June, 2012

article thumbnail

Apple To Kill Ping, Add Facebook

John Battelle's Searchblog

( image ) I know you all know that Apple has cut a deal to integrate Facebook , because of the relentless coverage of Apple’s developer conference this week. However, I just saw this story from ATD: Apple’s Ping to End With a Thud in Next Release of iTunes And thought to myself – “Hey, didn’t I predict that a while back?

IT 98
article thumbnail

Microsoft's scattered strategic vision

Collaboration 2.0

Enterprise customers continue to be frustrated by a lack of clarity or momentum in key areas around business productivity ‘front office’ strategy from Microsoft; partners are picking up the slack but some big questions are being asked this summer

88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why is IBM System z Essential to Your Business?

Robert's Db2

Earlier this year, some of my colleagues and I who work with IBM information management software for the System z platform were invited to write essays addressing the question, "Why is IBM System z essential to business?" I decided to act on this invitation, and to get my creative juices flowing I imagined an impromptu conversation with a skeptical CEO on the business value of System z.

Retail 69
article thumbnail

The social life of email at Enron - a new study

ChiefTech

Probaby one of the few positive things to come out of the Enron scandle was that it gifted social scientists a data set of real corporate email that could be analysed for research purposes. A recent study [PDF] used this data to look at 'gossip'. Now hang on for a second before you jump to conclusions, lets define what we mean here. Anthropologists define gossip as: "the absence of a third party from the conversation [and it] is fundamental to healthy societies—from small groups to large,

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK Ministry of Justice Outlines Negotiating Position on European Commission’s Proposed Regulation

Hunton Privacy

On June 28, 2012, the UK Ministry of Justice outlined its negotiating position on the proposed EU Data Protection Regulation (the “Proposed Regulation”) in its published “ Summary of Responses – Call for Evidence on Proposed EU Data Protection Legislative Framework ” (the “Summary”). The Call for Evidence sought to gain perspective and solicit feedback on how the Proposed Regulation would impact organizations and individuals in the UK.

More Trending

article thumbnail

In 1844, Morse Gets The Scoop, Then Tweets His Dinner

John Battelle's Searchblog

I’m reading a fascinating biography of Samuel Morse - Lightning Man: The Accursed Life Of Samuel F.B. Morse by Kenneth Silverman. I’ll post a review in a week or so, but one scene bears a quick post. Morse successfully demonstrated his telegraph between Baltimore and Washington DC in May of 1844. Three days later the Democratic party convention commenced in Baltimore.

article thumbnail

Microsoft to marry Yammer

Collaboration 2.0

The old guard are marrying off upstart competitors into their product portfolios. B is he battle for supremacy among Microsoft, IBM, SAP and Oracle still relevant — and has it scarred long-term relationships with customers?

IT 86
article thumbnail

The ONE Key Aspect of DB2 for z/OS Table-Controlled Partitioning that People Seem Most Likely to Forget

Robert's Db2

Sometimes, an important DB2 for z/OS feature can be out there for years, and yet not be fully appreciated by lots of people in the DB2 user community. Table-controlled partitioning is such a feature. In this blog entry I want to generally set the record straight about table-controlled partitioning, and in particular I want to make sure that mainframe DB2 folks understand a key aspect of this physical database design option that for some reason eludes many users to this day.

Mining 48
article thumbnail

Lessons from designing mobile digital public services

ChiefTech

Designing a mobile application that lets mental health service users register their mood and activity daily proved a long and challenging road. Adil Abrar shares five important lessons. via guardian.co.uk. Five lessons from the experience of designing the "Buddy" app are: Find the right part of the health system to work with; Focus on creating a minimum viable product; Embrace 'agile' development fully to get the most out of bringing designers, developers and strategist to create the solution; E

62
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NLRB on a Mission to Curb Anti-Social Media Policies in the Workplace

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : In recent years, the National Labor Relations Board (“NLRB”) and unions have placed a growing emphasis on extending the application of labor law into the social media arena. As part of this initiative, the NLRB has adopted a strong stance against social media policies that it believes pose a threat to employees’ right to engage in protected activities under Section 7 of the National Labor Relations Act (“NLRA&

IT 40
article thumbnail

Updating the Site URL Property of Your SharePoint Development Project

JKevinParker

I admit my Visual Studio 2010 and SharePoint development skills are a little rusty. After all, I have spent the last year or so engaged solely in SharePoint and information architecture planning. But that doesn't take away from the fact that SharePoint and Visual Studio development can be more than a little kludgy. When attempting to deploy one of my new projects to my SharePoint server, I received this error message: Error occurred in deployment step 'Recycle IIS Application Pool': Cannot conne

article thumbnail

When You’re Stuck, Go Out And Talk To People

John Battelle's Searchblog

Yay! It's a nameless hotel ballroom! But the people who fill it are what matter. I had one of those kind of days yesterday that reaffirm my belief in our industry, in its people, and in the work I do. It’s not easy to sit here and write, much less write a book, and I’ll admit lately my faith (and my productivity) has flagged – there’s so much work left to do, so little time in which to do it, and so many other things – Federated Media, conferences, board positio

article thumbnail

Generation connected looks for clues

Collaboration 2.0

For ‘Generation Connected’, talk about what is possible and trends are dime a dozen, but everyone is looking for evidence of practical, experiential business successes

76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Article 29 Working Party adopts document on BCRs for processors

Privacy and Cybersecurity Law

Following our recent blog post, the Article 29 Working Party has adopted a document (WP195) on Binding Corporate Rules (“BCRs”) for processors […].

40
article thumbnail

Observations from the Enterprise 2.0 Conference

ChiefTech

A few of the reports from the Enterprise 2.0 Conference this week included some interesting observations. From NetworkWorld : Past Enterprise 2.0 conferences have suffered from a lack of end-user case studies, but that didn't seem to be the case this year. Many presentations were akin to business management seminars rather than technology discussions, with the technical nuts and bolts of the software selection and implementation process kept in the background or not mentioned at all.

IT 58
article thumbnail

Connecticut Amends State Breach Law Amid Introduction of Federal Breach Notification Legislation

Hunton Privacy

In recent weeks, both state and federal regulators have considered security breach notification legislation. On June 15, 2012, Connecticut Governor Dannel Malloy signed a budget bill that, among other things, amends the state’s security breach notification law. The changes, which will take effect on October 1, 2012, most notably require businesses to notify the state Attorney General no later than the time when notice of a security breach is provided to state residents.

article thumbnail

Google’s Transparency Report: A Good And Troubling Thing

John Battelle's Searchblog

A couple of days ago Google released its latest “ Transparency Report ,” part of the company’s ongoing commitment to disclose requests by individuals, corporations, and governments to change what users see in search results and other Google properties such as YouTube. The press coverage of Google’s report was copious – far more than the prior two years, and for good reason.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Do Not Track Is An Opportunity, Not a Threat

John Battelle's Searchblog

This past week’s industry tempest centered around Microsoft’s decision to implement “Do Not Track” (known as “DNT”) as a default on Internet Explorer 10, a browser update timed to roll out with the company’s long-anticipated Windows 8 release. Microsoft’s decision caught much of the marketing and media industry by surprise – after all, Microsoft itself is a major player in the advertising business , and in that role has been a strong proponen

article thumbnail

Google’s “Mute” Button: Why Didn’t I Think Of That? Oh, Wait…

John Battelle's Searchblog

One of my pet peeves about our industry is how slowly we change – I understand it takes a long time to gather consensus (it took three years to get AdChoices rolled out, for example) – but man, why don’t the big players, like Google, innovate a bit more when it comes to display advertising? Well, yesterday Google did just that, announcing a “mute this ad” feature that it will roll out across its network over the next few months.

article thumbnail

ION Air Pro simplify wearable HD cameras

Collaboration 2.0

ION Air add cloud native capabilities to their new ‘Point-of-view action-sport camcorder’ range, along with easy to use on/off recording

Cloud 85
article thumbnail

Four Letter Words

John Battelle's Searchblog

If you’ve been following this site for a while, you’ll remember my experiment earlier this year with posting pictures of wine, bike rides, and other “life” things. Many of you liked those posts, others, not so much. (Here’s one example.) My reason for posting these photos was pretty simple – I prefer to have my content emanate from my own site, rather than be bound to Facebook, Pinterest, Instagram or some other third-party walled garden.

IT 68
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

It’s Hard to Lay Fallow

John Battelle's Searchblog

I’ll admit it, I’m one of those people who has a Google News alert set for my own name. Back in the day, it meant a lot more than it does now – the search results used to pick up blog mentions as well as “regular” news mentions, and before FacebookLand took over our world (and eschewed Google’s), a news alert was a pretty reliable way to find out what folks might be saying about you or your writing on any given day.

Sales 65
article thumbnail

How Not To Post A Comment

John Battelle's Searchblog

Recently my site has been hit with a ton of “manual spam” – folks who are paid to post short comments in the hope they’ll appear and drive pagerank back to various sites (or perhaps just increase their or their clients’ visibility.) It’s not hard to kill these comments, though it’s a bit of an irritant when they pile up.

IT 65
article thumbnail

You do need a strategy for your enterprise social network, says Yammer

ChiefTech

via blog.yammer.com. A great post from Stephen Danelutti at Yammer explaining why even if you use viral adoption as a catalyst to get started, you still need a strategy: "The ease of use and virality of a platform like Yammer can be deceivingly simple and lead people to think that a deliberate strategy is not necessary. That’s a mistake, because without direction and an end goal in mind, the network will simply meander and fail to deliver business value.".

56
article thumbnail

Kanban rather than KM

ChiefTech

While studying Lean in general and Kanban in particular (and making the same bias as the KM evangelists, i.e establishing relationships that may not be relevant between two disciplines I’m passionate about) I’ve noticed this common trait with Social Software. By making the flow of work visible through actionable information , these simple tools lower the level of water and allow to surface deeply hidden organisation problems.

IT 54
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Tony Byrne: Enterprise social software is not all the same

ChiefTech

When evaluating [enterprise social software], it's best not to create "checkbox RFPs" that allow vendors check off all the features they provide, Byrne said. Rather, ask how they address those requirements, seeking to tease out details on the differences between platforms. Focusing too much on software features is a mistake, when you really should be trying to identify a match for the specific types of collaboration you want to facilitate.

IT 54
article thumbnail

Embracing Mobile at the Australian Broadcasting Corporation

ChiefTech

Mobile 2012 Manuela Davidson View more presentations from CeBIT Australia via slideshare.net. Presentation by Manuela Davidson about the ABC's journey into mobile. Davidson advises: "Forget mobile phone, think mobile computing". Permalink.

52
article thumbnail

Time, place and context for a mobile knowledge worker

ChiefTech

via headshift.com.au. Cross posted from the Headshift Asia Pacific blog, this is one in a series of diagrams I'm sharing from my forthcoming report on mobile apps for business. This diagram is an example of what I call a situational map, intended to help designers explore possible scenarios where mobile apps could be used. See the original post for further explanation.

49