Sat.Nov 24, 2012 - Fri.Nov 30, 2012

article thumbnail

On Open Platforms, Wifi, Home Automation, and Kitty Litter

John Battelle's Searchblog

The post On Open Platforms, Wifi, Home Automation, and Kitty Litter appeared first on John Battelle's Search Blog. At least this platform is open… (image Shutterstock ). The world needs more open platforms. The term is loaded, but it’s worth unpacking. To me, an open platform is a consistent opportunity space where anyone – without prior permission – can attempt to create value, and the market gets to vote on that attempt.

article thumbnail

Who should own the keys to your digital assets?

Collaboration 2.0

Who should own the digital keys to your private files and who can you trust as cloud file hosting struggles with archaic legal precedents and laws? Surprisingly Michael Chertoff & Kim Dotcom appear to agree: you should control encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Michael Idinopulos - bringing interaction back to a digital workplace

ChiefTech

Michael Idinopulos is General Manager and Chief Customer Officer at Socialtext, but this honestly isn't the typical 'vendor' presentation. Its well worth watching if you want to understand why many of us think enterprise social software can make so much difference in the workplace. Via the Socialtext blog.

IT 56
article thumbnail

UK Supreme Court Rules in Favor of Court Order to Disclose Identities

Hunton Privacy

On November 21, 2012, the UK Supreme Court handed down a judgment in The Rugby Football Union vs. Consolidated Information Services Limited (Formerly Viagogo Limited) , a case addressing the application of Article 8 of the EU Charter of Fundamental Rights (Protection of Personal Data) in the context of court orders seeking to disclose the identities of alleged wrongdoers.

Sales 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Must All Grasshoppers Die?

John Battelle's Searchblog

The post Must All Grasshoppers Die? appeared first on John Battelle's Search Blog. I’ve been reading a lot lately – and the topics have been pretty diverse. Popular science fiction from ten years ago (Outerland), political commentary from last month (Future Perfect), seminal computing tracts from the 1990s (Mirror Worlds), and just published manifestos on synthetic biology (Regenesis).

IT 95

More Trending

article thumbnail

Can we use email to achieve interoperability between enterprise social networks?

ChiefTech

The other day writing about email and enterprise social software , I concluded with the following: "Far from being a nemesis, email and enterprise social software are more likely to form a strong symbiotic relationship.". I want to explore a little further about what I mean by the possible future relationship between email and enterprise social software.

Risk 60
article thumbnail

Avoiding a Data Divide Between the U.S. and the EU

Hunton Privacy

On November 22, 2012, the Brussels-based publication European Voice published an editorial by U.S. Department of Commerce General Counsel Cameron Kerry entitled Avoiding a Data Divide Between the US and the EU. The article notes the importance of continued collaboration between the European Union and the United States as both assess their respective privacy frameworks to ensure that any changes encourage enhanced trade and strong economic growth, but also contain robust protections for consumers

Privacy 40
article thumbnail

Can The Future Be Perfect? It Can Certainly Be Better

John Battelle's Searchblog

The post Can The Future Be Perfect? It Can Certainly Be Better appeared first on John Battelle's Search Blog. As my 2011 review of his Where Good Ideas Come From: A Natural History of Innovation proves, I am a Steven Johnson fan. So it was with relish that I settled in to read his latest release: Future Perfect: The Case For Progress In A Networked Age.

IT 91
article thumbnail

Some Information About DB2 10 for z/OS Hash-Organized Tables

Robert's Db2

A DB2 for z/OS DBA recently asked me about the pros and cons of hash-organized tables -- a physical database design option that is introduced with DB2 10 for z/OS running in new-function mode (NFM). Assuming that others in the mainframe DB2 community are also pondering this issue, I've decided to provide what I hope will be some useful information in this blog entry.

Access 48
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Going social - getting past the terminology debate

ChiefTech

In recent weeks I've had a number of conversations about both terminology and ownership of technology in organisations. The recent Connected Enterprise 2012 conference in particular highlighted the possible breadth of general information and communication technologies that people in organisations use to get work done - from social intranets to video conferencing.

article thumbnail

UK ICO Fines Spammers Nearly Half Million Pounds

Hunton Privacy

On November 28, 2012, the UK Information Commissioner’s Office (“ICO”) issued monetary penalties totaling £440,000 to two owners of a marketing company that sent millions of unlawful spam SMS text messages over a period of three years. Following an 18 month investigation, Christopher Niebal and Gary McNeish, the owners of Tetrus Telecoms (“Tetrus”), have been ordered to pay £300,000 and £140,000, respectively.

article thumbnail

Dave Pell on Facebook’s Gift to Itself

John Battelle's Searchblog

The post Dave Pell on Facebook’s Gift to Itself appeared first on John Battelle's Search Blog. I enjoy NextDraft , an email newsletter penned by Dave Pell each day. I value point of view and voice in any medium, and Dave’s got it. I think Searchblog readers would appreciate this item, so I’ve reposted it here. Dave, I hope you don’t mind… The Gift of Data.

article thumbnail

The Unspoken Threat of Software-as-a-Service

CGI

The Unspoken Threat of Software-as-a-Service. ravi.kumarv@cgi.com. Mon, 11/26/2012 - 07:00. I want to make this a balanced argument. I’ll start with the positives. Software-as-a-Service (SaaS) is a fairly recent innovation which has taken-off phenomenally well, and with good reason. SaaS offers huge economies of scale, because it can be shared by many organisations.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Craig Mod on Subcompact Publishing.

John Battelle's Searchblog

The post Craig Mod on Subcompact Publishing. appeared first on John Battelle's Search Blog. The Verge pointed me to Craig Mod’s manifesto on “ Subcompact Publishing.” It’s a must read if you care about where digital publishing might go. It’s a wonderful, thoughtful piece. It’s why we have this web thing. Go read it.

IT 69
article thumbnail

HHS Publishes Guidance on How to De-Identify Protected Health Information

Hunton Privacy

On November 26, 2012, the Department of Health and Human Services’ Office for Civil Rights (“OCR”) published guidance on the two methods for de-identifying protected health information (“PHI”) in accordance with the HIPAA Privacy Rule. The guidance, which was required by the Health Information Technology for Clinical and Economic Health (“HITECH”) Act, has been developed over several years by OCR in collaboration with healthcare entities and other industry experts and builds upon the discussions

Privacy 40
article thumbnail

ICC UK Releases Updated Cookie Guidance

Hunton Privacy

On November 27, 2012, the International Chamber of Commerce of the United Kingdom (“ICC UK”) released the second edition of its cookie guidance (the “Guidance”). The ICC UK released the first edition of the Guidance in April of this year, and has produced this latest version to take into account updated guidance released by the UK Information Commissioner’s Office (“ICO”), the Article 29 Working Party Opinion 04/2012 on cookie consent exemption and new UK advertising rules on online behavioral a

article thumbnail

German Advertisers Launch Self-Regulation Initiative for Online Behavioral Advertising

Hunton Privacy

On November 19, 2012, 40 German advertising associations launched the “German Data Protection Council for Online Advertising,” a new initiative to coordinate and enforce self-regulation in the German online behavioral advertising (“OBA”) sector. The initiative is linked to the European Interactive Digital Advertising Alliance (“EDAA”), which manages the self-regulation efforts of the European online advertising industry.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Centre Co-Hosts IAPP KnowledgeNet Meeting on Accountability

Hunton Privacy

On December 3, 2012, the Centre for Information Policy Leadership (the “Centre”) at Hunton & Williams will co-host a special International Association of Privacy Professionals (“IAPP”) KnowledgeNet meeting in Brussels, Belgium. The meeting will explore global developments in accountability in the context of the proposed EU Data Protection Regulation and the impact of accountability on data protection management.

Privacy 40
article thumbnail

Time Running Out for Mobile App Operators Targeted by California Attorney General

Hunton Privacy

In late October 2012, California Attorney General Kamala D. Harris began sending letters to approximately 100 mobile app operators, informing them that they are not in compliance with the California Online Privacy Protection Act (“CalOPPA”). Pursuant to CalOPPA, “an operator of a commercial Web site or online service that collects personally identifiable information through the Internet about individual consumers residing in California who use or visit its commercial Web site or online service”

Privacy 40
article thumbnail

Hunton & Williams Maintains Top-Tier Rankings in Data Protection by Chambers UK

Hunton Privacy

Hunton & Williams is pleased to announce the firm maintained its top-tier “Band 1” ranking in Data Protection in the 2013 edition of Chambers UK. Our London-based principals also maintained their high rankings as leading Data Protection lawyers: Bridget Treacy , managing partner of the firm’s London office and head of the UK Privacy and Data Security practice, was ranked as a “Star Individual.”.

Privacy 40
article thumbnail

UK Concerned about Economic Impact of European Data Protection Reform Proposals

Hunton Privacy

On November 22, 2012, the UK Ministry of Justice released a written ministerial statement (“Statement”) announcing the publication of its Government Impact Assessment on the European Commission’s legislative reform package on the EU data protection framework. The European Commission has claimed that a regulation implementing a single set of data protection rules across the European Union would save businesses around €2.3 billion a year.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.