KSJO 92.3 - Good Product, Bad Marketing. A Case Study

John Battelle's Searchblog

In case you're wondering, it was this period of time that inspired the name of my company Federated Media , or FM - the explosion of independent voice in radio during the 1970s was quite similar to the explosion of independent voices on the web today.but I'm taking a detour.

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

Those privileges are not available to the person who used the application's credentials to connect to the Db2 system from a laptop PC because the laptop's IP address is not one of the two specified in the definition of the trusted context (those being the addresses of the two application servers on which the application runs). The client address we saw was the one used in the definition of the trusted context, so why didn't the trusted context work for us?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

A Java Program, a COBOL Program, and a DB2 Update - An Interesting Case Study

Robert's Db2

I think it makes for an interesting case study. In that latter case, then, even an X-lock acquired on the row (or the row's page) by the Java program would not impede the CICS program's subsequent update operation. So, a CICS-based solution satisfying the application requirement was definitely available to the organization with which Andrew was working. In that case, the same DB2 thread should be used for the Java-based SELECT and the COBOL-based UPDATE.

Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law

eDiscovery Daily

It’s a rare, if not unheard of, case law post that discusses an agreement between parties, not a dispute! Case opinion link courtesy of eDiscovery Assistant. The post Court Enters Parties’ Order for Discovery of ESI: eDiscovery Case Law appeared first on CloudNine.

How (not) to schedule electronic messages: a case study/cautionary tale

The Schedule

This is a case where “better to ask forgiveness than permission” definitely does not apply. Welcome to RIM Month! I have been promising/threatening my fellow Steering Committee members to write this post for a while now. My ability to write it, however, has been significantly impacted by the extent to which I have been absolutely BIFFING the process.

Saving Local News on the Web


One of the goals of Endangered Data Week is to “explore the power dynamics of data creation, sharing, and retention,” and we definitely addressed those questions in our discussion. Case Studies Community WebsThe following is a guest post by Diana Bowers-Smith, Archivist, Brooklyn Collection, at the Brooklyn Public Library.

How to become an ISO 27001 lead implementer

IT Governance

You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer.

Risk 62

Interactive: What Does It Really Mean?

Association eLearning

In terms of eLearning, I think “meaningful” is the key part that’s missing from that definition. In these cases, people use interactive as a buzzword. In this case, I’m using “something involving meaningful action or input from a learner” as the definition. Reading a case study and using it to come to conclusions. Merriam-Webster ’s online dictionary defines “interactive” as, “involving the actions or input of a user.”

IT 55

The Science of Artificial General Intelligence

Perficient Data & Analytics

Although there are multiple definitions in the context of dualism, I am going to focus on mind-body relationship since it directly relates to AI. Take the case study of AI playing Go and defeating Lee Sedol vs AI getting trained on Chess.

IT 43

Data Mapping Tools: What Are the Key Differentiators


Those organizations investing in data mapping tools with compliance as the main driver will definitely want to consider this opportunity and have it influence their decision as to which data mapping tool to adopt. BFSI, PHARMA, INSURANCE AND NON-PROFIT) CASE STUDIES FOR AUTOMATED METADATA-DRIVEN AUTOMATION. The need for data mapping tools in light of increasing volumes and varieties of data – as well as the velocity at which it must be processed – is growing.

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

This session was composed of lightning talks about various email archiving projects, including the first NHPRC electronic records case studies focused on email archiving. The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. Email Archiving Comes of Age.

Welcome to Legaltech New York 2020!: eDiscovery Trends

eDiscovery Daily

Case studies where DApps have been successfully deployed. In just 10 years the case law around eDiscovery AI & Analytics has exploded. Survey the key case law governing the application of machine learning to eDiscovery.

Summary – “Blockchain Technology and Recordkeeping”

ARMA International

The chapters respond to, and are structured according to, an initial set of questions from the AIEF’s call for proposals for a study on blockchain, records, and information management. The chapter argues that blockchain systems should be designed to provide final, definitive, and immutable records of transactions. This article summarizes a report published by AIEF on May 30, 2019.

Observations from the Enterprise 2.0 Conference


conferences have suffered from a lack of end-user case studies, but that didn't seem to be the case this year. The number of case studies is increasing. You definitely have to answer the WIFM question at an individual, group and organisational level. A few of the reports from the Enterprise 2.0 Conference this week included some interesting observations. From NetworkWorld : Past Enterprise 2.0

IT 52

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a webcast ) and ALSP – Not Just Your Daddy’s LPO. Is there a standard, either statutory or in case law to help us with this determination? Most case studies I have seen emphasize speed or accuracy and don’t even mention cost.

How to Unite B2B PR and Content Marketing for Powerful Results

OpenText Information Management

Now that we have a clear definition of what public relations is, let's move on to content marketing. As propsects move down your funnel, content may include later-stage content such as case studie and webinars. Case studies. If you want to generate leads, you'll want to generate leads, think webinars, demos, case studies and other later-stage content.

B2B 60

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

a misunderstanding of the definitions contained in ePrivacy laws on which cookies are exempt from the consent requirement. Further to the decision by the Court of Justice (CJEU) Fashion ID case, and confirmed in the DPCs report, third parties that process personal data in cookies via embedding a plugin in another party’s website, can be considered a joint controller in relation to that data. John Magee & Eilis McDonald.


Flattening The Information Landscape with Really Simply Services


In an interesting whitepaper, Flattening The Information Landscape [PDF], RSSBus explain how their products can help to provide “ Really Simply Services ”: “ …in case you are thinking that RSSBus is nothing more than RSS feed generation, that's definitely not the case.

IT 56

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

A definite repeat for next year! In one area we could have done better, but I knew that would be the case going in and will explain why. Believe me, this process is not fun and I had many painful conversations with excellent consultants and experts (personal friends in many cases) as to why they could not attend. in each case, higher than 4 out of 5).



While you can't automate away the placement of subtle bugs and clever tricks, we can definitely add meaningful sources of variance to challenges without much additional effort, with the added bonus that challenges are easier to deploy. CASE STUDY: VARIABLE LENGTH BUFFERS AND CANARIES. In this case, we are leveraging the implicit fields of our deployment to include the location of the local binary on our challenge server.

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

Until such time [as] the NAIC can evaluate any distinction in the text of the SEC proposal between a “best interest” recommendation and investment adviser fiduciary duties, and the SEC and FINRA have finalized relevant terms, definitions and related requirements, the NAIC would opt to refrain from using the phrase ‘best interest’ in Section 6A(1) of the proposed modifications to the Suitability in Annuity Transactions Model Regulation (#275).”.

Paper 65

A short history of intranets and what's next with social, mobile and cloud


In this case we will consider the "outside network" to be public online services and the Internet. In fact, the breadth of possible use cases and skills required for a successful intranet project was recognised early on - David Strom writing in Forbes advised: If you are about to begin your first Intranet project, you need to gather together people of diverse skills: computer geeks, artists, diplomats, and negotiators.

Compete To Death, or Cooperate to Compete?

John Battelle's Searchblog

Allow me to posit that this philosophy is going to change over the next few decades, and further, indulge me as I try to apply a new approach to a very present case study: That of Google, Facebook, and Twitter as it relates to Google’s search index and the two social services’ valuable social interaction datasets. So far, the answer is a definitive NO.

Download IGI’s Whitepaper: GDPR Myths & Misconceptions


Although it is impossible to definitively answer some questions about the GDPR until authorities begin to enforce the law, there is little uncertainty about its most important provisions and what organizations must do to prepare and comply. Sign up here to join the IGI Community to access our extensive library of IG research and tools including our Annual Report, whitepapers, case studies, infographics, and more.

A short history of intranets and what next with social, mobile and cloud


In this case we will consider the "outside network" to be public online services and the Internet. In fact, the breadth of possible use cases and skills required for a successful intranet project was recognised early on - David Strom writing in Forbes advised: If you are about to begin your first Intranet project, you need to gather together people of diverse skills: computer geeks, artists, diplomats, and negotiators.

This is the old ChiefTech blog.: Social software in organisations: Nature or nurture?


If you have counter experience or cases please let me know as it would surprise me to find them. Wikipedia s definition of ease of use is this: " Ease of use refers to the property of a product or thing that a user can operate without having to overcome a steep learning curve. This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. ©2005-2009.