September, 2012

article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

The post Am I An Outlier, Or Are Apple Products No Longer Easy To Use? appeared first on John Battelle's Search Blog. I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 30 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back.

IT 112
article thumbnail

Connecting with traditional business language and conventions

Collaboration 2.0

John Hagel believes exploiting process exceptions is the way to find value in social initiatives; the challenge is often finding a common language with the business world.

81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

Another year has passed and Step Two have released their annual intranet award winners. Its always interesting to poke around the list of companies. An Elgg-based solution wins again. Mitre won an award from Step Two in 2010 for its Elgg-based employee network. This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award.

article thumbnail

Linux on System z: a Better Place for Your DB2 for z/OS Client-Server Applications

Robert's Db2

In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. Back around 2003, when I was on the user side of the DB2 community, I was part of a team charged with developing a plan for the simplification and streamlining of my company's IT infrastructure. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running pr

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Create a Social Community of Trust Along With Your Digital Services Governance Framework

Interactive Information Management

The Digital Services Governance Recommendations were recently released, supporting the US Federal Government's Digital Government Strategy Milestone Action #4.2 to establish agency-wide governance structures for developing and delivering digital services. Figure 1 - From: "Digital Services Governance Recommendations" While extremely important from a policy and procedure perspective within an Agency's information management and communications enterprise, these recommendations only very lightly re

More Trending

article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

The post The Facebook Ad Network Is Here appeared first on John Battelle's Search Blog. It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network.

Education 110
article thumbnail

Cloud naivety and electric car dreams

Collaboration 2.0

Harnessing the power of cloud computing requires that you understand underlying concepts: loose understanding can cause more harm than good.

Cloud 81
article thumbnail

The digital workplace - virtual work or digitally augmented work communities?

ChiefTech

Listening to the european-driven agenda on the " digital workplace ", the core focus is on enabling people to work remotely (aka telework or telecommunting). Mark Morrell defines it as : "Work is what you do, not where you go to.". An academic panel of experts thinks: Forget whether it's practical to bring your own technology devices to work - in the future, you may not even have an office. ….

IT 69
article thumbnail

Wither ‘Big Brother’? B.C. Privacy Commissioner Reins-in Government of British Columbia Criminal Record Checks

Privacy and Cybersecurity Law

In keeping with her stance on overly-invasive employee background checks, British Columbia’s Information and Privacy Commissioner, Elizabeth Denham, has issued […].

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The joys and hazards of multi-process browser security

Scary Beasts Security

Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation methods. Spray techniques Probably the most significant security effect of multi-process models is the effect on spraying. Spraying, of course, is a technique where parts of a processes' heap or address space are filled with data helpful for exploitation.

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

On September 27, 2012, the European Commission presented its new strategy on cloud computing, entitled “ Unleashing the Potential of Cloud Computing in Europe.” The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The newly-released strategy follows the Commission’s consultation on cloud computing and the Article 29 Working Party’s Opinion on cloud computing.

Cloud 40
article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

The post Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough appeared first on John Battelle's Search Blog. I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across

IT 108
article thumbnail

Experiential over intellectual - the enterprise parties on.

Collaboration 2.0

Musical entertainment, motivational speakers entice enterprise conference attendees, but the gap between understanding and doing remains large.

80
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mind the gap: Social on the inside, to support social on the outside

ChiefTech

One of the things I often remind clients is that if you want to be social on the outside, you need to be social on the inside too (that's sort of a short definition of "social business" too). I'm lucky to work not just within the isolated internal collaboration domain, but across the spectrum of internal to external and back again. So, interesting to see Hootsuite release a new internal " conversations " feature: They aren't the only vendor that supports features like this of course.

article thumbnail

The Fake Facebook Profile and the Veiled Victim

Privacy and Cybersecurity Law

The Supreme Court of Canada determined yesterday, in A.B. v. Bragg Communications, that a 15-year old can proceed anonymously to pursue […].

article thumbnail

DB2 10 for z/OS: New Options for Trimming and Upgrading Indexes

Robert's Db2

First, some explanation as to what I mean by "trimming and upgrading" indexes. My use of "trimming" refers to reducing the number of indexes defined on tables, through elimination of indexes that aren't providing value. Having fewer indexes on a table is good for cost efficiency, as every index increases the CPU cost of every insert and delete operation targeting the table (and every update of an indexed column), increases the cost of execution of several DB2 utilities (including LOAD, REORG, an

Access 54
article thumbnail

UK ICO Publishes Cloud Computing Guidance

Hunton Privacy

On September 27, 2012, the UK Information Commissioner’s Office (“ICO”) published guidance on complying with the requirements of the UK Data Protection Act 1998 (“DPA”) in the context of cloud computing services (the “Guidance”). In its Guidance, the ICO reminds data controllers that transferring personal data to the cloud does not absolve them of their compliance obligations under the DPA.

Cloud 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

The post Tweets Belong To The User… And Words Are Complicated appeared first on John Battelle's Search Blog. ( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted b

Mining 99
article thumbnail

Salesforce demonstrating great momentum

Collaboration 2.0

Branson & Benioff demonstrate world class salesman human qualities, SalesForce selling ever more connected and intelligent businesses

80
article thumbnail

Activity streams shouldn't wag the dog

ChiefTech

The constant challenge for social software is to boil down the ongoing process of technology change happening around us into bite sized concepts that people can hang on to. Its the tyranny of reductionist thinking, because the moment we do that we often lose sight of what is actually happening. To that point, one of the most contentious issues that falls into this trap is the idea of activity streams versus email.

article thumbnail

Pension Schemes Failing on Data Privacy

Privacy and Cybersecurity Law

We are all familiar with the ongoing saga of data breach, notifications to the Information Commissioner’s Office and the risk […].

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across four or so social networks.

IT 83
article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 20 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back. Till now. I’m not saying I’m switching, but I sure am open to a better solution. Because the past year or so has been dominated by the kind of computing nightmares that used to be the defining experience of my Windows-PC-wielding fr

IT 76
article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network. And this isn’t just an on-domain network (where you can buy ads across Facebook’s domain), but rather, it’s a true cross-domain network – just like AdMob on mobile, or

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted by an Occupy Wall St. protestor.

Mining 64
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The Victorian Internet – The Technology That Started It All

John Battelle's Searchblog

I’m at least three books behind in my reviews, so I figured I’d bang out a fun one today: The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers by Tom Standage. This 1998 book is now a classic – written as the Web was exploding on the scene, it reminded us that this movie has run before, 150 years in the past, with the rise of the telegraph.

IT 63
article thumbnail

Reimagining the digital workplace

ChiefTech

Technology - not just information technology - has played a critical role in creating the modern workplace (for example, see the history of the skyscraper ). There is an interesting dynamic between physical structures, technology and how we organise - without electric lighting , modern factories and offices would be very different places. If the " digital workplace " is more than simply giving people a better intranet or enabling telework (all things progressive companies have been working on si

Privacy 56
article thumbnail

Why we are still struggling with email overload? Mistrust

ChiefTech

Hat tip to Jack Vinson for highlighting this article from Nathan Zeldes about the irrationality of email usage (PDF). I'm a long time fan of Zeldes, who many years ago created a ground breaking program at Intel to teach better email skills , called YourTime. What is different about Zeldes' approach is that he doesn't point the finger of blame solely at how the user manages their inbox (this isn't about "inbox zero").