August, 2013

article thumbnail

Want to See How Detroit Is Coming Back?

John Battelle's Searchblog

'The post Want to See How Detroit Is Coming Back? appeared first on John Battelle's Search Blog. Tonight I checked into my hotel room in Chicago as part of my regular cadence of visiting FM’s offices around the country. I flipped on the TV and the local news featured a dismal report about Detroit’s suburbs. The copy of Time magazine I had in my bag, same thing: Detroit Goes Bust.

Marketing 111
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nancy Dixon Explains 3rd Era Knowledge Management

ChiefTech

'Knowledge management (KM) is all about the people, right. Actually, its a little more complicated than that. Last year, Nancy Dixon presented what I think is one of the best overviews of the state of knowledge management today, where she explains the 3 eras of knowledge management : She describes the 3rd era of knowledge management as being focused on using collective knowledge to: Address complex issues.

IT 62
article thumbnail

DB2 for z/OS: GETPAGEs are not ALWAYS the Key Determinant of SQL Statement CPU Time

Robert's Db2

In my DB2 for z/OS-related work over the past 25 years, I've done a lot in the way of performance analysis, looking at individual queries and at DB2-accessing application programs (both transactional and batch in nature). Time and time again, sometimes in reviewing trend data and sometimes in examining DB2 monitor output to gauge the impact of performance tuning actions, I've seen that the CPU time consumed in SQL statement execution rises or falls with the associated level of GETPAGE activity (

Access 48
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

South Africa Passes Comprehensive Personal Data Protection Legislation

Hunton Privacy

As reported by Bloomberg BNA , the South African Parliament passed the Protection of Personal Information Bill on August 22, 2013. The bill, which was sent to President Jacob Zuma to be signed into law, represents South Africa’s first comprehensive data protection legislation. The Protection of Personal Information Bill sets forth several measures to protect personal data, including: Establishing an Information Protection Regulator with investigatory and enforcement powers.

More Trending

article thumbnail

Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win

John Battelle's Searchblog

'The post Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win appeared first on John Battelle's Search Blog. I spent today at the first-ever Boing Boing Ingenuity , a two-day hackathon cum “vaudeville show” – truly Boing Boing brought to life. It made me so proud to see the essence of conversational marketing at work – a major brand adding deep value to a community, an independent publisher realizing its dream of celebrating its voice and community through a uniq

Marketing 109
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

77
article thumbnail

Coffee morning in Melbourne on Tue 6th August

ChiefTech

'I''m going to be in Melbourne for a few days next week and thought it would be good to organise a coffee morning. We''ll be talking about everything from social intranets and knowledge management to government 2.0 and social innovation. Come along to chat and catch up. When : Tuesday 6th August, 8am to 9.30am. Where : Jasper Kitchen at the Jasper Hotel , 489 Elizabeth St, Melbourne VIC 3000.

article thumbnail

DB2 for z/OS: Get Your DDF-Related Dispatching Priorities Right

Robert's Db2

The DB2 for z/OS Distributed Data Facility (DDF), the component of DB2 that provides data services for network-attached client applications, is not a new kid on the block -- it's been around for more than two decades. In recent years, however, DDF has gained in importance for many organizations as client-server activity has grown as a percentage of the overall DB2 workload (in a blog entry posted a couple of years ago, I wrote about a way in which a DB2 monitor accounting report can be used to d

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FTC Files Complaint Against Medical Testing Lab for Exposing Consumers’ Personal Data

Hunton Privacy

On August 29, 2013, the FTC announced that it had filed a complaint against LabMD, Inc. (“LabMD”) for failing to protect consumers’ personal data. According to the complaint, LabMD, which performs various laboratory tests for consumers, exposed the personal information of more than 9,000 consumers on a peer-to-peer (“P2P”) file-sharing network. Specifically, a LabMD spreadsheet that was found on the P2P network contained names, Social Security numbers, dates of birth, health insurance informatio

article thumbnail

Is US Culture Veering Toward The Dark and Deadpan?

John Battelle's Searchblog

'The post Is US Culture Veering Toward The Dark and Deadpan? appeared first on John Battelle's Search Blog. ( image ) According to Wikipedia , “deadpan” is a uniquely American neologism less than a century old. The term arose from the slang term “pan,” for face: “Keep a dead pan,” a gangster told an associate in 1934′s The Gay Bride.

article thumbnail

Four Minutes on the Future of Marketing

John Battelle's Searchblog

'The post Four Minutes on the Future of Marketing appeared first on John Battelle's Search Blog. Earlier this year I sat down with a videographer at the Bazaarvoice Summit in Austin. He asked me about the future of marketing, in particular as it related to data and consumer behavior. Given what I announced earlier this morning, I thought you might find this short video worth a view.

Marketing 104
article thumbnail

The debut of “else”: Surveillance Everywhere and the Technological Wild West

John Battelle's Searchblog

'The post The debut of “else”: Surveillance Everywhere and the Technological Wild West appeared first on John Battelle's Search Blog. As we’re working on the book , Sara and I are planning on sharing some of the news items and blog posts that catch our attention each week. We’ll also plan on talking through some of the things we’re reading and working on in this space.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

else 8.26: Getting a Little Too Comfortable with Technology

John Battelle's Searchblog

'The post else 8.26: Getting a Little Too Comfortable with Technology appeared first on John Battelle's Search Blog. This week in the else round up we explore the responsibilities of technology builders and designers, what it will take for 3D printers and autonomous vehicles to go mainstream, and how humans will always find ways to misuse technology.

Privacy 92
article thumbnail

Great Content, Meet Great Targeting (And Reach)

John Battelle's Searchblog

'The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog. Today on the Federated site , I’ve posted a preview of something we’re working on for a Fall release. I’m cross posting a portion of it here, as I know many of you are interested in media and data-driven marketing. It’s no secret that Federated Media has deep roots in content marketing: We re-imagined CM for the modern web eight years ago, and since then have exec

article thumbnail

“Peanut Butter Cup Marketing” In A Few Minutes

John Battelle's Searchblog

'The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog. I had a chance to stop by Bloomberg TV yesterday to talk about “ content reachtargeting ” and the larger secular trends driving digital marketing today. Here’s the video: The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog.

article thumbnail

ABW requires more than wireless computing

ChiefTech

'Its no surprise that a story about Activity Based Working (ABW) appeared in Fairfax newspaper''s IT section - after all, ABW is underpinned by the right information technology. In this instance, the Australian federal Department of Human Services (DHS) will trial ABW with 110 staff in a Canberra office. A range of supporting technologies will be deployed that include a practical mix of wireless networking, follow-me printing and voice-over internet protocol (VoIP).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Create interactive surfaces using Kinect and a data projector

ChiefTech

'What do you get when you combined Microsoft Kinect for Windows, Windows 8 and a data projector? Ubi Interactive ''s software allows you to turn just about any surface into a multi-touch display: From the Ubi Interactive site: "Can I use any surface? Yes, you can- as long as the surface is visible to the depth sensor camera in the Kinect. You may want to make sure that the surface is neither too absorptive (such as some of the Plasma screens) nor reflective (such as some glass material).

IT 43
article thumbnail

Court Approves 20 Million Dollar Facebook Settlement

Hunton Privacy

On August 26, 2013, the U.S. District Court for the Northern District of California approved a settlement with Facebook, Inc., related to the company’s alleged misappropriation of certain Facebook members’ personal information, such as names and profile pictures, that was then used in ads to promote products and services via Facebook’s “Sponsored Stories” program.

article thumbnail

Obama Administration Releases Draft Preliminary Cybersecurity Framework

Hunton Privacy

On August 28, 2013, the Obama Administration issued several documents relating to the Cybersecurity Framework that the President called for in Executive Order 13636: Improving Critical Infrastructure Cybersecurity. The documents include: Preliminary Cybersecurity Framework (Discussion Draft) ; Preliminary Cybersecurity Framework: Illustrative Examples (Discussion Draft) ; Message to Senior Executives on the Cybersecurity Framework (Discussion Draft) ; and.

article thumbnail

ICO Stresses Importance of Encryption for Data Security

Hunton Privacy

On August 28, 2013, on the UK Information Commissioner’s Office’s (“ICO’s”) blog, Simon Rice, Technology Group Manager for the ICO, discussed the importance of encryption as a data security measure. He stated that storing any personal information is “inherently risky” but encryption can be a “simple and effective means” to safeguard personal information and reduce the risk of security breaches.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Hunton Launches Global Privacy Update Webcast Series

Hunton Privacy

As always, the privacy team at Hunton & Williams continues to closely monitor the latest global developments in data protection, privacy and cybersecurity, including progress on the proposed EU General Data Protection Regulation. To keep you informed, we will be hosting regular, 30-minute webcasts to provide brief updates on the most pressing issues.

Privacy 40
article thumbnail

Tiao Discusses Cyber Threats on CNBC

Hunton Privacy

On August 22, 2013, Hunton & Williams partner Paul M. Tiao was featured on CNBC’s Fast Money discussing NASDAQ’s recent crash. In the feature, “Are markets ready for cyber threats?”, Tiao talked about the steps the financial services industry has taken to protect against significant cybersecurity incidents, including “putting in best-of-breed information security policies” and “working across the industry to share information in a way that many other industries are not.”.

article thumbnail

New EU Breach Regulation in Force

Hunton Privacy

This week a new breach notification regulation takes effect across the EU. The Regulation on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC (the “Regulation”) specifies the technical measures of how Internet service providers, telecommunications providers and other public electronic communications service (“ECS”) providers must notify of data breaches.

article thumbnail

Federal Court Finds No Reasonable Expectation of Privacy in Computer Files Shared on a Public Network

Hunton Privacy

On August 1, 2013, the United States District Court for the District of Minnesota denied a criminal defendant’s motion to suppress, holding that the defendant had no reasonable expectation of privacy in computer files he shared on a peer-to-peer network. In U.S. v. Hoffman , police used a software program to monitor multiple peer-to-peer networks for IP addresses that investigators had previously identified as possibly associated with child pornography.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

FTC Announces 3.5 Million Dollar Settlement in FCRA Case

Hunton Privacy

On August 15, 2013 the Federal Trade Commission announced a settlement with Certegy Check Services, Inc. (“Certegy”) stemming from allegations that Certegy violated various provisions of the Fair Credit Reporting Act (“FCRA”). The settlement agreement includes a $3.5 million civil penalty for “knowing violations … that constituted a pattern or practice of violations.”.

article thumbnail

Digital disruption - is technology disrupting us or are we disrupting with technology?

ChiefTech

'"The phrase ‘digital disruption’ is quite a misnomer because no technology truly disrupts unless it disrupts what we do and how we do it, not just what we do it with. This then begs the question: Is technology disrupting us or are we disrupting with technology?". Cross-posted from the DISRUPT.SYDNEY and Ripple Effect Group blogs.

IT 40
article thumbnail

FTC Seeks Input on Proposed COPPA Parental Consent Mechanism

Hunton Privacy

On August 15, 2013, the Federal Trade Commission announced that it is seeking public comment regarding a proposed mechanism to obtain verifiable parental consent in accordance with the new Children’s Online Privacy Protection Rule (the “COPPA Rule”) that came into effect July 1, 2013. The COPPA Rule requires operators of certain websites and online services to obtain a parent’s consent before collecting personal information online from a child under 13.

Privacy 40