumbnail

Word Cloud: Information Architecture Taxonomy

JKevinParker

I created an Information Architecture Taxonomy word cloud at www.wordle.net , built from the Information Architecture Taxonomy available at www.iainstitute.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Approves Facebook Privacy Settlement

Hunton Privacy

On August 10, 2012, the Federal Trade Commission announced that it has accepted the final settlement with Facebook which resolves allegations “that Facebook deceived consumers by telling them they could keep their information on Facebook private, and then repeatedly allowing it to be shared and made public.” As we previously reported , the settlement requires Facebook to (1) not misrepresent how it maintains the privacy or security of users’ personal information; (2) obtain users’ “affirmative e

Privacy 40
article thumbnail

Articles and Presentations

ChiefTech

I'm still in the process of migrating content from my old blog - for a consolidated list of my articles, presentations and papers please see this page.

Paper 40
article thumbnail

Is the new Regulation back on track?

Privacy and Cybersecurity Law

The Data Protection Regulation is potentially back on track after a major roadblock was resolved. Germany is reported to have agreed […].

40
article thumbnail

Word Cloud: ECM Glossary

JKevinParker

I created an ECM Glossary word cloud at www.wordle.

ECM 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NLRB Finds that Requesting Confidentiality in an On-Going Workplace Investigation Violates NLRA

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The National Labor Relations Board (“NLRB”) has again asserted its willingness to encroach upon employers’ long standing legitimate employment policies in a non-unionized workforce. In Banner Health System , 358 NLRB No. 93 (July 30, 2012), the Board held that a blanket policy prohibiting an employee from discussing an ongoing investigation violates section 8(a)(1) of the National Labor Relations Act.

IT 40
article thumbnail

When CICS and DB2 for z/OS Monitors Disagree (Part 1)

Robert's Db2

Today I'm writing about a situation that I first encountered almost 20 years ago, and which I most recently saw about three months ago: an organization with a CICS transaction workload accessing a DB2 for z/OS database reports a performance problem. The company's CICS people point to monitor data that indicate higher "wait for DB2" times when CICS transactions run long.

IT 48
article thumbnail

The Power of Being There

John Battelle's Searchblog

It’s been building for weeks – Friday marks the first day of the fifth annual Outside Lands festival here in San Francisco. Despite the demands of work and family, I try to get to as many festivals as I can – so far, I’ve managed to see Bonnaroo a few times, Coachella once (I’ll be back!), Austin City Limits , and a few others.

IT 84
article thumbnail

Divergent Results for Class Action Text Message Spam Suits

Hunton Privacy

In recent months we have seen a dismissal and two settlements in class action suits alleging violations of the Telephone Consumer Protection Act (“TCPA”) by companies that used text messaging as part of advertising campaigns. The TCPA is a federal privacy law that imposes restrictions on telephone solicitations, including telemarketing calls and text messages.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CFPB Indicates Intent to Regulate Service Providers to Financial Institutions

Hunton Privacy

Earlier this year, the Consumer Financial Protection Bureau (“CFPB”) published a Bulletin signaling its intent to regulate and exercise enforcement authority over service providers to financial institutions. Pursuant to Title X of the Dodd-Frank Wall Street Reform and Consumer Protection Act and its implementing regulation, Regulation P, the CFPB has authority over certain large banks, credit unions and other consumer financial services companies.