Sat.Feb 23, 2013 - Fri.Mar 01, 2013

article thumbnail

On Coming Back to FMP

John Battelle's Searchblog

The post On Coming Back to FMP appeared first on John Battelle's Search Blog. Starting a business is a journey, as any founder will tell you. When I started Federated Media Publishing almost eight years ago, I did my best to collect all the lessons learned from Wired, The Industry Standard, and Web 2 Summit, and apply them to my new venture. One of those lessons was that it’s [.

IT 111
article thumbnail

Yahoo: back to the future office

Collaboration 2.0

Yahoo's command and control move of all employees back onsite may be a pyrrhic victory: bricks and mortar economics don't add up now that the epicenter of modern firms is the screen you're reading this on.

89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Centre Releases Paper on Big Data and Analytics

Hunton Privacy

On February 28, 2013, the Centre for Information Policy Leadership at Hunton & Williams LLP (the “Centre”) announced the release of “ Big Data and Analytics: Seeking Foundations for Effective Privacy Guidance ,” a paper intended to help organizations and policymakers develop a governance framework for using analytics in a way that protects privacy and promotes innovation.

article thumbnail

Google called before European privacy authorities

Privacy and Cybersecurity Law

In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 for z/OS: What Might "Template" DDL for CREATE TABLESPACE and CREATE INDEX Look Like?

Robert's Db2

Recently, a DB2 for z/OS DBA sent me a question about a particular clause of the SQL DDL (data definition language) statements CREATE TABLESPACE and CREATE INDEX. In his note containing the question he also sent what you might call his "template" CREATE TABLESPACE and CREATE INDEX statements -- the statements that serve as a pattern that he uses when creating these objects in his DB2 environment.

Access 48

More Trending

article thumbnail

Supreme Court Finds Lack of Standing to Challenge Foreign Intelligence Surveillance Act

Hunton Privacy

On February 26, 2013, the United States Supreme Court decided in Clapper v. Amnesty International that U.S. persons who engage in communications with individuals who may be potential targets of surveillance under the Foreign Intelligence Surveillance Act (“FISA”) lack standing to challenge the statute’s constitutionality. The Supreme Court determined that the plaintiffs’ alleged injuries were not “certainly impending” and that the measures they claimed to have taken to avoid surveillance were no

article thumbnail

The EU Data Protection Regulation: timing

Privacy and Cybersecurity Law

As we’re all aware the new Data Protection Regulation (the Regulation) was announced to much bombast a little over a […].

40
article thumbnail

Ramirez to Be Named FTC Chair

Hunton Privacy

On February 28, 2013, a White House official confirmed that President Obama will nominate Edith Ramirez as Chair of the Federal Trade Commission. Ramirez, who has served as an FTC Commissioner since April 2010, will replace outgoing Chairman Jon Leibowitz, who announced his departure earlier this month. Prior to being nominated to the FTC in 2010, Ramirez worked as an attorney in private practice, focusing on litigation and antitrust issues.

article thumbnail

Singapore Personal Data Protection Commission Issues Advisory Guidelines

Hunton Privacy

Following up on its February 5, 2013 consultation paper , Singapore’s Personal Data Protection Commission has issued two additional public consultation papers concerning the guidelines the Commission is empowered to issue under the new data protection law. The first proposed set of advisory guidelines examines key concepts in the Personal Data Protection Act (“PDPA”), with thorough discussions of definitions as well as data protection obligations set forth in the PDPA.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC Settles Charges in First Case Against Mobile Device Manufacturer

Hunton Privacy

On February 22, 2013, the Federal Trade Commission announced that it had settled charges against HTC America, Inc. (“HTC”) alleging that the mobile device manufacturer “failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.

article thumbnail

NIST Issues RFI for Framework for Reducing Cyber Risks

Hunton Privacy

On February 26, 2013, the National Institute of Standards and Technology (“NIST”) issued a Request for Information (“RFI”) to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported , the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”), released on February 12, 2013, directs NIST to coordinate development of this framework.

Risk 40
article thumbnail

Yahoo: Back to the future office

Collaboration 2.0

'Yahoo''s command and control move of all employees back onsite may be a pyrrhic victory: Bricks and mortar economics don''t add up now that the epicenter of modern firms is the screen you''re reading this on.

40
article thumbnail

Article 29 Working Party Issues Proposals for Amendments to the Proposed Regulation

Hunton Privacy

On February 27, 2013, the Article 29 Working Party (the “Working Party”) issued a statement on the European Commission’s proposed revised data protection framework (“Statement”), including the proposed General Data Protection Regulation (“Proposed Regulation”). The Working Party offered amendments to the Proposed Regulation in the form of two Annexes to the Statement on the topics of competence and lead data protection authority (“DPA”) and the exemption for household or personal activities.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.