Sat.Sep 15, 2012 - Fri.Sep 21, 2012

article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

The post The Facebook Ad Network Is Here appeared first on John Battelle's Search Blog. It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network.

Education 110
article thumbnail

The digital workplace - virtual work or digitally augmented work communities?

ChiefTech

Listening to the european-driven agenda on the " digital workplace ", the core focus is on enabling people to work remotely (aka telework or telecommunting). Mark Morrell defines it as : "Work is what you do, not where you go to.". An academic panel of experts thinks: Forget whether it's practical to bring your own technology devices to work - in the future, you may not even have an office. ….

IT 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Salesforce demonstrating great momentum

Collaboration 2.0

Branson & Benioff demonstrate world class salesman human qualities, SalesForce selling ever more connected and intelligent businesses

80
article thumbnail

Hunton & Williams’ Global Privacy Practice Head Lisa Sotto Named Among Ethisphere’s 2012 “Attorneys Who Matter”

Hunton Privacy

On September 20, 2012, Hunton & Williams LLP announced Lisa J. Sotto , head of the firm’s Global Privacy and Data Security practice and managing partner of the New York office, was named among Ethisphere Institute’s “Attorneys Who Matter” for 2012. The annual listing includes approximately 100 lawyers from a range of legal disciplines who surpass their peers based on their experience, public service, legal community engagement and client endorsement.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

The post Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough appeared first on John Battelle's Search Blog. I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across

IT 108

More Trending

article thumbnail

Pension Schemes Failing on Data Privacy

Privacy and Cybersecurity Law

We are all familiar with the ongoing saga of data breach, notifications to the Information Commissioner’s Office and the risk […].

article thumbnail

NLRB Invalidates Costco’s Social Media Policy

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On September 7, 2012, the National Labor Relations Board invalidated Costco Wholesale Corp.’s policy of prohibiting employee electronic posts in its first decision involving an employer’s social media policy. In Costco Wholesale Corporation and UFCW Local 371 , Case No. 3A-CA-012421, the Board held, among other things, that Costco’s rule prohibiting employees from posting statements electronically that “damage the Company, defa

article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across four or so social networks.

IT 82
article thumbnail

Virgin America and the New Intranet

ChiefTech

It can be difficult to conceptualise , beyond the idea of "Facebook for the Enterprise", what an enterprise social network (ESN) is or does. I think this can create a misconception that ESNs are simply about employee engagement (as some of the early case studies suggested) or worse just for sharing jokes (a situation one law firm told me that this was all that their microblogging platform was used for).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DB2 10 for z/OS: New Options for Trimming and Upgrading Indexes

Robert's Db2

First, some explanation as to what I mean by "trimming and upgrading" indexes. My use of "trimming" refers to reducing the number of indexes defined on tables, through elimination of indexes that aren't providing value. Having fewer indexes on a table is good for cost efficiency, as every index increases the CPU cost of every insert and delete operation targeting the table (and every update of an indexed column), increases the cost of execution of several DB2 utilities (including LOAD, REORG, an

Access 54
article thumbnail

PCI Security Standards Council Issues Best Practices for Mobile Payment Acceptance Security

Hunton Privacy

On September 13, 2012, the PCI Security Standards Council (“PCI SSC”) issued new guidelines entitled “ PCI Mobile Payment Acceptance Security Guidelines ” (the “Guidelines”), which outline best practices for mobile payment acceptance security. As we reported in May, the PCI SSC Mobile Working Group published its “At a Glance: Mobile Payment Acceptance Security” fact sheet, detailing how merchants can more securely accept payments on mobile devices.

article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network. And this isn’t just an on-domain network (where you can buy ads across Facebook’s domain), but rather, it’s a true cross-domain network – just like AdMob on mobile, or

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

The history of the Internet, the World Wide Web and corporate intranets share a common heritage. Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. Before we look at what this means for intranets, I want to spend some time considering their history. In this post: Where did intranets comes from?

Cloud 89
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HHS Announces $1.5 Million HIPAA Settlement with Massachusetts Facilities

Hunton Privacy

On September 17, 2012, the Department of Health and Human Services (“HHS”) announced a $1.5 million settlement with the Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates Inc. (“MEEI”) for potential violations of the HIPAA Security Rule. In connection with the announcement, the HHS Office for Civil Rights (“OCR”) Director Leon Rodriguez stated that organizations should pay special attention to safeguarding information “stored and transported on portable devices such as

article thumbnail

A short history of intranets and what next with social, mobile and cloud

ChiefTech

The history of the Internet, the World Wide Web and corporate intranets share a common heritage. Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. Before we look at what this means for intranets, I want to spend some time considering their history. Where did intranets comes from?

Cloud 40
article thumbnail

Every Great Business Is An Argument (from 2008)

John Battelle's Searchblog

The post Every Great Business Is An Argument (from 2008) appeared first on John Battelle's Search Blog. Completely through happenstance, I came upon this post I wrote for American Express more than four years ago. I think it still stands up today. I never posted it on Searchblog, and I’d like my writing to be collected here. So call this a lightly edited blast from the archives… — Every Great Business Is An Argument.

article thumbnail

Every Great Business Is An Argument (from 2008)

John Battelle's Searchblog

Completely through happenstance, I came upon this post I wrote for American Express more than four years ago. I think it still stands up today. I never posted it on Searchblog, and I’d like my writing to be collected here. So call this a lightly edited blast from the archives… — Every Great Business Is An Argument OK, so maybe that title is meant to provoke a response, but is that so wrong?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Article 29 Working Party Issues Favorable Opinion on the Level of Protection of Personal Data in the Principality of Monaco

Hunton Privacy

On July, 19, 2012, the Article 29 Working Party (the “Working Party”) issued an Opinion finding that the Principality of Monaco ensures an “adequate level of protection” for personal data within the meaning of the European Data Protection Directive ( Article 25 of Directive 95/46/EC ) (the “Directive”). Under the Directive, strict conditions apply to personal data transfers to countries outside the European Economic Area that are not considered to provide an “adequate” level of data protection.