Sat.Apr 08, 2017 - Fri.Apr 14, 2017

article thumbnail

A Chapter Ends. A New One Begins.

PerezBox

This chapter in my life began March of 2011. I was invited to join the team by Dre and Daniel. Coincidently, it ended on the month that I officially hit 6. Read More. The post A Chapter Ends. A New One Begins. appeared first on PerezBox.

IT 68
article thumbnail

Working Party Adopts Revised Guidelines on Data Portability, DPOs and Lead SA

Hunton Privacy

On April 5, 2017, the Article 29 Working Party (“Working Party”) adopted the final versions of its guidelines (the “Guidelines”) on the right to data portability, Data Protection Officers (“DPOs”) and Lead Supervisory Authority (“SA”), which were first published for comment in December 2016. The final publication of these revised guidelines follows the public consultation which ended in February 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

GDPR 52
article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Subscription models and the IoT – HP Instant Ink

Information Matters

HP’s Instant Ink service offers some lessons for companies exploring what the IoT might mean for their business models. The key benefits which HP is getting from Instant Ink are: • Direct relationships with customers, bypassing retailers and getting customer names, addresses and billing details; • Monthly recurring revenue streams allowing more predictable and stable […].

IoT 40

More Trending

article thumbnail

Product Innovation, User Experience and the Future of Digital Preservation: Preservica Global User Group 2017

Preservica

Last week I was privileged enough to be a part of Preservica’s Global User Group Meeting, taking place this year at the stunning venue of Magdalen College, Oxford, UK. The event was open to all Preservica users and comprised two full days of presentations, interactive workshops and discussion. It was wonderful to meet with more than 70 of our customers who travelled from across the globe to be there.

article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

article thumbnail

Please, Let’s Not Go There Again

John Battelle's Searchblog

The post Please, Let’s Not Go There Again appeared first on John Battelle's Search Blog. Here’s a top-of-my-head rundown of all the s**t going down that promises to take us forty years back, to a time when, well…you decide what kind of time it was. Women had to fight for basic rights. Anyone remember “women’s lib”? That movement found its voice in the 70s, and made steady if punctuated progress for forty years.

article thumbnail

China Publishes Draft Measures for Security Assessments of Data Transfers

Hunton Privacy

The Cybersecurity Law of China , which was passed in November of 2016, introduced a data localization requirement requiring “operators of key information infrastructure” to retain, within China, critical data and personal information which they collect or generate in the course of operating their business in China. If an entity has a genuine need resulting from a business necessity to transmit critical data or personal information to a destination outside of China, it can do so provided it under

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Massachusetts AG Settles Geofencing Case

Hunton Privacy

On April 4, 2017, the Massachusetts Attorney General’s office announced a settlement with Copley Advertising LLC (“Copley”) in a case involving geofencing. Copley used geolocation technology to create a virtual fence around women’s reproductive healthcare facilities. Once the women crossed the virtual fence, Copley then sent targeted advertisements to the women’s phones or other mobile devices.

Privacy 48
article thumbnail

Working Party Releases Guidelines on Data Protection Impact Assessments Under the GDPR

Hunton Privacy

On April 4, 2017, the Article 29 Working Party (“Working Party”) adopted its draft Guidelines on Data Protection Impact Assessment and determining whether processing is “likely to result in a high risk” for the purposes of Regulation 2016/679 (the “Guidelines”). The Guidelines aim to clarify when a data protection impact assessment (“DPIA”) is required under the EU General Data Protection Regulation (“GDPR”).

GDPR 45