July, 2011

article thumbnail

Looky Here, It's Me, In an Ad, On Facebook! Is This Legal? Allowed? Who Knows?!

John Battelle's Searchblog

In the past 12 hours, about ten friends (and counting) have sent me a copy of this ad on Facebook for a company called "AppSumo." I have nearly 5000 "friends" on Facebook, a problem I've written about in the past , but seeing this ad threw me. Apparently, this is *not* part of Facebook's social ads, where people can buy ads targeting friends of particular people on third party sites - after all, this appears on Facebook.com.

IT 111
article thumbnail

Google's Social Network++

Collaboration 2.0

Google’s pivot from search to social technologies occurred last week and my early impressions of their new service Google+ are very positive, particularly around their efforts on allowing you to group your contacts. The giant global advertising company have many years experience analyzing your search and email history, and often display eerily accurate recommendations contextual [.

111
111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using the microsoft geolocalization api to retrace where a windows laptop has been

Elie

EDIT (Tuesday 2nd August) Microsoft Statement is available from here EDIT (Sunday 31th July) The flaw is fixed: I had a phone call with some people from Microsoft yesterday (yes on a Saturday) and they told me they fixed the problem. I will update this post with their response as soon as it is out.

IT 48
article thumbnail

A Point of Clarification about DB2 9 for z/OS and "Pure" Sequential Prefetch

Robert's Db2

Many of you have probably heard (I've said it a number of times in presentations myself) that starting with DB2 9 for z/OS "pure" sequential prefetch (what we just called sequential prefetch before dynamic prefetch came along) would only be used for table space scans. In all other situations if DB2 utilized prefetch to access pages of a database object it would be dynamic or list prefetch.

Mining 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Texas Enacts Expansive New Health Privacy Law

Hunton Privacy

Last month, Texas Governor Rick Perry signed a health privacy bill into law that imposes new obligations exceeding the requirements in the HIPAA Privacy Rule. The law, which will become effective on September 1, 2012, incorporates the expanded definition of the term “covered entity” in Texas’s existing health privacy law and could have a broad impact on many non-HIPAA covered entities.

Privacy 45

More Trending

article thumbnail

The World Is An Internet Startup Now

John Battelle's Searchblog

( image ) Last night I got to throw a party, and from time to time, that's a pretty fun thing to do. To help us think through the program and theme of the Web 2 Summit this Fall, we invited a small group of influential folks in the Bay area to a restaurant in San Francisco, fed them drinks and snacks, and invited their input. (Here are some pics if you want to see the crowd.).

Mining 111
article thumbnail

Changing Times in the HR World.

Collaboration 2.0

Like accountancy software and spreadsheets, HR Technology has been around as long as business computing. Recruiting, payroll, tracking work time, performance appraisals, employee benefits administration, managing training and learning and performance reviews and records…and of course the funeral parlor like world of ‘off boarding’ may not be the sexiest of software spaces but they form [.

100
100
article thumbnail

Tracking users that block cookies with a http redirect

Elie

While the standard technique to track users across multiples sites / visits is to use cookies this is by no means the only way to do this. Last year Samy, with his famous evercookie application, showed that in fact many browser storages (Flash, locale storage) can be used to store a unique identifier.

48
article thumbnail

It takes two to innovate

CGI

It takes two to innovate. ravi.kumarv@cgi.com. Fri, 07/01/2011 - 08:00. Numerous surveys of clients and suppliers all agree – collaborative innovation is important and desired. Especially in outsourcing. But why is it still not ‘business as usual’? Two research projects recently completed by the National Outsourcing Association in the UK and Warwick Business School (WBS) explored how innovation is included within outsourcing contracts and how it is subsequently managed.

IT 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Connecticut Restricts Employer Access to Employee Credit Reports

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog , Connecticut recently became the latest state to pass a law regulating employer use of credit reports. The law , which goes into effect on October 1, 2011, prohibits employers from requiring employees or prospective employees to consent to the employer requesting their credit report as a condition of employment.

Access 40
article thumbnail

Firefox 5 Released. Huh?

JKevinParker

Very recently, I upgraded to Firefox 4.0. That's why I was surprised when I began getting bugged to upgrade to Firefox 5.0. Wait, huh? Did someone fat-finger the subversion commit? It seemed to me like it was time for a minor version release, especially considering some of my favorite plugins have not been upgraded for 4.0 yet. Apparently, I'm not alone.

IT 40
article thumbnail

Google+: If, And, Then.Implications for Twitter and Tumblr

John Battelle's Searchblog

It's hard to not voice at least one note into the Morman Tabernacle of commentary coming out of Google's first two weeks as a focused player in the social media space. I haven't read all the commentary, but one observation that seems undervoiced is this: If Google+ really works, Google will be creating a massive amount of new "conversational media" inventory, the very kind of marketing territory currently under development over at Tumblr and Twitter.

Mining 102
article thumbnail

Cults of Personality

Collaboration 2.0

The conventional wisdom about personally leveraging the ’social’ web has been the idea that promoting your attributes and sharing ideas will make you more visible online, and therefore attract more business success or job offers. Now that we have hit mass understanding and use of tools that make it simple to publish online, have we [.

IT 92
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Alert: vsftpd download backdoored

Scary Beasts Security

[With thanks to Mathias Kresin for being the first to notice] An incident, what fun! Earlier today, I was alerted that a vsftpd download from the master site (vsftpd-2.3.4.tar.gz) appeared to contain a backdoor: [link] The bad tarball is (sha256sum): 2a4bb16562e0d594c37b4dd3b426cb012aa8457151d4718a5abd226cef9be3a5 vsftpd-2.3.4.tar.gz And, of course, the GPG signature notices: $ gpg.

IT 31
article thumbnail

Time For A New Software Economy

John Battelle's Searchblog

Way back in the day, before all this Interweb stuff made news, we had a computer hardware and software industry that was both exciting and predictable. I was a cub reporter in those days, covering an upstart company (Apple) as it did battle with two dug-in monopolists: IBM in hardware, and Microsoft in software. IBM was clearly on its way down (losing share to legions of hardware upstarts in Asia and the US), but Microsoft was an obvious - and seemingly unbeatable - winner.

Cloud 100
article thumbnail

Wanted: Write Hand

John Battelle's Searchblog

I'm looking for someone with whom to work on my next book project, What We Hath Wrought. The person I'm looking for is probably impossible to find, but I'm going to try anyway. Why impossible? Because I haven't met someone like the person I'm imagining, at least not in the right context. Back when I needed a partner to help me get FM off the ground, I wrote a post looking for an office manager/person friday.

Paper 94
article thumbnail

"The Information" by James Gleick

John Battelle's Searchblog

Even before I was a few pages into The Information , a deep, sometimes frustrating but nonetheless superb book by James Gleick, I knew I had to ask him to speak at Web 2 this year. Not only did The Information speak to the theme of the conference this year ( the Data Frame ), I also knew Gleick, one of science's foremost historians and storytellers, would have a lot to say to our industry.

Mining 90
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Google Google, Wait A Minute. This Is About Us, Isn't It? Google (And Everyone Else) Is Just a Means to Our Ends.

John Battelle's Searchblog

One last thought before I hit the hay after a long, satisfying evening with the people who gave me the chance to start FM in their garage , the Shores. And that is this: Google killed its earnings earlier this evening thanks in part to is algorithmic approach to display advertising (not that profit was easily broken out, I'm sure it contributed in the way most mature brand businesses do, which, as a mature business, must be looking way better than it did a few years ago.

IT 75
article thumbnail

Last Week's Signal

John Battelle's Searchblog

I fell out of the habit, but here are the Signals from last week. If you want to get my daily roundup of stories worth paying attention to, get the RSS here , or sign up in email at the top right of the page here. Monday Signal: Is Google Too Big? Tuesday Signal: Will Big Data Save Us? We Can Pray. Weds. Signal: A Good Day for the Open Internet. Thursday Signal: So Many Links, So Little Time.

article thumbnail

Comments: Off

John Battelle's Searchblog

I know I've been a bit quiet here on Searchblog of late, and I've promised that will change shortly, as I ramp up on the new book. But one faction of Searchblog has not been quiet: the comment spammers. So I am turning comments off for a while, in the hopes it will make the spammers go elsewhere for a bit. I'll be redesigning the site over the summer, moving it from this antiquated (and pretty much abandoned) Moveable Type codebase to WordPress, and doing a number of other key upgrades.

IT 65
article thumbnail

Sotto Discusses Patchwork Quilt of U.S. Privacy Laws with Dallas Business Journal

Hunton Privacy

Read the Dallas Business Journal’s DBJ Confidential blog post discussing Hunton & Williams partner Lisa J. Sotto’s thoughts on how companies should approach privacy issues in the United States. Sotto was interviewed while in Dallas giving a privacy law presentation for in-house counsel.

Privacy 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Russia Enacts Amendments to Data Privacy Law

Hunton Privacy

As reported in BNA’s Privacy Law Watch , on July 25, 2011, Russian President Dmitry Medvedev signed a new federal law amending Russia’s personal data privacy law, “On Personal Data.” The amended law, which was made public on July 27 and is effective retroactively from July 1, 2011, imposes new rules on international data transfers.

article thumbnail

Mexico’s Draft Privacy Regulations: English Translation

Hunton Privacy

As we previously reported , the Mexican government has developed draft regulations for the implementation of Mexico’s Federal Law on the Protection of Personal Data in the Possession of Private Parties ( Ley Federal de Protección de Datos Personales en Posesión de los Particulares ). The U.S. Department of Commerce recently circulated an English translation of the draft regulations.

Privacy 40
article thumbnail

EEOC Letter Suggests Employers May Need to Increase Privacy Safeguards for Employee Medical Information

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The EEOC recently released an informal discussion letter suggesting that employers may be obligated to do more than just maintain a separate file for employee medical records, especially when those records are in an electronic format. Both the Americans with Disabilities Act of 1990 (“ADA”), as amended, and the Genetic Information Non-Discrimination Act of 2008 (“GINA”) require employers to maintain a confidential medical recor

Privacy 40
article thumbnail

President Obama Nominates Ohlhausen to be FTC Commissioner

Hunton Privacy

As reported in BNA’s Privacy Law Watch , on July 19, 2011, President Obama announced his intention to nominate Maureen K. Ohlhausen to the Federal Trade Commission. Obama sent his official nomination to the Senate on July 21, 2011. If approved, Ohlhausen will serve a seven-year term beginning on September 26, 2011, replacing Commissioner William E. Kovacic.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Class Action Suit Filed Against Cloud Service over Data Breach

Hunton Privacy

A putative class action complaint filed on June 22, 2011, in the United States District Court for the Northern District of California alleges that the popular cloud-based storage provider Dropbox, Inc. failed to secure users’ private data or to notify the vast majority of them about a data breach. According to the complaint, Dropbox announced in a blog post on its website that it had “introduced a bug” on June 19, 2011, which allowed users logged in to its system to log into other users’ accoun

article thumbnail

Hong Kong Privacy Commissioner Solicits Views on Proposal for Data User Returns

Hunton Privacy

The Hong Kong Privacy Commissioner has issued a document soliciting comments regarding a proposal to require a wide range of data users to submit information about their activities to the Office of the Privacy Commissioner for Personal Data. The proposal would be carried out pursuant to the Hong Kong Privacy Ordinance, which authorizes the Privacy Commissioner to require certain data users to submit data user returns.

Privacy 40
article thumbnail

House Subcommittees Convene Hearing to Launch Review of Internet Privacy

Hunton Privacy

On July 14, 2011, the U.S. House of Representatives Energy and Commerce Committee convened a joint hearing of the Subcommittee on Commerce, Manufacturing and Trade (chaired by Rep. Mary Bono Mack (R-CA)), and the Subcommittee on Communications and Technology (chaired by Rep. Greg Walden (R-OR)), to launch a comprehensive review of Internet privacy. The series of hearings began with testimony from officials representing three agencies with jurisdiction over consumer privacy issues: FTC Commissio

Privacy 40