Sat.Jun 16, 2012 - Fri.Jun 22, 2012

article thumbnail

When You’re Stuck, Go Out And Talk To People

John Battelle's Searchblog

Yay! It's a nameless hotel ballroom! But the people who fill it are what matter. I had one of those kind of days yesterday that reaffirm my belief in our industry, in its people, and in the work I do. It’s not easy to sit here and write, much less write a book, and I’ll admit lately my faith (and my productivity) has flagged – there’s so much work left to do, so little time in which to do it, and so many other things – Federated Media, conferences, board positio

article thumbnail

The social life of email at Enron - a new study

ChiefTech

Probaby one of the few positive things to come out of the Enron scandle was that it gifted social scientists a data set of real corporate email that could be analysed for research purposes. A recent study [PDF] used this data to look at 'gossip'. Now hang on for a second before you jump to conclusions, lets define what we mean here. Anthropologists define gossip as: "the absence of a third party from the conversation [and it] is fundamental to healthy societies—from small groups to large,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Article 29 Working Party Issues Opinion on Processor Binding Corporate Rules

Hunton Privacy

On June 6, 2012, the Article 29 Working Party (the “Working Party”) adopted WP 195 (the “Opinion”) setting out the requirements for Binding Corporate Rules (“BCRs”) for processors. Similar to WP 153 , the Opinion lists the requirements to be covered in the processor BCRs application form and the BCRs document itself. The Opinion likely will be welcomed by processors, in particular those that provide large-scale, multinational data processing services.

article thumbnail

How can we keep big video content safe?

Preservica

Good to see that format obsolescence not just media obsolescence is covered here [link]. I think it is one of the most overlooked challenges. Managed Migration of information to more modern formats is a key defence to preserve information. Key issues for managed migration can be found at [link].

IT 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google’s Transparency Report: A Good And Troubling Thing

John Battelle's Searchblog

A couple of days ago Google released its latest “ Transparency Report ,” part of the company’s ongoing commitment to disclose requests by individuals, corporations, and governments to change what users see in search results and other Google properties such as YouTube. The press coverage of Google’s report was copious – far more than the prior two years, and for good reason.

More Trending

article thumbnail

FTC and FCC Revising Guidance on Mobile Privacy

Hunton Privacy

On May 30, 2012, the Federal Trade Commission hosted a public workshop addressing the need for new guidance on advertising and privacy disclosures online and in mobile environments. During the workshop, the FTC announced that it hopes to release an updated version of its online advertising disclosure guidance this fall that would incorporate input from businesses and consumer advocates.

Privacy 40
article thumbnail

Article 29 Working Party adopts document on BCRs for processors

Privacy and Cybersecurity Law

Following our recent blog post, the Article 29 Working Party has adopted a document (WP195) on Binding Corporate Rules (“BCRs”) for processors […].

40
article thumbnail

Four Letter Words

John Battelle's Searchblog

If you’ve been following this site for a while, you’ll remember my experiment earlier this year with posting pictures of wine, bike rides, and other “life” things. Many of you liked those posts, others, not so much. (Here’s one example.) My reason for posting these photos was pretty simple – I prefer to have my content emanate from my own site, rather than be bound to Facebook, Pinterest, Instagram or some other third-party walled garden.

IT 68
article thumbnail

You do need a strategy for your enterprise social network, says Yammer

ChiefTech

via blog.yammer.com. A great post from Stephen Danelutti at Yammer explaining why even if you use viral adoption as a catalyst to get started, you still need a strategy: "The ease of use and virality of a platform like Yammer can be deceivingly simple and lead people to think that a deliberate strategy is not necessary. That’s a mistake, because without direction and an end goal in mind, the network will simply meander and fail to deliver business value.".

56
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Tony Byrne: Enterprise social software is not all the same

ChiefTech

When evaluating [enterprise social software], it's best not to create "checkbox RFPs" that allow vendors check off all the features they provide, Byrne said. Rather, ask how they address those requirements, seeking to tease out details on the differences between platforms. Focusing too much on software features is a mistake, when you really should be trying to identify a match for the specific types of collaboration you want to facilitate.

IT 54
article thumbnail

Dion Hinchliffe's social software industry "solar system" analysis

ChiefTech

via zdnet.com. Following my recent post over on the Headshift Asia Pacific blog (reflecting on meetings in San Francisco with four social business vendor movers and shakers), I noticed Dion has mapped a bigger picture of the vendor acquisition landscape. This isn't a complete picture by any means, but provides you with a sense of the themes at work.

article thumbnail

More on the situated nature of enterprise mobile apps

ChiefTech

Four critical success factors for enterprise mobile app design View more presentations from Headshift Asia Pacific via slideshare.net. You might recall I posted a related draft diagram before. This particular diagram is from the report I've just finished on designing mobile apps for the enterprise - for more information, see this post on the Headshift Asia Pacific site.

45
article thumbnail

A Live SNA Experiment on Collaboration at the Enterprise 2.0 Conference

ChiefTech

via nodexlgraphgallery.org. Nice to see Social Network Analysis (SNA) getting airtime at the Enterprise 2.0 Conference this week. The network map above is the result of a live SNA experiment by Lithium Technology scientist, Michael Wu, using NodeXL. If you are interested in applying network analysis like this I suggest you check my friends at Optimice , who have been working and specialising in this field for many years.

43
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Monash University's Survey on Electronic Monitoring and Surveillance in the Australian Workplace

ChiefTech

Of those surveyed, 31% reported using social networking sites during work hours. Facebook was the most used site at work (94 per cent), with only 14% acknowledging using social media solely for work-related activities, compared with 42% using it just for personal (non-work related) activities, a 3 to 1 ratio. Just under half (45%) used social media for both work and personal activities.

Access 43
article thumbnail

Surface by Microsoft

ChiefTech

via microsoft.com. Microsoft's big news this week was the launch of its new range of tablets. Wired live blogged the launch. Permalink.

IT 43
article thumbnail

Cookie Consent Exemptions – The Article 29 Working Party’s View

Privacy and Cybersecurity Law

There have been further developments this week on the new ‘cookies rule’ with the Article 29 Working Party issuing its […].

IT 40