Digital analytics meetup #20, Thessaloniki. Introduction on the technical elements (cookies, localstorage, link decoration etc.) of web user authentication and anti-tracking mechanisms available
A Comparison of Analytics and Tag Management Suites by Piwik PRO and GooglePiwik PRO
A combination of Google Tag Manager and Google Analytics has become the standard in the everyday activities of a data-driven marketer. But what if you’re looking for a more secure and privacy-compliant alternative? Welcome to Piwik PRO Tag Manager, which comes with built-in templates and integrations for Piwik along with a range of popular marketing and web analytics tags. Self-hosted and robust, it complies with the strictest privacy laws. See how the Piwik PRO analytics and tag management suite compares to Google and how you can make it work for your business.
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
One North’s Managing Director of Technology Ryan Horner and legal process and technology consultant Bob Beach share details on how the EU’s General Data Protection Regulation (GDPR) could impact digital assets.
This webinar is designed to educate digital marketers, share actionable examples, and provide an overview of how One North can help clients ensure their digital properties are in compliance with the regulation and execute on those efforts. Beyond GDPR compliance, the session will also highlight important information for marketers as data privacy continues to become a critical and strategic component of digital.
Access the recording: https://youtu.be/ruQpN70LGt0
GDPR - Australian perspective - the challenge, the opportunity and your duty Jakub Otrząsek
The document discusses GDPR and the process for complying with an individual's "right to be forgotten". It notes that GDPR requires explicit consent for data collection and use. It then outlines the steps an organization would take to remove an individual's data from Google Analytics upon their request, including obtaining the individual's client ID and using Google Analytics and BigQuery APIs. However, it warns that fully removing an individual's data across all devices and browsers can be difficult due to limitations in linking cookies and IDs to specific individuals. Preparation, knowledge of the domain, and tested processes are advised to comply with GDPR requests.
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
Data security legislation like the GDPR allows users to control how and if their personal data is used by companies. Join our VP of Digital Strategy, Dawn Aly, and Open Source Security Lead, Mark Shropshire, both from Mediacurrent, as they give us actionable steps to take to ensure GDPR compliance.
Watch recorded webinar: http://bit.ly/2MVhON9
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
Today, more and more companies use advertising technologies (AdTech) to reach their consumers and better understand their preferences. This can lead to multiple data protection risks. Data privacy awareness is increasing due to seismic developments in the industry brought about by key players such as Google and Apple. In parallel, global regulations set stricter guidelines around the collection, storage, and use of personal data.
This is not over. With the decisions coming out soon on analytics, how will the advertising technologies landscape adjust? Ultimately, how can advertising, privacy, and data management work together?
Our panel in this webinar explored the practical steps your organization should take to ensure that its digital advertising practices are compliant with data protection laws.
This webinar reviews:
- The current practices and developments in the AdTech industry
- The laws and regulations governing AdTech
- How to address the privacy issues related to advertising technology
CWIN17 london being practical about how to address gdpr - farah latifCapgemini
This document provides an overview of General Data Protection Regulation (GDPR) program and services offered by Capgemini. It discusses GDPR services across 10 categories: GDPR Program Services, Data Discovery Services, Consent & Individual's Rights Management Services, Pseudonymizing Services, Data Lifecycle Services, Data Protection Services, GDPR Assessment Services, GDPR Assurance Services, Breach Management & Reporting Services, and 99 GDPR Articles. The presentation also outlines key rights of data subjects and processes around consent management, marketing preferences, and rights of access under GDPR.
Data Protection Forum meetup 23052017 John M Walsh
The document discusses technologies that can help companies comply with the General Data Protection Regulation (GDPR). It describes tools from various vendors like SAP, Microsoft, IBM, Talend, and Informatica that can assist with data protection impact assessments, data governance, subject rights management, data masking, incident response, and compliance reporting. The presentation encourages attendees to contact the speaker if they have any other questions.
A Comparison of Analytics and Tag Management Suites by Piwik PRO and GooglePiwik PRO
A combination of Google Tag Manager and Google Analytics has become the standard in the everyday activities of a data-driven marketer. But what if you’re looking for a more secure and privacy-compliant alternative? Welcome to Piwik PRO Tag Manager, which comes with built-in templates and integrations for Piwik along with a range of popular marketing and web analytics tags. Self-hosted and robust, it complies with the strictest privacy laws. See how the Piwik PRO analytics and tag management suite compares to Google and how you can make it work for your business.
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
One North’s Managing Director of Technology Ryan Horner and legal process and technology consultant Bob Beach share details on how the EU’s General Data Protection Regulation (GDPR) could impact digital assets.
This webinar is designed to educate digital marketers, share actionable examples, and provide an overview of how One North can help clients ensure their digital properties are in compliance with the regulation and execute on those efforts. Beyond GDPR compliance, the session will also highlight important information for marketers as data privacy continues to become a critical and strategic component of digital.
Access the recording: https://youtu.be/ruQpN70LGt0
GDPR - Australian perspective - the challenge, the opportunity and your duty Jakub Otrząsek
The document discusses GDPR and the process for complying with an individual's "right to be forgotten". It notes that GDPR requires explicit consent for data collection and use. It then outlines the steps an organization would take to remove an individual's data from Google Analytics upon their request, including obtaining the individual's client ID and using Google Analytics and BigQuery APIs. However, it warns that fully removing an individual's data across all devices and browsers can be difficult due to limitations in linking cookies and IDs to specific individuals. Preparation, knowledge of the domain, and tested processes are advised to comply with GDPR requests.
Creating a GDPR Action Plan; Not a Freakout PlanMediacurrent
Data security legislation like the GDPR allows users to control how and if their personal data is used by companies. Join our VP of Digital Strategy, Dawn Aly, and Open Source Security Lead, Mark Shropshire, both from Mediacurrent, as they give us actionable steps to take to ensure GDPR compliance.
Watch recorded webinar: http://bit.ly/2MVhON9
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
Today, more and more companies use advertising technologies (AdTech) to reach their consumers and better understand their preferences. This can lead to multiple data protection risks. Data privacy awareness is increasing due to seismic developments in the industry brought about by key players such as Google and Apple. In parallel, global regulations set stricter guidelines around the collection, storage, and use of personal data.
This is not over. With the decisions coming out soon on analytics, how will the advertising technologies landscape adjust? Ultimately, how can advertising, privacy, and data management work together?
Our panel in this webinar explored the practical steps your organization should take to ensure that its digital advertising practices are compliant with data protection laws.
This webinar reviews:
- The current practices and developments in the AdTech industry
- The laws and regulations governing AdTech
- How to address the privacy issues related to advertising technology
CWIN17 london being practical about how to address gdpr - farah latifCapgemini
This document provides an overview of General Data Protection Regulation (GDPR) program and services offered by Capgemini. It discusses GDPR services across 10 categories: GDPR Program Services, Data Discovery Services, Consent & Individual's Rights Management Services, Pseudonymizing Services, Data Lifecycle Services, Data Protection Services, GDPR Assessment Services, GDPR Assurance Services, Breach Management & Reporting Services, and 99 GDPR Articles. The presentation also outlines key rights of data subjects and processes around consent management, marketing preferences, and rights of access under GDPR.
Data Protection Forum meetup 23052017 John M Walsh
The document discusses technologies that can help companies comply with the General Data Protection Regulation (GDPR). It describes tools from various vendors like SAP, Microsoft, IBM, Talend, and Informatica that can assist with data protection impact assessments, data governance, subject rights management, data masking, incident response, and compliance reporting. The presentation encourages attendees to contact the speaker if they have any other questions.
GDPR Compliance Software | General Data Protection Regulation (GDPR) DashboardCorporater
GDPR governance & DPO dashboard:
Corporater offers an all-in-one actionable dashboard solution that gives your Data Protection Officer complete oversight into your compliance activities related to GDPR.
Corporater GDPR integrates with your existing systems to provide a complete overview of all your data protection activities:
1. Implement GDPR projects and activities
2. Monitor GDPR metrics
3. Audit GDPR articles
To know more, visit: https://corporater.com/en/business-solutions/governance-risk-and-compliance/gdpr-software/
The document discusses GDPR and data lakes. It explains that GDPR is the most important change in data privacy regulation in 20 years. It outlines the data controller's responsibilities under GDPR including lawfulness of processing, records of processing activities, and data protection by design. It also discusses data subjects' rights such as right of access, data portability, and right to be forgotten. The document then examines GDPR considerations from the perspective of a data lake, such as techniques for anonymization and pseudonymization of personal data. It provides recommendations for solutions to ensure GDPR compliance when using a data lake.
This document discusses blackhat analytics techniques such as dark tracking and intentionally distorting web analytics data. It begins with defining blackhat analytics and providing examples of early blackhat techniques from pre-2010. It then discusses classifications of good and bad analytics data and potential penalties for violations. It notes an increase in online competitiveness and revenue at stake could lead to more malicious analytics practices. The document warns of increased scrutiny from organizations like Google's planned privacy "Red Team" and potential class action lawsuits in response to privacy issues.
How businesses can benefit from privacy preserving synthetic dataBenjamin Nolan
In this webinar we discuss privacy, it's relevance to data science, and how privacy-preserving synthetic data can help organizations build a bridge between compliance and efficient use of data.
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
This document discusses building a real-time fraud detection system using big data technologies. It outlines the cyber threat landscape, what anomalies and fraud detection are, and proposes an architecture with a data layer to integrate various sources and an analytics layer using stream processing, rules engines, and machine learning to score transactions in real-time and detect fraud. The system aims to scalably and reliably detect threats for increased security.
2009 How To Select A Social Media Monitoring Vendor PartnerMarcus Tewksbury
This document provides guidance on selecting a social media monitoring vendor partner. It discusses key things to consider, such as whether to use a self-service or outsourced solution. When evaluating vendors, questions should focus on their methods for collecting, storing, and analyzing social media data to ensure comprehensive coverage, access to historical data, and control over analyzing the results. The goal is to find a flexible partner that provides actionable insights and automated reporting.
The cookiepocalypse is coming and third-party cookies' reign over the web will come to a close. Are you ready for a cookieless future? This presentation from Media Kitchen explores why cookies are crumbling, the resulting impact across the ecosystem, and early steps advertisers can take to prepare.
The document discusses various methods for tracking digital performance, including on-network and off-network measurements. It notes the importance of aligning measurements with business objectives and considering unintended consequences. Cookies and tracking codes are described as the backbone of online measurement and targeting. Issues around online advertising metrics like unique visitors and discrepancies between data sources are also summarized.
This document discusses how digital advertising is undergoing seismic shifts as third-party cookies are phased out. It provides context on cookies and how they are used for tracking and targeting ads. With Chrome announcing it will no longer allow third-party cookies by 2022, marketers are scrambling to adapt. The death of the cookie will change digital marketing tactics and require a focus on first-party data and building direct customer relationships through authenticated experiences. A cookieless future relies on having a unified single view of the customer, which can be achieved through implementing a customer data platform. The document discusses examples of how companies have used Acquia's customer data platform to gain insights from unified customer data and improve marketing performance.
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Taste
Google may have postponed the end of third-party cookies to 2024, but the effects on data collection and data management are already visible. The restrictions on legal frameworks and browsers are increasing every day. Businesses and marketers are struggling to improve campaign performance, face data losses and lack visibility on the purchase journey to drive business opportunities. In the post-cookie world, there is one thing that is certain: consent is here to stay. In the future, there will only be data with consent, or no data at all. Join us for this session, where we will talk about how to improve your data strategy by leveraging consent in a post-cookie era.
Digital marketing without 3rd party cookiesJakub Otrząsek
Nowadays 3rd party cookie does not work for ~40% of the traffic
New campaign strategies are required to adapt to the current situation
There is a need for new solutions, which will maintain the balance between privacy and personalised experience
As predicted a year ago, another browser implemented ITP alike functionalities (Firefox).
It is a matter of time until other browsers implement more restrictions around 3rd party cookies.
It is also important to account that tools like “ghostery” or “adblocker” are gaining popularity with time.
This document provides an introduction to web analytics. It defines web analytics as the measurement, collection, analysis and reporting of internet data to understand and optimize web usage. The main goals of web analytics are to measure traffic, understand user behavior on websites, and optimize websites. It discusses different categories of web analytics including on-site and off-site analytics. Common web analytics tools like Google Analytics use page tagging to collect data as users interact with websites. Key metrics that web analytics measures are discussed like visits, time on site, bounce rate, and conversion rate. The document also covers common web analytics products, how data is collected and stored, and factors to consider when selecting a web analytics tool.
This document discusses various topics related to cyber ethics and online privacy and security. It provides tips for safe browsing, discusses how websites can track users through IP addresses, cookies, and other techniques. It also outlines best practices for ensuring confidentiality of information online and defines different types of cyber crimes like cyberbullying, cyber trolls, and more.
We all use several devices and browsers to visit the same content on the web, on mobile and apps. A few months ago we were guessing and trying to get a grip on the customer journey on all these devices. But now the time that we can measure, estimate and understand cross device usage has arrived! Learn how to understand and setup cross device measurement. What can you learn from it and what are the benefits to understand the cross device behavior of your customers?
How To Promote Your Online Visibility Using Web Analytics. How To Promote You...Overalia
This document discusses key concepts for understanding and optimizing web analytics, including:
1. Defining objectives and identifying potential customers to focus analytics efforts.
2. Generating traffic through various acquisition channels like search engines, display ads, email marketing, and integrating campaigns in Google Analytics.
3. Segmenting data by user types, content, campaigns etc. to more easily measure and optimize performance. The overall goal is to improve conversion, retention and acquisition.
Media-Scanner-for-Data-Protection-Ad-TagsKenan Marks
Third party tags and codes on websites can cause valuable first party user data to leak off the site without the site owners' knowledge or compensation. The Media Scanner service detects, analyzes, and reports on all ad tags on a website to identify instances of data leakage and notify site owners so they can quickly resolve issues and better protect user data and their brand. Media Scanner provides continuous monitoring of ad tags to catch data leakage on a 24/7 basis through servers located around the world.
Ensuring Property Portal Listing Data SecurityDistil Networks
Securing your property portal listing data is harder than ever. Why? Web scraping is cheap and easy. Bots simply steal whatever content they’ve been programmed to fetch – listing text, photos, and other data that should only be available to paid subscribers and legitimate consumers.
Review this presentation to learn how to avoid expensive litigation by protecting your content before the theft occurs. Review the latest research on how non-human traffic has evolved over the past few years and best practices to protect both copyrighted and non-copyrightable content.
Hear the results from research conducted with property portal executives on the current state of anti-scraping efforts.
The document discusses various internet marketing technologies used in e-commerce. It describes features of e-commerce technology that impact marketing like ubiquity, global reach, richness, interactivity and personalization. It also discusses how web transaction logs, cookies, and other tracking files can be used to gather customer data. Other topics covered include databases, data mining, big data analytics using Hadoop, marketing automation, CRM systems, online marketing metrics, and costs of online advertising.
Possible cookie substitutions (cookieless tracking) - The Cookie CrumblesRobert Ressmann
Arms race on OnSite, AdTech and Publisher side. In times of Browser Tracking Prevention, DSGVO & Adblocking the question arises how the online industry can deal with the crumbling cookie or replace it with a substitute... Here are a few possibilities.
[cookie substitution, consent, GDPR, adblocking, tag, tracking, targeting, retargeting, fingerprinting, customer journey, dco, attribution, etag, cache, meta data, login alliance, itp, etp, walled garden, adid, werbeid, unifiedid, household graph, cdp, taxonomie, dmp, 1st party, segment, 3rd party, doh, programmatic, havas, havasmedia, ressmann, online media, display, advertising, martech, adtech, data driven, s2s]
GDPR Compliance Software | General Data Protection Regulation (GDPR) DashboardCorporater
GDPR governance & DPO dashboard:
Corporater offers an all-in-one actionable dashboard solution that gives your Data Protection Officer complete oversight into your compliance activities related to GDPR.
Corporater GDPR integrates with your existing systems to provide a complete overview of all your data protection activities:
1. Implement GDPR projects and activities
2. Monitor GDPR metrics
3. Audit GDPR articles
To know more, visit: https://corporater.com/en/business-solutions/governance-risk-and-compliance/gdpr-software/
The document discusses GDPR and data lakes. It explains that GDPR is the most important change in data privacy regulation in 20 years. It outlines the data controller's responsibilities under GDPR including lawfulness of processing, records of processing activities, and data protection by design. It also discusses data subjects' rights such as right of access, data portability, and right to be forgotten. The document then examines GDPR considerations from the perspective of a data lake, such as techniques for anonymization and pseudonymization of personal data. It provides recommendations for solutions to ensure GDPR compliance when using a data lake.
This document discusses blackhat analytics techniques such as dark tracking and intentionally distorting web analytics data. It begins with defining blackhat analytics and providing examples of early blackhat techniques from pre-2010. It then discusses classifications of good and bad analytics data and potential penalties for violations. It notes an increase in online competitiveness and revenue at stake could lead to more malicious analytics practices. The document warns of increased scrutiny from organizations like Google's planned privacy "Red Team" and potential class action lawsuits in response to privacy issues.
How businesses can benefit from privacy preserving synthetic dataBenjamin Nolan
In this webinar we discuss privacy, it's relevance to data science, and how privacy-preserving synthetic data can help organizations build a bridge between compliance and efficient use of data.
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
This document discusses building a real-time fraud detection system using big data technologies. It outlines the cyber threat landscape, what anomalies and fraud detection are, and proposes an architecture with a data layer to integrate various sources and an analytics layer using stream processing, rules engines, and machine learning to score transactions in real-time and detect fraud. The system aims to scalably and reliably detect threats for increased security.
2009 How To Select A Social Media Monitoring Vendor PartnerMarcus Tewksbury
This document provides guidance on selecting a social media monitoring vendor partner. It discusses key things to consider, such as whether to use a self-service or outsourced solution. When evaluating vendors, questions should focus on their methods for collecting, storing, and analyzing social media data to ensure comprehensive coverage, access to historical data, and control over analyzing the results. The goal is to find a flexible partner that provides actionable insights and automated reporting.
The cookiepocalypse is coming and third-party cookies' reign over the web will come to a close. Are you ready for a cookieless future? This presentation from Media Kitchen explores why cookies are crumbling, the resulting impact across the ecosystem, and early steps advertisers can take to prepare.
The document discusses various methods for tracking digital performance, including on-network and off-network measurements. It notes the importance of aligning measurements with business objectives and considering unintended consequences. Cookies and tracking codes are described as the backbone of online measurement and targeting. Issues around online advertising metrics like unique visitors and discrepancies between data sources are also summarized.
This document discusses how digital advertising is undergoing seismic shifts as third-party cookies are phased out. It provides context on cookies and how they are used for tracking and targeting ads. With Chrome announcing it will no longer allow third-party cookies by 2022, marketers are scrambling to adapt. The death of the cookie will change digital marketing tactics and require a focus on first-party data and building direct customer relationships through authenticated experiences. A cookieless future relies on having a unified single view of the customer, which can be achieved through implementing a customer data platform. The document discusses examples of how companies have used Acquia's customer data platform to gain insights from unified customer data and improve marketing performance.
Data Restart 2022: Marina Mchedlishvili - How to build strong data strategies...Taste
Google may have postponed the end of third-party cookies to 2024, but the effects on data collection and data management are already visible. The restrictions on legal frameworks and browsers are increasing every day. Businesses and marketers are struggling to improve campaign performance, face data losses and lack visibility on the purchase journey to drive business opportunities. In the post-cookie world, there is one thing that is certain: consent is here to stay. In the future, there will only be data with consent, or no data at all. Join us for this session, where we will talk about how to improve your data strategy by leveraging consent in a post-cookie era.
Digital marketing without 3rd party cookiesJakub Otrząsek
Nowadays 3rd party cookie does not work for ~40% of the traffic
New campaign strategies are required to adapt to the current situation
There is a need for new solutions, which will maintain the balance between privacy and personalised experience
As predicted a year ago, another browser implemented ITP alike functionalities (Firefox).
It is a matter of time until other browsers implement more restrictions around 3rd party cookies.
It is also important to account that tools like “ghostery” or “adblocker” are gaining popularity with time.
This document provides an introduction to web analytics. It defines web analytics as the measurement, collection, analysis and reporting of internet data to understand and optimize web usage. The main goals of web analytics are to measure traffic, understand user behavior on websites, and optimize websites. It discusses different categories of web analytics including on-site and off-site analytics. Common web analytics tools like Google Analytics use page tagging to collect data as users interact with websites. Key metrics that web analytics measures are discussed like visits, time on site, bounce rate, and conversion rate. The document also covers common web analytics products, how data is collected and stored, and factors to consider when selecting a web analytics tool.
This document discusses various topics related to cyber ethics and online privacy and security. It provides tips for safe browsing, discusses how websites can track users through IP addresses, cookies, and other techniques. It also outlines best practices for ensuring confidentiality of information online and defines different types of cyber crimes like cyberbullying, cyber trolls, and more.
We all use several devices and browsers to visit the same content on the web, on mobile and apps. A few months ago we were guessing and trying to get a grip on the customer journey on all these devices. But now the time that we can measure, estimate and understand cross device usage has arrived! Learn how to understand and setup cross device measurement. What can you learn from it and what are the benefits to understand the cross device behavior of your customers?
How To Promote Your Online Visibility Using Web Analytics. How To Promote You...Overalia
This document discusses key concepts for understanding and optimizing web analytics, including:
1. Defining objectives and identifying potential customers to focus analytics efforts.
2. Generating traffic through various acquisition channels like search engines, display ads, email marketing, and integrating campaigns in Google Analytics.
3. Segmenting data by user types, content, campaigns etc. to more easily measure and optimize performance. The overall goal is to improve conversion, retention and acquisition.
Media-Scanner-for-Data-Protection-Ad-TagsKenan Marks
Third party tags and codes on websites can cause valuable first party user data to leak off the site without the site owners' knowledge or compensation. The Media Scanner service detects, analyzes, and reports on all ad tags on a website to identify instances of data leakage and notify site owners so they can quickly resolve issues and better protect user data and their brand. Media Scanner provides continuous monitoring of ad tags to catch data leakage on a 24/7 basis through servers located around the world.
Ensuring Property Portal Listing Data SecurityDistil Networks
Securing your property portal listing data is harder than ever. Why? Web scraping is cheap and easy. Bots simply steal whatever content they’ve been programmed to fetch – listing text, photos, and other data that should only be available to paid subscribers and legitimate consumers.
Review this presentation to learn how to avoid expensive litigation by protecting your content before the theft occurs. Review the latest research on how non-human traffic has evolved over the past few years and best practices to protect both copyrighted and non-copyrightable content.
Hear the results from research conducted with property portal executives on the current state of anti-scraping efforts.
The document discusses various internet marketing technologies used in e-commerce. It describes features of e-commerce technology that impact marketing like ubiquity, global reach, richness, interactivity and personalization. It also discusses how web transaction logs, cookies, and other tracking files can be used to gather customer data. Other topics covered include databases, data mining, big data analytics using Hadoop, marketing automation, CRM systems, online marketing metrics, and costs of online advertising.
Possible cookie substitutions (cookieless tracking) - The Cookie CrumblesRobert Ressmann
Arms race on OnSite, AdTech and Publisher side. In times of Browser Tracking Prevention, DSGVO & Adblocking the question arises how the online industry can deal with the crumbling cookie or replace it with a substitute... Here are a few possibilities.
[cookie substitution, consent, GDPR, adblocking, tag, tracking, targeting, retargeting, fingerprinting, customer journey, dco, attribution, etag, cache, meta data, login alliance, itp, etp, walled garden, adid, werbeid, unifiedid, household graph, cdp, taxonomie, dmp, 1st party, segment, 3rd party, doh, programmatic, havas, havasmedia, ressmann, online media, display, advertising, martech, adtech, data driven, s2s]
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
This document discusses ensuring security of property portal listing data from web scraping. It begins by defining web scraping as the automated copying of large amounts of data from websites. While some scraping is acceptable, malicious scraping can result in the theft of intellectual property like pricing, content, images and proprietary data from real estate portals. This damages brands through inaccurate data presentation and SEO impacts. The document notes that the cost of scraping has decreased while bot sophistication has increased, posing a growing problem for portals. However, most portals rely on outdated tools like IP blocking to address scraping that modern bots easily evade. Effective defenses require techniques like device fingerprinting and behavioral analysis. The session aims to help portals avoid expensive litigation by securing
SEO in a World of AI
Presentation Description (150 words max):
Author and Adjunct Professor Steve Wiideman presents a holistic masterclass on search engine optimization for the constantly changing search engine results. Learn how to prepare your website for generative AI, increase visibility in social search, and double-down on timeless SEO principles. Disciplines covered include technical SEO, content strategy and webpage optimization, off-page SEO, and optimizing for generative AI search.
Key Takeaways:
1. Have a plan to prepare for search generative experience (SGE)
2. Discover techniques to be found in TikTok, Instagram, and YouTube for Gen Z and Gen Alpha
3. Get a foundation refresher for core SEO best practices in tech, content, and off-page SEO
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityShubhamGupta410081
We and our partners store and/or access information on a device, such as unique IDs in
cookies to process personal data. You may accept or manage your choices by clicking
below, including your right to object where legitimate interest is used, or at any time in the
privacy policy page. These choices will be signaled to our partners and will not affect
browsing data.
In the rapidly evolving business landscape, agility and responsiveness are key. This article delves into the importance of harnessing and acting on the vast data available to businesses. It highlights the need for companies to become proactive 'thermostats' rather than reactive 'thermometers' in their environment, emphasizing the role of strategic automation in achieving this goal.
The presentation explores five critical barriers to data-driven maturity: scalability, efficiency, consistency, accuracy, and the tech stack. Each section provides insights into overcoming these challenges through smart automation and data handling strategies. For example, it discusses how scalability can be achieved by automating data processing, and how efficiency in data analysis leads to more strategic and creative business practices.
It also touches upon the future of business and technology, predicting that 90% of data will become actionable in real-time through machine learning, and AI will play a significant role in transitioning to a 4-day work week. This shift promises greater efficiency and a better balance between professional and personal lives.
Finally, it introduces Baresquare as a comprehensive solution to these challenges. As an enterprise-level SaaS product, Baresquare streamlines data handling and decision-making processes, offering real-time actionable insights through its AI-powered analytics platform. It positions itself as a tool that not only meets current business needs but also paves the way to a smarter, AI-driven future in business operations.
More details available in this blog post:
https://tzamtzis.gr/2023/business-life/act-fast-revolutionizing-data-driven-decisions/
Panagiotis Tzamtzis has just returned from MeasureCamp 12, in London, and explained at the Digital Analytics Meetup Thessaloniki what exactly the MeasureCamp phenomenon is. MeasureCamp managed to transform in a few years, from a small English digital analytics community to a meeting that runs on an international level. Through his presentation, he also gave us a review of the presentations that stole the show that day.
An introduction to most common digital analytics tools, their intended use cases and smart ways to use them to improve a website's online experience. Includes web analytics, session recording, heat-maps, online surveys and A/B testing tools.
The talks was presented in Thessaloniki's digital analytics meetup and describes how someone can start tracking a corporate or even a smaller website using web analytics platforms. It's an introductory talk which focuses mainly on the processes someone must follow to ensure high quality results and satisfy both business/marketing teams and the development team, which will be part of the project.
In-store analytics - Digital analytics meetup, ThessalonikiPanagiotis Tzamtzis
Retail is going through some hard times over the past couple of years. This means that there's need for change. Data-driven decisions have helped online stores in the past. Can a similar approach help also offline stores. We examine the current market status, and options available for data measurement and analysis.
TechSaloniki 2017 - Google Tag Manager: Ευελιξία και δύναμη στην ιστοσελίδα σαςPanagiotis Tzamtzis
Το Google tag manager (GTM) είναι ένα Tag Management System (TMS) που δίνει την δυνατότητα να κάνουμε εύκολα και γρήγορα αλλαγές στον πηγαίο κώδικα ενός website. Συνήθως χρησιμοποιείται από ομάδες marketing με σκοπό την ανάλυση της κίνησης του website (analytics) και την βελτιστοποίηση των εργαλείων προώθησης της ιστοσελίδας. To GTM, όπως και πολλά άλλα TMS, χρησιμοποιείται από εκατομμύρια website, αφού είναι μια από τις τεχνολογίες που έχουν εξελίξει το web marketing και τα web analytics τα τελευταία χρόνια.
Στο συγκεκριμένο workshop θα ανακαλύψουμε μαζί πως λειτουργεί ένα TMS και τους λόγους που θεωρείται απαραίτητο σήμερα. Όπως επίσης θα δούμε πρακτικές εφαρμογές που μπορεί να ξεφεύγουν από αυτές που φαντάζεται ένα αρχάριος χρήστης.
Το περιεχόμενο ενδείκνυται για όσους έχουν χρησιμοποιήσει κάποιο εργαλείο web marketing ή web analytics (π.χ. Google analytics, Floodlight κτλ) και θέλουν να δουν πως μπορούν να δώσουν ακόμα περισσότερο νόημα στα δεδομένα που συλλέγουν. Και για αυτούς που έχουν γνώσεις web development και θέλουν να κάνουν την διαδικασία ανανέωσης ενός website πιο εύκολη και γρήγορη.
How we imagine the future of digital analytics, how we think they can improve our every day life and also educate them on the web tracking technologies and the risks
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
Web analytics & Online privacy
1. Panagiotis Tzamtzis, Head of Data-ops @ baresquare.com
Digital Analytics Meetup, Thessaloniki #20
Webanalytics
&DATA
Privacy
2. PErsonal data Protection
The individual’s right to keep his or her data to himself or herself
Privacy
The principle of keeping secure and secret from others,
information given by (or about) an individual in the course of a
professional relationship
Confidentiality
The ability to keep data safe from unauthorized access
Security
3. Doweneed onlinetracking?
What is online tracking used for, besides ads:
● Fraud prevention
● Personalization
● Data exchange between websites
● Bot detection
● Performance tracking
● Helping websites remember settings
1) The web is dumb!
2) The web runs on ads
4. Tracking
Mechanisms
● Cookies
● Localstorage / Sessionstorage
● Link decoration
● User accounts - Login
● Server-side tracking
● Shared device databases
● Fingerprinting
● Unique identifiers / interactionsWHAT ? HOW ? WHY ?
5. Server
SIDE
The data which get
processed by the
server and then get
presented to the
client in a static
format
(e.g. PHP)
Client
SIDE
Everything that
gets executed /
stored on the
device used to
browse the web
(e.g. JavaScript)
(Server-side vsclient-side)
6. Cookies
Small files (up to 4096 bytes) specific to each root domain stored client-side
Cookies were created 25 years ago to allow web systems remember (e.g. visited links)
Important difference between 1st party & 3rd party cookies!
1st party: Cookies under the domain you are visiting (e.g. save preferences)
3rd party: Cookies created under different domains (e.g. retargeting ads)
Used in online tracking to remember visitors and also share visitor data with 3rd parties
(Used in online marketing to store an ID, unique to a specific visitor)
7. LOCALSTORAGE /sessionstorage
Simple storing mechanism (key-value pairs) for text (limit per domain: 2MB - 10MB).
Stored values are specific to a subdomain
Can replace or work alongside cookies to make storage more persistent
Localstorage: Data is stored forever unless the user deletes them
Sessionstorage: Data gets stored until the end of the session
Used in online tracking to remember visitors on the same website
(Used in online marketing to store an ID, unique to a specific visitor)
8. Linkdecoration
Text key-value pairs inside the URL:
http:s//example.com?id=123&sid=456#visitor
Used in conjunction with cookies and localstorage and could even replace it in some
cases.
Used in online tracking to share information from one domain to another.
(e.g. when a website contains multiple domains, we can use link decoration to identify
visitor consistently across multiple domains)
9. shifttofirstparty cookies
3rd party cookies are not very usable anymore in marketing.
Online marketing technology is shifting to first party cookies, localstorage and link
decoration to identify a visitor. Data is sent back to their servers using tags.
FBCLID=123
UID=ABC Tracker
combines
data
3rd party
service
stores data
FACEBOOK TRACKING
10. USERaccount
Identifies visitors after logging in and combines profile data with web behaviour.
Eliminates the need of cookies and localstorage in most cases, as it can store
information server-side.
Ideal when aiming for personalized experiences, immune to anti-tracking
technologies today and works great across multiple devices.
(e.g. Amazon account)
11. Server-side tracking
Combination of user account tracking and cookies/localstorage. Without having a user
account, the website stores, server-side, all the information it collects.
Limited scope of information it can collect, partially immune to anti-tracking
technologies. Still relies on cookies to identify visitors consistently. Combined with
client-side tracking
Not widely used because of the dependencies it creates with the website’s development
process. Immune to adblocking and most anti-tracking technologies.
12. Shared devicedatabases
Improves cross-device visitor tracking by sharing pseudonymized information across
different companies and using a common device database. Relatively new concept in
online marketing.
Dramatically reduces the time needed for a new website to provide uniform
personalized experiences and to collect more meaningful web analytics data (Multi-
channel attribution modelling).
Not widely used because of legal complications.
Example: Adobe Experience cloud device co-op (Available only in NA)
13. FingerPrinting
Queries for all publicly non-private available information and finds unique patterns
allowing a website to identify a visitor on every session.
Examples of public information:
IP, Screen info, installed plugins & fonts, Time zone, user agent, battery information etc.
Very invasive technique which is not widely used in online marketing. Useful when trying
to identify fraud and to protect accounts from unauthorized access.
14. Uniqueidentifiers /interactions
Uses information entered by the visitor (e.g. newsletter sign-up) or unique interactions
(e.g. when calling to a unique phone number found on the website) to capture more
detailed information. Similar to link decoration.
Useful when trying to create a common key between the online and offline
presence of an organization or between 2 different channels.
Used in advanced implementations.
Difficult to manage and requires technical skills ETL tools
17. DNT (Donot track)
A flag available in each browser’s settings, indicating if the user wants to get tracked or
not. This value is set to “false” by default (Tracking enabled).
Each website needs to be created in a way that is going to respect this setting and turn
off tracking when DNT is set to TRUE.
GUESS WHAT! This setting is not monitored by most websites and is now considered
obsolete...
18. Ad-blockers /tracking firewalls
Plugins / Extensions built to block either ads or tracking pixels.
A visitor / website owner selects the tracking pixels she wants to block and every time a
call to that pixel’s server is detected, it gets blocked (client-side).
Website owners can utilize them to control which tracking pixels are collecting traffic
on their websites (especially useful for very large websites with multiple tags).
Visitors can have faster page load times, but these tools can only detect common
patterns. Relatively easy to workaround the restrictions.
19. Legislation
● GDPR (25 May 2018)
Applies to data collected for EU citizens.
Opt-in required before collecting data
● CCPA (01 Jan 2020)
Applies to consumers in California
Opt-out should be available when collecting private data
Both rules enhance the privacy, confidentiality, security and transparency of
organizations working with personal data.
20. Google offers tracking solutions (see
Google analytics) and also profits
from online advertising. It’s expected
that Google Chrome will be less
hostile against tracking solutions.
Non-profit organization, offering a privacy
oriented browser, with projects/funds
aimed at changing how the world wide
web operates (e.g. brave browser)
Google
Chrome
MOZILLA
FIREFOX
Apple
SAFARI
Apple is profiting from
mobile app sales and
services targeted to Apple
users. No real need for
tracking technologies,
justifies their “war”.
Microsoft is not putting a lot of effort
lately on new browser features and just
follows the bigger players.
MICROSOFT
EDGE
Other
browsers
No need to pay attention
unless you are managing a
website spanning across
multiple regions.
BRoWSER Market Overview
22. Browser Market share
Release
date
Web analytics
impact
Online ads
impact
Google
chrome
60%
Q1 2020
(SameSite)
Low impact Medium impact on 3rd party Ads
Safari 15%
Q2 2019
(ITP 2.2)
High impact
(Accuracy limited to 7 days)
Retargeting limited to 1 day
Mozilla
Firefox
5%
Q3 2019
(ETP)
Low impact
Medium - High impact on 3rd party
ads
Edge,
Opera etc.
10% TBA Low impact Low impact on 3rd party ads
BRoWSER Tracking protection
?
Quiz
?
27. SAFARI ITP
ITP Version
Client-side cookie expiration
Localstorage
expiration
Safari Versions
Impact analysis
1st party 3rd party Website analytics Ads retargeting
1.0
(Jun 2017)
Unlimited 24h Unlimited
Safari 11.0
OS X 10.11
macOS 10.13
Impacts only
cross-domain tracking
Small impact
2.0
(Jun 2018)
Unlimited Session Unlimited
Safari 12.0
OS X 10.12
macOS 10.14
Impacts only
cross-domain tracking
Very high impact on
retargeting functionality
2.1
(Mar 2019)
7 days Blocked Unlimited
Safari 12.1
iOS 12.2
macOS 10.14.4
High impact on
visitor identification
Very high impact on
retargeting functionality
2.2
(May 2019)
1 to 7 days Blocked Unlimited
Safari 12.2
iOS 12.3
macOS 10.14.5
High impact on
visitor identification
Very high impact on
retargeting functionality
2.3
(Sep 2019)
1 to 7 days Blocked
7 days
(decorated links)
Safari 13
iOS 13
macOS 10.15
High impact on
visitor identification
Very high impact on
retargeting functionality
28. SAFARI ITP
3rd party cookies
1st party cookies
Localstorage
Blocked
Server side
Client side
No expiration
Direct
With tracking
7 day expiration
1 day expiration
Direct
With tracking
No expiration
7 day expiration
29. MOZILLA FirefoxETP
Current status:
● Blocks 3rd party cookies by default
● Blocks crypto mining scripts by default
Future updates:
● Blocking rules will be expanded to fingerprinting scripts
Low impact on web analytics accuracy and medium to high impact on retargeting.
30. GoogleChromeSamesite
Q1 2020 updates:
● Blocking of fingerprinting scripts
● Plugin offering better visibility on displayed ads
● Cookies will need to indicate if they can be used as 3rd party to give visitors more
control (SameSite flag)
● 3rd party cookies will only be accessible via HTTPS
This approach will not be as hostile as Safari’s ITP to online ads, but will cover every
workaround for 3rd party cookies.
31. Web analytics is changing!
Prepare for an online world without cookies...
Want to learn more?
● Analytics power hour podcast
● Google chrome changes in more detail
● Safari ITP’s impact on cookies webinar
● Gearing up for a cookie-less future presentation
● How anti-tracking affects analytics
32. CREDITS: This presentation template was created by Slidesgo,
including icons by Flaticon, and infographics & images by
Freepik.
THANKS
Panagiotis Tzamtzis
Head of data-ops @ baresquare.com
panagiotis@tzamtzis.gr
tzamtzis.gr
Editor's Notes
Privacy
Determine what information is collected about them and how it is used.
Access information held about them and know that it is accurate and safe.
Anonymity
First-party vs 3rd party cookies
4096 bytes is the safest limit where you can be sure that nothing will break (All browsers should support a cookie storage / domain of at least 4096 bytes)
)
We cannot share cookies between different domains
+cookies
Legislation = data protection & security (& not just about the web)
The internet runs on tags
Chrome: Cookie ownership
3rd party - say why you are using them
2.3 Referring URLs containing tracking info
2.2 server