Sat.Dec 15, 2012 - Fri.Dec 21, 2012

article thumbnail

Retargeting Is Just Phase One

John Battelle's Searchblog

The post Retargeting Is Just Phase One appeared first on John Battelle's Search Blog. Toward the end of the year, annual predictions come out (I’ve been guilty of this for nearly ten years now). I was perusing these from Triggit founder Zach Coelius, and his ninth one hit me right between the eyes: Retargeting will be taken out of the tactic box marketers have been myopically placing it into, and instead they will recognize that retargeting is simply the first step to a sophisticated

Marketing 107
article thumbnail

US school shootings digital witch hunt

Collaboration 2.0

The glare of the public spotlight can bring out the worst in our digital connections: the same can be true n the dark side of the workforce rat race.

Privacy 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Clone Tables and "Active Versioning"

Robert's Db2

A DB2 for z/OS DBA contacted me a few days ago and posed a seemingly simple question, the answer to which ended up being a little more involved than might be expected. The DBA's query: how can one alter a table that has a clone? The specific need in this case was to add a column to a table for which a clone had been created. As is true of other ALTER TABLE operations, addition of a table column cannot be accomplished while the clone relationship exists.

Access 48
article thumbnail

Online Digital Reputation Management is a Requirement for Marketing Strategy & PR in DC

Interactive Information Management

Nearly every business conducting business in the DC or Northern Virginia area (and elsewhere) is finding that more and more effort is required to manage their online reviews and feedback. Particularly for local or regional businesses, the very first thing online consumers do in considering to visit or buy, is to seek out online reviews, search for online reputation or trust signals, and canvass their social media networks for trusted advice and opinion.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Article 29 Working Party Announces Launch of Binding Corporate Rules for Processors

Hunton Privacy

On December 21, 2012, the Article 29 Working Party issued a press release announcing the launch of Binding Corporate Rules (“BCRs”) for processors effective January 1, 2013. This announcement follows the Article 29 Working Party’s adoption of a Working Document ( WP 195 ) on June 6, 2012, which set forth requirements for BCRs for processors, and an application form for submitting BCRs for processors issued on September 17, 2012.

More Trending

article thumbnail

Business Practice Exchange 2012: Mike Thuman's feedback

Preservica

Another great Business Practice Exchange session was held early this month, this time in Annapolis hosted by the Maryland State Archives. Efforts related to the SERI initiative wove themselves throughout the meeting as talks of self assessments turned toward education and program planning. Kentucky Department for Libraries and Archives talked about their ISO/TRAC test -audit and then shared the platform with us on discussing ways to lower the barrier in preserving electronic records.

article thumbnail

Apple OS X Server Upgrade Update

JKevinParker

In my last post, I ranted about Apple canceling my order for Mac OS X Snow Leopard Server without telling me, and how they said it could be another 6 weeks before I got my upgrade if it came at all. It did come almost immediately. It must have shipped shortly after my call to Apple. Now, I have installed Snow Leopard Server only to find out that my Xserve model cannot be upgraded to Mountain Lion.

IT 40
article thumbnail

Congress Approves VPPA Consent Requirement Changes

Hunton Privacy

On December 18, 2012, the U.S. House of Representatives passed H.R. 6671 , a bill that would amend the Video Privacy Protection Act (“VPPA”) consent requirements for disclosing consumers’ viewing information. The Senate approved the bill without changes on December 20, 2012. The bill would make it easier for companies to develop innovative technologies for the sharing of consumers’ video viewing habits.

Privacy 40
article thumbnail

Leveson: Proposals for New Data Privacy rules in the UK

Privacy and Cybersecurity Law

The Leveson Inquiry recently published its findings into UK press regulation. However Leveson also commented on the UK data privacy […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Requests Information About Data Brokerage Companies’ Collection and Use of Personal Data

Hunton Privacy

On December 18, 2012, the Federal Trade Commission issued Orders to File Special Report (the “Orders”) to nine data brokerage companies, seeking information about how these companies collect and use personal data about consumers. In the Orders, the FTC requests detailed information about the data brokers’ privacy practices, including: the data brokerage companies’ online and offline products and services that use personal data; the sources and types of personal data the data brokerage companies

article thumbnail

Vladeck’s Legacy at the FTC

Hunton Privacy

U.S. Federal Trade Commission Chairman Jon Leibowitz announced on Monday that David C. Vladeck, director of the FTC’s Bureau of Consumer Protection, is leaving the Commission on December 31, 2012 to return to the Georgetown University Law Center. The news did not come as a surprise — Vladeck had been on leave from Georgetown since 2009. But it does mark a significant milestone in the Commission’s consumer protection work, especially in the area of information privacy and security.

Privacy 40
article thumbnail

FTC Announces Updated COPPA Rule

Hunton Privacy

On December 19, 2012, the Federal Trade Commission announced the adoption of its long-awaited amendments to the Children’s Online Privacy Protection Rule (the “Rule”). The FTC implemented the Rule, which became effective on April 21, 2000, pursuant to provisions in the Children’s Online Privacy Protection Act of 1998 (“COPPA”). After declining to modify the Rule in 2006 , in 2010, the Commission launched an extensive examination of possible changes that resulted in the proposed COPPA Rule amendm

Privacy 40
article thumbnail

Sotto Discusses Cybersecurity as Top Legal Issue in 2012

Hunton Privacy

On December 10, 2012, Tom Field of HealthcareInfoSecurity interviewed Lisa J. Sotto , partner and head of the Global Privacy and Data Security practice at Hunton & Williams LLP. Discussing the top legal issues in 2012, Lisa said that data breaches remain at the top of the list, with an increase in malicious cyberattacks. She also addressed the need to combat cybercrime.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK ICO Opens Public Consultation on Draft Subject Access Code of Practice

Hunton Privacy

On December 13, 2012, the UK Information Commissioner’s Office (“ICO”) announced a consultation on a draft subject access code of practice (the “Code”). The Code is open for public comment until February 21, 2013. Under the UK Data Protection Act 1998, individuals are entitled to access the personal data an organization processes about them, and know the purposes of the processing, whether the organization shares the personal data with any third parties and the source of the personal data.

Access 40
article thumbnail

UK ICO Releases Cookies Enforcement Report

Hunton Privacy

On December 18, 2012, the Information Commissioner’s Office (“ICO”) released an enforcement report (the “Report”) on the extent of compliance with recent changes to UK law governing the use of cookies ( The Privacy and Electronic Communications (EC Directive) (Amendment) Regulations 2011 ). The ICO previously issued an interim report on organizations’ attempts to achieve compliance, in which it concluded that organizations “must try harder” with their cookie compliance efforts.

article thumbnail

European Commission Finds New Zealand’s Data Protection Law Provides Adequate Safeguards

Hunton Privacy

On December 19, 2012, the European Commission announced its formal recognition of personal data protection in New Zealand. The European Commission approved New Zealand’s status as a country that provides “adequate protection” of personal data under the European Data Protection Directive 95/46/EC. This determination means that personal information from Europe may flow freely to New Zealand.