Sat.Dec 01, 2012 - Fri.Dec 07, 2012

article thumbnail

Locked and Bloated

John Battelle's Searchblog

The post Locked and Bloated appeared first on John Battelle's Search Blog. ( image Vator News ) Companies get big. Companies gain market dominance. Companies slowly pivot from their original values. Companies justify those shifts with nods to shareholder value, or consistent user experience, or inconsistent implementations of their platforms by (former) partners.

article thumbnail

Mobile is eating the world

Collaboration 2.0

Mary Meeker's slide vividly depicts the relentless march of mobile OS into the heart of desktop QWERTY keyboard land.

Cloud 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rant: Apple OS X Server Upgrade Woes

JKevinParker

[ Update: I got my discs faster than I thought. ]. I love Apple products. I am not a zealot like some, as I am a Microsoft SharePoint Architect and I often have projects going on Linux or BSD Unix as well. But since MacBook Pros started shipping with dual core Intel processors, I have really enjoyed the powerful, elegant, and almost hassle-free computing environment.

Sales 45
article thumbnail

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if the article is paywalled, try this link (PDF) provided by NSC Group). A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”.

IT 43
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

One Less iPhone Purchased: Day One With The Nexus

John Battelle's Searchblog

The post One Less iPhone Purchased: Day One With The Nexus appeared first on John Battelle's Search Blog. I finally did it – I slipped the sim from my failing iPhone 4 into a shiny new Google Nexus last night. And damn, the thing just worked. And it’s So. Much. Better. But… there are things I wish it had. I figure I’ll take notes here, so folks can both learn from my experience, as well as tell me what an idiot I am help me out.

Cloud 96

More Trending

article thumbnail

German Federal Council Requests Revisions to the European Commission’s Cloud Computing Strategy

Hunton Privacy

On November 23, 2012, the German Federal Council ( Bundesrat or the “Council”) published its comments on the European Commission’s strategy on cloud computing and also submitted them to the Commission. The Council considers that the strategy in its current form does not deal adequately with several issues unique to cloud computing. These issues include: A lack of clear certification requirements and enforcement mechanisms in the draft General Data Protection Regulation (even though certification

Cloud 40
article thumbnail

Selling Federal Enterprise Architecture (EA)

Interactive Information Management

Selling Federal Enterprise Architecture A taxonomy of subject areas, from which to develop a prioritized marketing and communications plan to evangelize EA activities within and among US Federal Government organizations and constituents. Any and all feedback is appreciated, particularly in developing and extending this discussion as a tool for use – more information and details are also available.

Sales 40
article thumbnail

Another Thoughtful Personal Essay: Fragile

John Battelle's Searchblog

The post Another Thoughtful Personal Essay: Fragile appeared first on John Battelle's Search Blog. You know that phenomenon that happens – right after you first notice a pattern, you then start seeing it everywhere? Well, here’s another wonderful personal essay, again by a young(er) author (Nathan Kontny) involved in the tech world, this time about losing a friend with whom he worked.

IT 89
article thumbnail

California AG Sues Delta for Failure to Post a Privacy Policy on Its Mobile App

Hunton Privacy

On December 6, 2012, California Attorney General Kamala D. Harris announced a lawsuit against Delta Air Lines, Inc. (“Delta”) for violations of the California Online Privacy Protection Act (“CalOPPA”). The suit, which the Attorney General filed in the San Francisco Superior Court, alleges that Delta failed to conspicuously post a privacy policy within Delta’s “Fly Delta” mobile application to inform users of what personally identifiable information is collected and how it is being used by the co

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Settles Charges of “History Sniffing”

Hunton Privacy

On December 5, 2012, the Federal Trade Commission announced that the online advertising company Epic Marketplace, Inc. (“Epic”) agreed to settle charges that it engaged in “history sniffing” to secretly and illegally collect information about consumers’ interest in sensitive medical and financial issues. History sniffing is the practice of determining whether a consumer has previously visited a webpage by checking how a browser displays a hyperlink.

article thumbnail

Who Owns Social Media Accounts Used by Employees to Promote a Business?

Hunton Privacy

The Hunton Employment & Labor Perspectives Blog examines issues related to professional use of social media: who owns social media accounts, contacts and valuable consumer data when an employee resigns? Read the full blog entry.

Privacy 40
article thumbnail

FTC Issues Interim Final Rule Amending Red Flags Rule “Creditor” Definition

Hunton Privacy

On November 30, 2012, the Federal Trade Commission announced the issuance of an interim final rule (“Interim Final Rule”) that makes the definition of “creditor” in the FTC’s Identity Theft Red Flags Rule (“Red Flags Rule”) consistent with the definition contained in the Red Flag Program Clarification Act of 2010. The Red Flags Rule, which was initially promulgated in 2007, requires “financial institutions” and “creditors” to develop identity theft prevention programs that detect potential “red

article thumbnail

ENISA Publishes Report on the Right to Be Forgotten

Hunton Privacy

On November 20, 2012, the European Network and Information Security Agency (“ENISA”) published a new report entitled “ The Right to Be Forgotten – Between Expectations and Practice.” The report complements two earlier papers which focused on data collection and storage and online behavioral advertising , and focuses on the technical implications of the proposed General Data Protection Regulation’s new right to be forgotten.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New UK Online Behavioral Advertising Code Released

Hunton Privacy

On November 21, 2012, the UK Committee of Advertising Practice (“CAP”) released new rules on online behavioral advertising (“OBA”). CAP is the UK body which writes and maintains the UK advertising codes, which are administered and enforced by the UK Advertising Standards Authority (“ASA”). The New CAP Rules. The new OBA rules (contained in Appendix 3 of the CAP Code) contain four new requirements for marketers and third parties engaging in OBA.

article thumbnail

FCC Issues Declaratory Ruling on Opt-Out Confirmation Text Messages

Hunton Privacy

On November 29, 2012, the Federal Communications Commission (“FCC”) issued a declaratory ruling finding that certain text messages businesses send to confirm a consumer’s request to opt out of text message programs do not violate a federal prohibition on sending text messages without prior express consent. This prohibition has spawned class actions against companies that have followed the provisions in the Mobile Marketing Association’s U.S.

article thumbnail

Writing Every So Often: The Personal Essay Makes A Comeback

John Battelle's Searchblog

The post Writing Every So Often: The Personal Essay Makes A Comeback appeared first on John Battelle's Search Blog. Browsing Hacker News, which I’ll admit I don’t read very closely (because, well, I’m not a hacker), I saw an interesting headline: I quit Twitter for a month and it changed my thinking about mostly everything. Well, that’s going to get my attention.

IT 102