Sat.Sep 01, 2012 - Fri.Sep 07, 2012

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

The post Tweets Belong To The User… And Words Are Complicated appeared first on John Battelle's Search Blog. ( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted b

Mining 99
article thumbnail

Connecting with traditional business language and conventions

Collaboration 2.0

John Hagel believes exploiting process exceptions is the way to find value in social initiatives; the challenge is often finding a common language with the business world.

81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Create a Social Community of Trust Along With Your Digital Services Governance Framework

Interactive Information Management

The Digital Services Governance Recommendations were recently released, supporting the US Federal Government's Digital Government Strategy Milestone Action #4.2 to establish agency-wide governance structures for developing and delivering digital services. Figure 1 - From: "Digital Services Governance Recommendations" While extremely important from a policy and procedure perspective within an Agency's information management and communications enterprise, these recommendations only very lightly re

article thumbnail

FTC Issues Mobile App Guidance

Hunton Privacy

On September 5, 2012, the Federal Trade Commission issued guidelines for mobile app developers entitled “ Marketing Your Mobile App: Get It Right from the Start.” The guidelines are largely a distillation of the FTC’s previously expressed views on a range of topics that have relevance to the mobile app space. They are summarized below: Truthful Advertising: “Tell the truth about what your app can do.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted by an Occupy Wall St. protestor.

Mining 64

More Trending

article thumbnail

The Victorian Internet – The Technology That Started It All

John Battelle's Searchblog

I’m at least three books behind in my reviews, so I figured I’d bang out a fun one today: The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers by Tom Standage. This 1998 book is now a classic – written as the Web was exploding on the scene, it reminded us that this movie has run before, 150 years in the past, with the rise of the telegraph.

IT 63
article thumbnail

Stricter Enforcement of German Advertising and Marketing Rules Effective September 1

Hunton Privacy

As of September 1, 2012, all personal data in Germany may only be processed and used for marketing purposes (including address trading) with the express opt-in consent of the affected individuals. Furthermore, the consent language must have been specifically drawn to the attention of the relevant individual as part of the terms and conditions governing the use of his or her personal data.

article thumbnail

Submission for ABA’s Annual Blawg 100

Hunton Privacy

The American Bar Association Journal is compiling a list of the 100 best legal blogs of 2012 and is inviting readers to submit nominations. Click the voting button below to submit a nomination for Hunton & Williams’ Privacy and Information Security Law. PR News named Hunton & Williams’ Privacy Blog the Best Legal PR Blog of 2011.

Privacy 40
article thumbnail

FTC Files Complaint Against DISH Network

Hunton Privacy

On August 23, 2012, the Federal Trade Commission announced that it had filed suit against DISH Network LLC (“DISH Network”) alleging violations of the FTC’s Telemarketing Sales Rule (“TSR”). The FTC’s complaint claims that DISH Network is a “seller” and “telemarketer” as such terms are defined by the TSR because the company sells satellite television programming to consumers and also markets its programming through a variety of methods, including telemarketing.

Sales 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Sixth Circuit Finds Coverage for Losses Resulting from Retailer’s Data Breach

Hunton Privacy

On August 23, 2012, the United States Court of Appeals for the Sixth Circuit held in R etailer Ventures, Inc. v. Nat’l Union Fire Ins. Co. that losses resulting from the theft of customers’ banking information from a retailer’s computer system are covered under a commercial crime policy’s computer fraud endorsement. In February 2005, a computer hacker gained access to the main computer system of shoe retailer DSW Shoe Warehouse, Inc.

article thumbnail

Bing Tries Harder, But For Me, It’s A Draw

John Battelle's Searchblog

It’s not easy being number two. As a marketer, you have limited choices – you can pretend you’re not defined by the market leader, or, you can embrace your position and go directly after your nemesis. For years, Bing executives have privately complained about how hard it is to “break the Google habit,” even as they refused to market directly against Google.

article thumbnail

European Commission Finds Uruguay’s Data Protection Law Provides Adequate Safeguards

Hunton Privacy

On August 21, 2012, the European Commission formally approved Uruguay’s status as a country providing “adequate protection” for personal data within the meaning of the European Data Protection Directive (Article 25(6) of Directive 95/46/EC). This follows the Article 29 Working Party’s earlier favorable Opinion issued in 2010, and takes into account certain interpretative assurances and clarifications provided by Uruguay.

article thumbnail

Israeli Court Upholds DPA’s Authority to Issue Market Instructions

Hunton Privacy

Reporting from Israel, legal consultant Dr. Omer Tene writes: In a detailed, 27-page decision (Admin. App. 24867-02-11 IDI Insurance v. Database Registrar ), the Tel Aviv District Court recently upheld the validity of an instruction issued by the data protection regulator restricting financial institutions from using information about a third party’s attachment of their client’s account for the financial institution’s own purposes.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.