Sat.Sep 21, 2013 - Fri.Sep 27, 2013

article thumbnail

else 9.23: From “Pulp to Prototype” and Other Good Reads

John Battelle's Searchblog

'The post else 9.23: From “Pulp to Prototype” and Other Good Reads appeared first on John Battelle's Search Blog. This week we’ve been thinking a lot about driverless cars and related data-driven innovations in transportation. (We even saw one up close this week at Google Zeitgeist.) We looked at Google’s newest effort to extend life with data in its new company, Calico.

article thumbnail

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Senate Commerce Committee Broadens Data Broker Investigation

Hunton Privacy

On September 25, 2013, Senator Jay Rockefeller (D-WV), Chair of the Senate Committee on Commerce, Science and Transportation, expanded his investigation of the data broker industry by asking twelve popular health and personal finance websites to answer questions about their data collection and sharing practices. In letters to the companies , Senator Rockefeller requested detailed information about the websites’ privacy practices, including: whether the company collects health, family, financial

Privacy 40
article thumbnail

Canadian Advertisers Self-Regulate Online Behavioural Advertising

Privacy and Cybersecurity Law

Call to Action on OBA The Office of the Privacy Commissioner (OPC) is aware of the challenges associated with balancing privacy in the online […].

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 10 for z/OS: Take Advantage of "Native" SQL User-Defined Functions

Robert's Db2

Lots and lots of mainframe DB2 people know about the native SQL procedure technology delivered with DB2 9 for z/OS. That was, in my opinion, the most important enhancement of this aspect of DB2 functionality since stored procedures were introduced in the mid-1990s with DB2 for z/OS Version 4 (I've blogged multiple times about native SQL procedures, starting with an entry I posted a few years ago to the blog I maintained while working as an independent DB2 consultant).

More Trending

article thumbnail

Data Protection Commissioners Adopt a Declaration and Several Resolutions at 35th International Conference

Hunton Privacy

On September 23 and 24, 2013, a declaration and eight resolutions were adopted by the closed session of the 35th International Conference of Data Protection and Privacy Commissioners and have been published on the conference website. This blog post provides an overview of the declaration and the most significant resolutions. Warsaw Declaration on the “Appification of Society”.

Privacy 40
article thumbnail

UK ICO Publishes New Breach Notification Guidance for Telecom Operators and ISPs

Hunton Privacy

On September 26, 2013, the UK Information Commissioner’s Office (“ICO”) published new breach notification guidance (the “Guidance”), applicable to telecom operators, Internet service providers (“ISPs”) and other public electronic communications service (“ECS”) providers. The UK Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) implement the revised e-Privacy Directive 2009/136/EC, and contain wide-ranging rules on marketing and advertising by telephone, fax, email an

article thumbnail

Lon Berk Discusses Recent Cyber Attack on New York Times

Hunton Privacy

Recent months have seen a significant increase in highly-publicized cyber attacks and cybersecurity incidents, including an August 2013 attack on The New York Times’ website that shut down the site twice in two weeks. Unsurprisingly, there also has been an upswing in the demand for, and underwriting of, cyber insurance. In a recent Law360 article, Takeaways from Recent Cyberattack on New York Times, Hunton & Williams Insurance Litigation & Counseling partner Lon Berk considers whether a

article thumbnail

California Expands Online Privacy Law to Bolster Protection for Minors

Hunton Privacy

On September 23, 2013, California Governor Jerry Brown signed a bill that adds “Privacy Rights for California Minors in the Digital World” to the California Online Privacy Protection Act (“CalOPPA”). The new CalOPPA provisions prohibit online marketing or advertising certain products to anyone under age 18, and require website operators to honor requests made by minors who are registered users to remove content the minor posted on the site.

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

HIPAA Omnibus Rule Compliance Deadline Has Arrived

Hunton Privacy

Today, September 23, 2013, marks the deadline for compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Omnibus Rule that was issued in January 2013. Covered entities, business associates and subcontractors that access, use or disclose protected health information (“PHI”) will need to take the following actions: For Covered Entities : Review and modify HIPAA privacy policies and procedures to address the new definition of “marketing” in the HIPAA Privacy Rule