Sat.Jan 09, 2016 - Fri.Jan 15, 2016

article thumbnail

FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early

John Battelle's Searchblog

The post FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early appeared first on John Battelle's Search Blog. Way back in 2012 – four years ago in real time, three decades or so in Internet time – I predicted that Facebook would build an alternative to Google’s AdSense based on its extraordinary data set. I was right, but…off by a few years.

article thumbnail

FTC Releases New Report on Big Data

Hunton Privacy

On January 6, 2015, the Federal Trade Commission released its report on big data entitled Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues. The report is a compilation of a seminar on alternative scoring products, the discussions at a big data public workshop held on September 15, 2014, and other recent research and public commentary on the issue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How email in transit can be intercepted using dns hijacking

Elie

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack discussed in a previous post, it is equally effective at defeating email in-transit encryption.

article thumbnail

New year! New North America office!

Preservica

I am excited to announce that as the newly independent Preservica, we have just moved into our new North America office on Milk Street, in the heart of downtown Boston, MA. The move will allow us to increase our focus on serving customers right across the region - as well as of course the growing community of Preservica users in the Boston area, including the Massachusetts State Archives, the City of Boston, Emerson College and The Trustees of Reservations, to name just a few.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mobile Gets a Back Button

John Battelle's Searchblog

The post Mobile Gets a Back Button appeared first on John Battelle's Search Blog. I just opened an email on my phone. It was from a fellow I don’t know, inviting me to an event I’d never heard of. Intrigued, I clicked on the fellow’s LinkedIn, which was part of his email signature. That link opened the LinkedIn app on my phone. In the fellow’s LI feed was another link, this one to a tweet he had mentioned in his feed.

IT 58

More Trending

article thumbnail

New European Cyber Laws – Do you understand potential impact on your business?

CGI

New European Cyber Laws – Do you understand potential impact on your business? ravi.kumarv@cgi.com. Thu, 01/14/2016 - 05:54. Two new pieces of European legislation/regulation were agreed in December 2015. I read a recent article in the FT, Network and Information Security Directive (NISD), also known as the Cyber Security Directive, was agreed on the 8th December, followed a week later by the General Data Protection Regulation (GDPR ), agreed on the 15th December.

GDPR 40
article thumbnail

Speaking at AIIM16

JKevinParker

At this year's AIIM Conference , I will be speaking on SharePoint planning for user adoption: Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used. SharePoint is infamous for being unuseful, unusable, and unused. But the fault is not in the technology—usually, it is a failure to adequately plan and execute practical business solutions that causes SharePoint projects to flounder.

article thumbnail

The Streaming Conundrum: Forgetting What I Heard

John Battelle's Searchblog

The post The Streaming Conundrum: Forgetting What I Heard appeared first on John Battelle's Search Blog. Once upon a time, I’d read the yearly lists of “best albums” from folks like Rick Webb or Marc Ruxin , and immediately head over to the iTunes store for a music-buying binge. Afterwards, I’d listen happily to my new music for days on end, forging new connections between the bands my pals had suggested and my own life experiences.

article thumbnail

Centre for Information Policy Leadership to Co-Host APEC Privacy Workshop in Lima, Peru

Hunton Privacy

On February 22, 2016, the Centre for Information Policy Leadership (“CIPL”), together with TRUSTe, the Information Accountability Foundation and Information Integrity Solutions, will co-host a workshop on Building a Dependable Framework for Privacy, Innovation and Cross-Border Data Flows in the Asia-Pacific Region in Lima, Peru. The workshop will be held in the margins of the upcoming meetings of the APEC Electronic Commerce Steering Group and its Data Privacy Subgroup in Lima from February 23-

Privacy 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Does the tail wag the dog in IoT?

CGI

Does the tail wag the dog in IoT? ravi.kumarv@cgi.com. Thu, 01/14/2016 - 06:16. You often hear the phrase "the tail wagging the dog" and anyone who owns a Labrador will see it in action on a daily basis! In IT we come across cases of this on a regular basis as a new project ends up 'taking over' when it should be supporting the existing processes. In extreme cases this has been known to completely destabilise companies and damage their competitiveness.

IoT 40
article thumbnail

European Court of Human Rights Issues Decision on Monitoring Employee Use of the Internet

Hunton Privacy

On January 12, 2016, the European Court of Human Rights (“the Court”) ruled in B?rbulescu v. Romania that companies can monitor their employees’ online communications in certain circumstances. The case concerned the dismissal of a Romanian engineer, B?rbulescu, by his employer, for the use of the company’s Internet and in particular, Yahoo Messenger, for personal purposes during work hours.

article thumbnail

China Enacts Administrative Measures for Online Payment Businesses

Hunton Privacy

On December 28, 2015, the People’s Bank of China published Administrative Measures for Online Payment Business of Non-bank Payment Institutions (the “Measures”). The Measures were enacted to provide further details on the regulation of online payment businesses, in supplement to the earlier Administrative Measures for the Payment Services of Non-financial Institutions (the “2010 Measures”), published by the People’s Bank of China on June 14, 2010.

article thumbnail

FTC Settles with Dental Practice Software Provider over Charges of Misleading Consumers with Respect to Data Encryption

Hunton Privacy

On January 5, 2016, the Federal Trade Commission announced that dental office management software provider, Henry Schein Practice Solutions, Inc. (“Schein”), agreed to settle FTC charges that accused the company of falsely advertising the level of encryption it used to protect patient data. The proposed Agreement Containing Consent Order (“Consent Order”) stems from an FTC complaint that alleged the company engaged in unfair or deceptive acts or practices by falsely representing that the Dentrix

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

European Data Protection Supervisor Publishes Priorities for 2016

Hunton Privacy

On January 7, 2016, the European Data Protection Supervisor (the “EDPS”) published his Priorities for 2016. The EDPS Priorities consists of a cover note listing the strategic priorities of the EDPS in 2016 and a color-coded table listing the European Commission’s proposals that require the EDPS’ attention, per level of priority. In line with the EDPS Strategy 2015-2019 unveiled in March 2015, the EDPS will set his focus on the following areas of strategic importance: Complete the Data Protection

article thumbnail

Business, Meet Mission: With His Final #SOTU, Obama Reframed The Climate Debate

John Battelle's Searchblog

The post Business, Meet Mission: With His Final #SOTU, Obama Reframed The Climate Debate appeared first on John Battelle's Search Blog. President Obama’s final State of the Union address is currently trending on Medium, which is pretty much what you might expect given Medium is where the White House decided to release it ( take that, Facebook! — though a piece about building Instagram has about twice as many recommendations, but I digress… ).