July, 2012

article thumbnail

The Nexus 7 and The Cloud Commit Conundrum: Google Wins (For Now)

John Battelle's Searchblog

Google was kind enough to send me a Nexus 7 tablet to play with last month, and over the past week or so I’ve had the chance to actually put it to use. Even though I own an iPad, I have serious reservations about the constraints of Apple’s iOS ecosystem (more on that below), so I was eager to see how Google’s alternative performed.

Cloud 105
article thumbnail

Quarantining Facebook to control tracking

Collaboration 2.0

By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.

IT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.

Cloud 65
article thumbnail

DB2 10 (and 9) for z/OS: I Need 128 GB of WHAT?

Robert's Db2

The other day, I got a note from a mainframe DB2 DBA who'd seen a system requirement for DB2 10 that had him concerned. This DBA, whose company was preparing for the migration of their DB2 9 subsystems to DB2 10, had read the following in the text of IBM APAR II14564 (an "info" APAR that documents some DB2 9-to-10 migration and fallback considerations): REAL STORAGE CONSIDERATION Ensure that you have defined a high enough value for HVSHARE. to satisfy all requests on this LPAR.

IT 48
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FFIEC Issues Statement on Cloud Computing

Hunton Privacy

On July 10, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released a statement on outsourced cloud computing activities. The statement, which was prepared by the FFIEC Information Technology Subcommittee, discusses key risk considerations associated with using third-party vendors to implement cloud computing solutions, and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.

Cloud 40

More Trending

article thumbnail

On Mayer, Yahoo!, and The (Other) Customer

John Battelle's Searchblog

Mayer at the Web 2 Summit, San Francisco ( image James Duncan Davidson ) I try to let big news percolate for a few days before weighing in, and it seemes even more appropriate to follow that playbook when it came to the scrum around Marissa Mayer joining Yahoo. Yes, I’ve known both Marissa Mayer (and Ross Levinsohn) professionally, for more than a decade, but so do many other folks, and it seems nearly all of them – Steven Levy and Kara Swisher intelligently among them – have w

article thumbnail

Microsoft vs Google: Game on

Collaboration 2.0

Both global giants aspire to provide the complete underpinnings of your digital social and work life, and that lifestyle is changing very fast indeed.

89
article thumbnail

Social Collaboration at Bayer with IBM Connections

ChiefTech

via youtube.com. Kurt De Ruwe is CIO of Bayer MaterialScience and he explains in this video how they are using IBM Connections to be more social internally. Earlier in June, he tweeted that: Today I have 4 of our 9 board members writing 1 to 2 microblogs per week on our internal ?#IBMConnections? platform. Just 5 more to onboard. You can read more about the Bayer story in this Forbes article by Mark Fidelman : De Ruwe’s has been able to get 66% of Bayer Material Science employees using the

58
article thumbnail

DB2 for z/OS: What's With DDF CPU Time?

Robert's Db2

Recently I got a question from a mainframer who was seeing rather high CPU times for the DB2 DDF address space. DDF, of course, is the distributed data facility -- the DB2 component that handles communications with client systems (usually application servers) that send requests to the DB2 for z/OS server using the DRDA protocol (DRDA being Distributed Relational Database Architecture).

Access 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

United States Approved for Participation in APEC Cross-Border Privacy Rules System

Hunton Privacy

On July 26, 2012, acting U.S. Secretary of Commerce Rebecca Blank announced that APEC’s Joint Oversight Panel has approved the United States’ request to participate in the APEC Cross-Border Privacy Rules System. The panel also approved the Federal Trade Commission’s participation as the system’s first privacy enforcement authority. The next step will be for the United States to nominate one or more accountability agents for the panel’s approval.

Privacy 40
article thumbnail

Google Penguin, Twitter, and Keyword Research

Interactive Information Management

Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.

article thumbnail

First, Software Eats the World, Then, The Mirror World Emerges

John Battelle's Searchblog

David Gelernter of Yale ( image Edge.org ) A month or so ago I had the pleasure of sitting down with Valley legend Marc Andreessen , in the main for the purpose of an interview for my slowly-developing-but-still-moving-forward book. At that point, I had not begun re-reading David Gelernter’s 1991 classic Mirror Worlds: or the Day Software Puts the Universe in a Shoebox…How It Will Happen and What It Will Mean.

Mining 97
article thumbnail

Enterprise licensing & support maze fatigue may undermine the old guard's next generation products

Collaboration 2.0

Bitter licensing and support memories may be a bigger impediment to adoption of the enterprise old guard's next generation product offerings than they realize, especially given third party options for legacy support, which can provide savings that can be applied to future customer innovation initiatives.

70
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

John Stepper explains "Working out loud"

ChiefTech

via johnstepper.com. A great explanation from John Stepper about how we use social business platforms for "working out loud", "observable work" and "narrating your work" in the workplace. These are simple but powerful ideas that underpin the value of social intranets and enterprise social networks. He writes in his introduction (emphasis added): Two of the most common objections I hear are “I don’t have enough time” and “I don’t know what to post.

article thumbnail

MicroSD memory cards to be excluded from copyright levies

Privacy and Cybersecurity Law

In a press release entitled “Harper Government Says No to Fees on Memory Cards”, Minister of Industry Christian Paradis announced the […].

article thumbnail

Congress Investigates Data Brokers’ Use of Consumer Information

Hunton Privacy

On July 24, 2012, a bipartisan group of eight members of Congress sent letters to nine major data brokerage companies requesting information on how the companies collect, assemble and sell consumer information to third parties. Representatives Ed Markey (D-MA) and Joe Barton (R-TX), who serve as co-chairmen of the Bipartisan Congressional Privacy Caucus, are leading the inquiry.

article thumbnail

A Common Approach to Federal Enterprise Architecture - Actionable Solutions

Interactive Information Management

The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Halfway Through The Year: How’re The Predictions Doing?

John Battelle's Searchblog

It’s time to review how my Predictions 2012 are faring, now that half the year has slipped by (that was fast, no?). One thing that stands out is the timing wrt Twitter – my first two predictions were about the company, and now that I think about it, given the news just this week (and the attendant debate ), I should have realized how the two could be in direct conflict with each other.

article thumbnail

'Tubes' - a tactile tour of the internet

Collaboration 2.0

A terrific book about how the planet is wired for multimedia and data, the locations, sights and smells of global to local internet infrastructure.

70
article thumbnail

Yammer case study: Hall & Wilcox, a law firm in Melbourne, Australia

ChiefTech

We have discussed the importance of adoption events to the success of enterprise social network adoption a few times. A successful adoption event informs users of the benefits of using the ESN, models desired behaviors, increases awareness and establishes a call to action. An example of a really creative launch came to my attention, and I just had to get to know the company that made its own Yammer shirts (and sent me one!

IT 54
article thumbnail

Copying ID documents – Dutch data regulator issues guidance

Privacy and Cybersecurity Law

We have all been asked before to provide copies of our passports to organisations such as telecoms providers, hotels and car rental companies. […].

Privacy 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

California Supreme Court’s Pineda Decision Applies Retrospectively to ZIP Code Collection Class Action Suit

Hunton Privacy

As reported in BNA’s Privacy & Security Law Report ,on June 25, 2012, a federal district court in California ruled that the California Supreme Court’s 2011 Pineda decision , which held that requesting and recording zip codes during credit card transactions violates the state’s Song-Beverly Credit Card Act, applies retrospectively to OfficeMax’s collection of zip codes from its customers.

Sales 40
article thumbnail

Chrome 20 on Linux and Flash sandboxing

Scary Beasts Security

[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.

article thumbnail

Will Our Industry Ever Innovate Like Morse? Probably Not.

John Battelle's Searchblog

Last month I finished a compelling biography of Samuel Morse: Lightning Man: The Accursed Life Of Samuel F.B. Morse , by Pulitzer-prize winning author Kenneth Silverman. If you’re a fan of great biographies, or just want to learn more about the history of both our industry and of the United States during a seminal and innovative period, I certainly recommend this book.

article thumbnail

If Google Were Really Evil…

John Battelle's Searchblog

My morning routine was interrupted today in a big way – because Twitter was down. I hadn’t realized how much I depend on the service for any number of things, from tossing out the headline or two that I find interesting as I read my feeds, to checking the status of the conversation around stuff I’ve written the day before, to logging into other services I use through my Twitter account.

IT 55
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Year Zero: This Is What the Beach Was Made For

John Battelle's Searchblog

It’s summertime, and if you’re not already lying on a beach somewhere, I’ve got a good reason for you to go: My friend Rob Reid’s new novel is out today, and it’s absolutely tailor made for beach reading. It’s called Year Zero , and it’s a hilarious send up of the music industry, mixed, naturally, with a ripping yarn about aliens, romance, and intergalatic politics.

IT 55
article thumbnail

7 ways to get value from enterprise social software

ChiefTech

I talked to some corporate Yammer , Chatter and Jive users, all of whom claimed measurable gains from these tools in a variety of areas. Here are seven ways they derive value from social enterprise applications. via blog.softwareadvice.com. Ashley Furness identifies seven usage patterns for enterprise social software tools. However, she also highlights that some firms are reporting they can be 'more “of a distraction” than a value driver'.

49
article thumbnail

Designing Mobile Apps: A Roadmap for Businesses - Executive Summary

ChiefTech

via slideshare.net. You can now read the exec summary and view the table of contents for my Ark Group report, over on SlideShare. You can order the full report from Ark Group. Permalink.

49