September, 2013

article thumbnail

Get Out of Your Office, And Into The Modern Working City: OpenCo SF Is Live!

John Battelle's Searchblog

'The post Get Out of Your Office, And Into The Modern Working City: OpenCo SF Is Live! appeared first on John Battelle's Search Blog. I’m bustin’ with pride to announce that after great festivals in London , New York , and Detroit , OpenCo is returning next month to its home base of San Francisco, and the lineup is 135 companies strong *.

Access 110
article thumbnail

Federal Court: Non-Public Facebook Wall Posts Are Protected Under the Federal Stored Communications Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , No. 2:11-CV-3305 (WMJ) (D.N.J. Aug. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

article thumbnail

DB2 10 for z/OS: Take Advantage of "Native" SQL User-Defined Functions

Robert's Db2

Lots and lots of mainframe DB2 people know about the native SQL procedure technology delivered with DB2 9 for z/OS. That was, in my opinion, the most important enhancement of this aspect of DB2 functionality since stored procedures were introduced in the mid-1990s with DB2 for z/OS Version 4 (I've blogged multiple times about native SQL procedures, starting with an entry I posted a few years ago to the blog I maintained while working as an independent DB2 consultant).

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The (untold) price of doing local search

Elie

Nearly everyone loves mobile apps that can perform local searches, get directions, or find the nearest decent restaurant. But what’s not so obvious is that these local apps can have hidden bandwidth costs — meaning that, in some cases, they can run up your phone bill in ways you might not expect.

48

More Trending

article thumbnail

The Best Platform for Incubation Is the Web

John Battelle's Searchblog

'The post The Best Platform for Incubation Is the Web appeared first on John Battelle's Search Blog. ( image ) Yesterday in the course of my seemingly endless attempt to stay current in this industry, I came across this article on VentureBeat: Searching for the next Zuckerberg: A day in the life of a Lightspeed Fellow. It chronicles the experiences of the chosen few who have made it into a VC-backed incubator, focusing on two Stanford students who are trying to create a new sensor for lap

Sales 108
article thumbnail

Singapore Personal Data Protection Commission Issues Guidelines

Hunton Privacy

On September 24, 2013, the Singapore Personal Data Protection Commission (the “Commission”) published guidelines to facilitate implementation of the Singapore Personal Data Protection Act (the “PDPA”). The Advisory Guidelines on Key Concepts in the Personal Data Protection Act and the Advisory Guidelines on the Personal Data Protection Act for Selected Topics provide explanations of concepts underlying the data protection principles in the PDPA, and offer guidance on how the Commission may inter

article thumbnail

LexisNexis Data Breached - But Your Unique Identity is Much More Than Data Stolen Over the Internet

Interactive Information Management

In light of this week's LexisNexis Data Breach report, it's worthwhile to explore the true value and usefulness of this kind of data that might be stolen from you. Sensitive, personal data (PII, or "Personally Identifiable Data") is usually protected, but no protection is guaranteed if outside your complete control in any way – most people should assume their most-used data reflecting their personal identity (like SSNs, tel #s, DOB) is already public , if not already being used illegimately.

article thumbnail

New enforcement policy published by ICO demonstrating lack of resource?

Privacy and Cybersecurity Law

Focussed enforcement action The UK Information Commissioner’s Office (ICO) recently published its new policy on regulatory and enforcement action. The […].

IT 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS Hash-Organized Data: an Interesting Performance Story

Robert's Db2

A lot of DB2 for z/OS people know about the hash mode of organizing data in a table -- something introduced with DB2 10 (I've blogged about this topic multiple times, most recently in an entry I posted a few months ago ). The basics of hash-organization of data (this as opposed to traditional cluster-based data organization) are pretty straightforward: you select for a table a hash key (which could be comprised of a single column or a concatenation of multiple columns, as long as each key value

Access 48
article thumbnail

A retrospective look at the Magic Quadrant for Social Software in the Workplace, 2007-2013

ChiefTech

'In this new post on the Ripple Effect Group blog , I decided to take a retrospective look at Gartner''s Magic Quadrant for Social Software in the Workplace since 2007. One of my observations is that over the last 4 years over half the vendors have remained fairly constant in the quadrant. This means there are some mature offerings out there in the market, but there is still room for plenty of competition in this space.

article thumbnail

Search and Immortality

John Battelle's Searchblog

'The post Search and Immortality appeared first on John Battelle's Search Blog. Funny thing, there I was two days ago, at Google’s annual conference , watching Larry Page get asked questions so pliant in nature they couldn’t be called softballs. They were more like tee balls – little round interrogatives gingerly placed on a plastic column for Page to swat out into the crowd.

Libraries 106
article thumbnail

California Amends Online Privacy Policy Law to Require Tracking Disclosures

Hunton Privacy

On September 27, 2013, California Governor Jerry Brown signed into law a bill amending the California Online Privacy Protection Act (“CalOPPA”) to require website privacy notices to disclose how the site responds to “Do Not Track” signals, and whether third parties may collect personal information when a consumer uses the site. Although the changes to the law do not prohibit online behavioral advertising, this is the first law in the United States to impose disclosure requirements on website ope

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

else 9.23: From “Pulp to Prototype” and Other Good Reads

John Battelle's Searchblog

'The post else 9.23: From “Pulp to Prototype” and Other Good Reads appeared first on John Battelle's Search Blog. This week we’ve been thinking a lot about driverless cars and related data-driven innovations in transportation. (We even saw one up close this week at Google Zeitgeist.) We looked at Google’s newest effort to extend life with data in its new company, Calico.

article thumbnail

else 9.9: We Got Yer Star Trek Right Here

John Battelle's Searchblog

'The post else 9.9: We Got Yer Star Trek Right Here appeared first on John Battelle's Search Blog. This week in our round up we look at near-future advances in body scanners, self-driving sensors, and robots. We also read about what happens next as the internet’s fundamental trust architecture is on shaky grounds with the latest NSA revelations.

article thumbnail

else 9.30: The “Monkeys with Typewriter” Algorithm

John Battelle's Searchblog

'The post else 9.30: The “Monkeys with Typewriter” Algorithm appeared first on John Battelle's Search Blog. This week, the blind see with data, algorithms are uncovered, networks are analyzed, and data remains siloed. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis the best way is to subscribe to the “else” feed either as an email newsletter or through RSS.

article thumbnail

At Google Zeitgest 2013: A Conversation with Mark Kelly, featuring Gabby Giffords

John Battelle's Searchblog

'The post At Google Zeitgest 2013: A Conversation with Mark Kelly, featuring Gabby Giffords appeared first on John Battelle's Search Blog. For the past four years I’ve been honored to help moderate portions of Google’s annual Zeitgeist conference , which assembles a powerful lineup of speakers each year in the Arizona desert. I hosted the last segment of the day, and sat down with astronaut Mark Kelly, who is known for his career as a fighter pilot and Space Shuttle commander, a

82
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

else 9.3: Staring at the Tiny Screens

John Battelle's Searchblog

'The post else 9.3: Staring at the Tiny Screens appeared first on John Battelle's Search Blog. This week: Gartner’s latest hype cycle addresses the relationship between humans and machines, moral panics about our attention and time resurface, UPS optimizes drop offs around the happiness of drivers, Bitcoin’s regulatory environment gets messy, and data brokers take steps towards improved consumer transparency.

Privacy 70
article thumbnail

else 9.16: Start Making Sense

John Battelle's Searchblog

'The post else 9.16: Start Making Sense appeared first on John Battelle's Search Blog. This week, we’re excited about what the new M7 sensors mean for iPhone activity tracking, we’re thinking about how to rebuild trust in the internet and tech companies post-Snowden, and we’re listening to some music that plays with the boundaries between analog and digital.

article thumbnail

Senate Commerce Committee Broadens Data Broker Investigation

Hunton Privacy

On September 25, 2013, Senator Jay Rockefeller (D-WV), Chair of the Senate Committee on Commerce, Science and Transportation, expanded his investigation of the data broker industry by asking twelve popular health and personal finance websites to answer questions about their data collection and sharing practices. In letters to the companies , Senator Rockefeller requested detailed information about the websites’ privacy practices, including: whether the company collects health, family, financial

Privacy 40
article thumbnail

Data Protection Commissioners Adopt a Declaration and Several Resolutions at 35th International Conference

Hunton Privacy

On September 23 and 24, 2013, a declaration and eight resolutions were adopted by the closed session of the 35th International Conference of Data Protection and Privacy Commissioners and have been published on the conference website. This blog post provides an overview of the declaration and the most significant resolutions. Warsaw Declaration on the “Appification of Society”.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

UK ICO Publishes New Breach Notification Guidance for Telecom Operators and ISPs

Hunton Privacy

On September 26, 2013, the UK Information Commissioner’s Office (“ICO”) published new breach notification guidance (the “Guidance”), applicable to telecom operators, Internet service providers (“ISPs”) and other public electronic communications service (“ECS”) providers. The UK Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) implement the revised e-Privacy Directive 2009/136/EC, and contain wide-ranging rules on marketing and advertising by telephone, fax, email an

article thumbnail

Lon Berk Discusses Recent Cyber Attack on New York Times

Hunton Privacy

Recent months have seen a significant increase in highly-publicized cyber attacks and cybersecurity incidents, including an August 2013 attack on The New York Times’ website that shut down the site twice in two weeks. Unsurprisingly, there also has been an upswing in the demand for, and underwriting of, cyber insurance. In a recent Law360 article, Takeaways from Recent Cyberattack on New York Times, Hunton & Williams Insurance Litigation & Counseling partner Lon Berk considers whether a

article thumbnail

California Expands Online Privacy Law to Bolster Protection for Minors

Hunton Privacy

On September 23, 2013, California Governor Jerry Brown signed a bill that adds “Privacy Rights for California Minors in the Digital World” to the California Online Privacy Protection Act (“CalOPPA”). The new CalOPPA provisions prohibit online marketing or advertising certain products to anyone under age 18, and require website operators to honor requests made by minors who are registered users to remove content the minor posted on the site.

Privacy 40
article thumbnail

HIPAA Omnibus Rule Compliance Deadline Has Arrived

Hunton Privacy

Today, September 23, 2013, marks the deadline for compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Omnibus Rule that was issued in January 2013. Covered entities, business associates and subcontractors that access, use or disclose protected health information (“PHI”) will need to take the following actions: For Covered Entities : Review and modify HIPAA privacy policies and procedures to address the new definition of “marketing” in the HIPAA Privacy Rule

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Hunton Privacy Attorneys Featured Among New York Super Lawyers

Hunton Privacy

Hunton & Williams LLP is pleased to announce that several privacy lawyers were named to the New York Metro Super Lawyers list for 2013. For the eighth consecutive year, Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was selected as a New York Super Lawyer. She also was featured in the latest edition of New York Super Lawyers Magazine in an article entitled “ The Queen of Breach: Privacy Expert Lisa Sotto Goes Public.

Privacy 40
article thumbnail

Commissioner Reding Comments on EU General Data Protection Regulation Negotiations

Hunton Privacy

On September 6, 2013, Vice-President of the European Commission and Commissioner for Justice, Fundamental Rights and Citizenship Viviane Reding traveled to Berlin where she commented on the status of the negotiations on the proposed EU General Data Protection Regulation (the “Proposed Regulation”). Commissioner Reding indicated that she was looking for Germany to become involved in the discussions about the Proposed Regulation at the highest level, and she argued in favor of stricter regulations

IT 40
article thumbnail

HHS Releases Model Notices of Privacy Practices

Hunton Privacy

This week, the Department of Health and Human Services’ Office for Civil Rights (“OCR”), in conjunction with the Office of the National Coordinator for Health Information Technology, released model Notices of Privacy Practices. The notices, which have been developed for use by health care providers and health plans, come in different formats: an 8-page booklet; a 5-page layered notice that summarizes key details on the first page and includes the full content of the booklet on the remaining four

Privacy 40