Sat.Nov 30, 2013 - Fri.Dec 06, 2013

article thumbnail

Apple+Topsy: It’s Not About Twitter (And Twitter Is Probably Cool With That)

John Battelle's Searchblog

'The post Apple+Topsy: It’s Not About Twitter (And Twitter Is Probably Cool With That) appeared first on John Battelle's Search Blog. I’m going out on a limb, but a fairly stout one: Like Azeem , I think Apple bought Topsy for its search chops. But Azeem, who I admire greatly, says Topsy could become the search engine “for iOS… to index both the social Web, but also the best bits of the Web that power Siri and Apple Maps, [and] reduce the reliance on Google and reduc

IT 110
article thumbnail

DC SEO 3.0 & Internet Marketing Top 10 2014 Tips for Local or Small Businesses

Interactive Information Management

At KME (a DC SEO Company and Digital Technology Agency ), we cover a lot of ground among client types, industry segments and technology services, with a heavy emphasis on area DC SEO business requirements for online, interactive marketing and advertising. As a local or regional small business near Washington DC, including Northern Virginia, Suburban and Southern Maryland, there's an almost bewildering array of online marketing services, tools, channels and opportunities to sift through - plenty

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New UK Cybersecurity Standard in the Works

Hunton Privacy

On November 28, 2013, the UK government published a paper in response to its March 2013 consultation on cybersecurity standards (“Response Paper”), and announced that it will create a new cybersecurity standard. The original consultation concluded in October 2013. UK Consultation. The consultation focused primarily on assessing the suitability of existing cybersecurity standards (such as the IASME standards and the ISO 27000-series standards ) for use by businesses and government agencies.

article thumbnail

6 Month Countdown to Canada’s Anti-Spam Legislation (CASL)

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) has been a long time coming. The Government of Canada announced today that most of CASL’s provisions […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Traffic of Good Intent: We Beat Fraud By Working Together

John Battelle's Searchblog

'The post Traffic of Good Intent: We Beat Fraud By Working Together appeared first on John Battelle's Search Blog. Earlier this year I wrote a post titled It’s Time To Call Out Fraud In The Adtech Ecosystem. The overwhelming response to that riposte led to a lunch at this year’s IAB annual meeting, which then led to the formation of the Traffic of Good Intent task force (TOGI), an IAB-sanctioned working group composed of leaders from nearly every major player in the media and adtech

Paper 102

More Trending

article thumbnail

Playing With Infomous

John Battelle's Searchblog

'The post Playing With Infomous appeared first on John Battelle's Search Blog. Getting a live demo of this new approach to content discovery/display and potential monetization. Anyone out there played with it too? The post Playing With Infomous appeared first on John Battelle's Search Blog.

IT 78
article thumbnail

Strickling Discusses U.S. Commitment to Consumer Privacy Protection

Hunton Privacy

On December 3, 2013, Lawrence Strickling, Department of Commerce Assistant Secretary for Communications and Information, spoke at the American European Community Association Conference in Brussels on Data Protection: The Challenges and Opportunities for Individuals and Businesses. Strickling discussed the Obama Administration’s commitment to “preserving the dynamism and openness of the Internet, enhancing the free flow of information, and strengthening our Internet economy.

Privacy 40
article thumbnail

Law360 Features Lisa Sotto in Female Powerbrokers Series

Hunton Privacy

On December 5, 2013, Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was featured in Law360’s “Female Powerbrokers” Q&A series. The series focuses on female lawyers and their personal experiences as they have grown into leadership positions within their respective firms. Here is an excerpt from Sotto’s interview: Q: How did you break into what many consider to be an old boys’ network?

Privacy 40
article thumbnail

NTIA Announces New Multistakeholder Process on the Commercial Use of Facial Recognition Technology

Hunton Privacy

On December 3, 2013, the U.S. Department of Commerce’s National Telecommunications and Information Administration (“NTIA”) announced a new multistakeholder process to develop a code of conduct regarding the commercial use of facial recognition technology. The first meeting is set for February 6, 2014 in Washington, D.C., and will provide stakeholders with background on the privacy issues associated with facial recognition technology, including how facial recognition technology currently is being

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Another California-Based Mobile App Developer Settles with New Jersey AG’s Office Over Child Privacy Violation Allegations

Hunton Privacy

On November 22, 2013, New Jersey’s Acting Attorney General announced that the State had entered into a settlement agreement with Dokogeo, Inc. (“Dokogeo”), a California-based company that makes mobile device applications, regarding allegations that one of the company’s mobile apps violated the Children’s Online Privacy Protection Act of 1998 (“COPPA”), the recently amended Children’s Online Privacy Protection Rule (the “Rule”) and the New Jersey Consumer Fraud Act.

Privacy 40
article thumbnail

Draft Measures on Personal Health Information Published in China

Hunton Privacy

On November 19, 2013, the National Health and Family Planning Commission of the People’s Republic of China published a draft of its proposed new Administrative Measures on Personal Health Information (the “Draft Measures”) and solicited public comments by December 20, 2013. This is the first time the Chinese government has proposed an integrated and uniform framework for the administration and protection of its citizens’ personal health information.

article thumbnail

TCPA Lawsuits Explosion

Privacy and Cybersecurity Law

The number of class-action lawsuits brought under the Telephone Consumer Protection Act (TCPA) against businesses that regularly call consumers for […].

Privacy 52
article thumbnail

New South African data privacy law

Privacy and Cybersecurity Law

On the day after Nelson Mandela’s passing, we wanted to highlight the long awaited South African law on data protection which […].

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EU/US Safe Harbor … spotted alive!

Privacy and Cybersecurity Law

The European Commission has announced that it will not kill off Safe Harbor. Instead it has published 13 recommendations to […].

IT 40
article thumbnail

Cy Pres Settlements – Justice Roberts’ opinion in the Facebook Beacon privacy class-action litigation

Privacy and Cybersecurity Law

The appeal to the US Supreme Court took an interesting turn in the Facebook Beacon litigation (Marek v. Lane). The […].

Privacy 40
article thumbnail

Wave of recent Massachusetts ZIP code cases following change in law and California’s lead

Privacy and Cybersecurity Law

As anticipated, in the wake of the Supreme Judicial Court ruling on March 11, 2013, in Tyler v. Michaels Stores, […].

Privacy 40