January, 2013

article thumbnail

It’s Time To Call Out Fraud In The Adtech Ecosystem

John Battelle's Searchblog

The post It’s Time To Call Out Fraud In The Adtech Ecosystem appeared first on John Battelle's Search Blog. A confusing landscape = ripe opportunities for fraud. As part of research I’m doing both for the book and for my upcoming conference (the CM Summit, more on that soon), I’ve been in pretty extensive conversations lately with dozens of key players in the advertising technology industry.

Marketing 112
article thumbnail

The overconfidence problem

Collaboration 2.0

The cult of me continues.data from a survey of US freshmen shows increasing perceptions of being 'above average': Are they deluded or the greatest generation?

94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Self-service checkouts - love them or hate them, its all about the customer

ChiefTech

Self-service checkouts in supermarkets and other retails shop fronts are fascinating on so many levels - from their design to the ethical dilemma of replacing people with machines. Writing recently recently in Computerworld, Patrick Thibodeau reports that while some retailers in the US are installing more self-service technology, others are now removing them.

Retail 74
article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

IT 62
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DB2 for z/OS Data Sharing: the Lock List Portion of the Lock Structure

Robert's Db2

With DB2's data sharing capability having been introduced back in the mid-1990s with DB2 for z/OS Version 4, a great many people -- including lots of folks whose organizations do not run DB2 in data sharing mode -- are quite familiar with the technology (for people new to this subject area, I posted, a few years ago, a "What is DB2 Data Sharing?" entry to the blog that I maintained while working as an independent DB2 consultant).

More Trending

article thumbnail

Facebook Is No Longer Flat: On Graph Search

John Battelle's Searchblog

The post Facebook Is No Longer Flat: On Graph Search appeared first on John Battelle's Search Blog. A sample Graph Search result for the query “friends photos before 1999.” By now the news is sweeping across the blogosophere and into the mainstream press: Facebook is doing Search! Well, not so fast. Facebook is not doing search, at least not search Google-style.

Privacy 112
article thumbnail

The value of automation question

Collaboration 2.0

Is there too much reliance on software to lead businesses into the future? Strategic thinking should arguably come from within firms, not as purchased generic techniques & enabling tools.

77
article thumbnail

Reflecting on Government 2.0 in Australia

ChiefTech

I apologise for the limited coverage of Government 2.0 in recent times. Its not from lack of interest by any means. At the federal level in Australia I've had the opportunity to work with a large agency over the last few years where it has been interesting to see from the inside the influence of the Government 2.0 movement (if we can call it that). It is definitely having an impact on how they approach technology and social media, although the end results might not be immediately obvious.

article thumbnail

Do your customer calls all look the same? They shouldn’t.

Dark Reading

Without the ability to verify the Caller ID or ANI, all customer calls can look the same to call center agents. This a risky proposition for any financial institution that handles thousands of customer calls each day. In other words, if all calls appear the same there’s no way to answer some of the key questions all banks should know about customer calls, such as: Which calls are trustworthy?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 for z/OS: An Interesting "Flip Side" to Native SQL Procedures

Robert's Db2

I heard the other day from a DB2 for z/OS DBA who communicated to me an interesting story. His organization had recently gotten into development and deployment of native SQL procedures on the mainframe DB2 platform. The native SQL procedures were working as advertised, but the move to utilize this DB2 technology had engendered grumbling on the part of some of the organizations' application programmers.

Access 48
article thumbnail

UK ICO Publishes Further Views on the European Commission’s Revised Data Protection Framework

Hunton Privacy

Following up on the UK Information Commissioner’s Office’s (“ICO’s”) positive reaction to the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”), the ICO has now published additional thoughts on the European Commission’s proposed revised data protection framework , reacting to the recent draft report prepared by the rapporteur to the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs, Jan Philipp Albrecht.

article thumbnail

A Month In With The Nexus 4: Google Strengths Emerge

John Battelle's Searchblog

The post A Month In With The Nexus 4: Google Strengths Emerge appeared first on John Battelle's Search Blog. It’s been a month or so since I bailed on the iPhone and went all in on Google’s flagship Nexus 4. I’ve been keeping mental notes on the transition, and thought it might be useful to others if I sketched out a few observations here.

Cloud 111
article thumbnail

Clash of the titans

Collaboration 2.0

'The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

71
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Agile intranet strategies

ChiefTech

I co-wrote this piece for Image & Data Magazine in 2004 (PDF), but its still relevant to the question posted by Andrew Wright on LinkedIn : How should great intranets be developed? As a project or as a series of rapid incremental improvements? Or both? (For more see his blog post ). Our recommendation back in 2004 was that we should stop searching for intranet perfection, instead work in a way that is more 'agile': Flexibility and the ability to prioritise are key to success.

IT 62
article thumbnail

CurateGear 2013

Preservica

We recently attended the CurateGear digital curation symposium at the University of North Carolina at Chapel Hill. In fact, we had two of our top digital preservation experts, Mark Evans and Mike Thuman attend to participate in the lightening talks and break-out sessions. It’s great to support Helen Tibbo and Cal Lee in bringing this community together to look at technology options in various stages.

article thumbnail

The Real Value of Bring Your Own

CGI

The Real Value of Bring Your Own. ravi.kumarv@cgi.com. Thu, 01/24/2013 - 07:00. Unsure about adopting “Bring Your Own”? You’re in good company! CIOs should use methods which reliably estimate benefits and costs, so they can make defensible judgements about value …. With CIOs thinking hard about the merits and pitfalls of allowing staff to connect their own devices to the corporate environment, the time seems right to help by providing a summary of our evaluation tools for “Bring Your Own Device

article thumbnail

Article 29 Working Party Opines on Need for Implementing Acts in Proposed Regulation

Hunton Privacy

On January 22, 2013, the Article 29 Working Party released Opinion 01/2013 (the “Opinion”) on the implementing acts contained in the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). As previously reported , the Working Party has already adopted two Opinions on the Proposed Regulation (Opinion 01/2012 and Opinion 08/2012).

IT 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

The post Portrait of Twitter As A Young Media Company appeared first on John Battelle's Search Blog. Last year I predicted that Twitter would become a media company. However, I focused mainly on the new “ Discover ” functionality, and I probably should have gone a lot further. In this piece, I intend to. So I’ll start with this: 2013 will be the year Twitter starts to create, curate, and co-create media experiences on top of its platform.

IT 111
article thumbnail

Clash of the titans

Collaboration 2.0

The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

71
article thumbnail

IBM Connections 4.5 coming in March 2013

ChiefTech

At IBM Connect 2013 (previously known as Lotusphere) this week, they have presented details of the March release of IBM Connections 4.5. Michael Sampson provided some rough but detailed notes about the new features in this release. Scanning the list for the highlights, there is a good spread of user interface, mobile app and back-end improvements. End-users in particular will welcome the new @ mentions and the ability to like within the main activity stream.

IT 52
article thumbnail

Canada’s Anti-Spam Law (CASL) – Proposed New Regulations Would Soften Impact

Privacy and Cybersecurity Law

Draft Regulations recognize CASL should not apply to “regular business communications” Industry Canada has published long-awaited draft Regulations that would lessen the impact […].

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How can we create a level playing field for diverse talent?

CGI

How can we create a level playing field for diverse talent? ravi.kumarv@cgi.com. Tue, 01/15/2013 - 07:00. Organisations have dominant cultures – ways of working and relating that are most comfortable for the majority of the workforce. The individuals who most represent these dominant cultures can often excel if they have true talent and the ambition.

article thumbnail

UK Government Concerned About European Data Protection Reform Proposals

Hunton Privacy

On January 11, 2013, the UK Government published its response (the “Response”) to the UK Justice Select Committee’s opinion on the European Commission’s proposed revised data protection framework. The Response highlights a number of concerns expressed by the UK Government regarding the Commission’s legislative proposals. Choice of Instrument for the General Data Protection Regulation.

article thumbnail

Predictions 2013

John Battelle's Searchblog

The post Predictions 2013 appeared first on John Battelle's Search Blog. Mssr. Nostradamus. One week into the new year, it’s again time for me take a crack at predicting what might come of this next spin around the sun, at least as it relates to the Internet ecosystem. Last year’s predictions came out pretty well , all things considered, but I took an unusual tack – I wrote long posts on each of the first six, and then shot from the hip for the last one.

Big data 109
article thumbnail

Lance Armstrong & digital power brokering challenges

Collaboration 2.0

'Negative viral infection of social networks is an increasing issue: digital cliques can calcify into silos inside companies, and sophisticated communicators can be a force for good or bad.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

PwC Jive Software case study

ChiefTech

A detailed backgrounder on PwC's global deployment of Jive , called Spark, reports: 80% of the frequent users think that Spark increases both their efficiency and effectiveness. Some systems with a similar scope used on a national level have already been partly or fully replaced by Spark, directly saving cost. …a new employee who explicitly stated that Spark was among the key reasons for him to decide for PwC and against offers from the competition.

IT 49
article thumbnail

Children’s Online Privacy Protection: U.S. Developments Compared to Canada

Privacy and Cybersecurity Law

There were two important developments in the U.S. regarding children and mobile technologies. FTC Staff Report On December 10, 2012, […].

Privacy 40
article thumbnail

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet. If a text tweet = 140 characters, then a video tweet = 6 seconds. More details over at TNW , but this announcement is quite consistent with my post earlier this week: Portrait of Twitter As A Young Media Company.