Sat.Jan 16, 2016 - Fri.Jan 22, 2016

article thumbnail

On Medium, Facebook, and the Graph Conflict

John Battelle's Searchblog

The post On Medium, Facebook, and the Graph Conflict appeared first on John Battelle's Search Blog. I double took upon arriving at Medium just now, fingers flexed to write about semi-private data and hotel rooms (trust me, it’s gonna be great). But upon my arrival, I was greeted thusly: Now, I have no categorical beef with Facebook, I understand the value of its network as much as the next publisher.

IT 53
article thumbnail

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device

Elie

This post summarizes which equipement the FBI use to seize the content of servers and laptops despite many of them use full disk encryption and which defenses exist.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New European Cyber Laws (NISD) – Do you understand the potential impact on your business?

CGI

New European Cyber Laws (NISD) – Do you understand the potential impact on your business? Anonymous. Fri, 01/22/2016 - 04:18. I previously blogged about the new General Data Protection Regulation (GDPR) agreed as European legislation in December 2015. This blog focuses on the new Network and Information Security Directive (NISD) which was agreed at the same time and also has significant implications for business. table.

article thumbnail

Taking the complexity out

Attensa

At Attensa we work with complex organizations that are solving complex problems. Effectively managing information and knowledge is a core part of the business strategies of these organizations. But often complexity begets complexity. In the universe of business and professional information services, the complexity wave has been playing out for decades as providers and their customers struggle with applying pre-digital content metaphors to a digital world.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Senate Vote on Judicial Redress Act Delayed

Hunton Privacy

On January 21, 2016, a Senate Judiciary Committee vote on the Judicial Redress Act, which would give EU citizens the right to sue over certain data privacy issues in the U.S., has reportedly been postponed. As reported by Forbes, the vote may have been delayed due to amendments to the fifth paragraph of the bill, which deals with litigation pursuant to the act.

More Trending

article thumbnail

Optimizing Healthcare Value with Prescriptive Analytics – Part 1

CGI

Optimizing Healthcare Value with Prescriptive Analytics – Part 1. kathy.jacquay@…. Wed, 01/20/2016 - 01:46. The healthcare system of the future will be one where continuous improvements in patient experience and operational efficiency are informed by data and decisions that are directed by prescriptive analytics. To achieve continuous improvement and drive optimization of healthcare value, we have to shift analytics from monitoring and reporting of what has happened, to using analytics to make d

article thumbnail

Israel Postpones Possibility of Any U.S.-EU Safe Harbor Enforcement

Hunton Privacy

On January 21, 2016, the Israeli Law, Information and Technology Authority (“ILITA”) announced that it would postpone for the time being any review or enforcement actions on data transfers from Israel to the United States that are based on the U.S.-EU Safe Harbor framework. This contradicts an earlier statement by ILITA in October 2015 that it would not permit such data transfers following the Schrems decision by the Court of Justice of the European Union that declared the Safe Harbor framework