February, 2014

article thumbnail

To Be Clear: Do Not Build Your Brand House On Land You Don’t Own

John Battelle's Searchblog

'The post To Be Clear: Do Not Build Your Brand House On Land You Don’t Own appeared first on John Battelle's Search Blog. ( image ) I took a rigorous walk early this morning, a new habit I’m trying to adopt – today was Day Two. Long walks force a certain meditative awareness. You’re not moving so fast that you miss the world’s details passing by - in fact, you can stop to inspect something that might catch your eye.

Marketing 111
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'Creating Information Systems for Competitive Advantage: ''every business must become digital;'' say Software AG CEO Karl-Heinz Streibich & Vinnie Mirchandani in their book. In my experience strategic planning for transformation is critical to lower costs while increasing innovation and agility.

94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now." In the space below, I'll provide some background information on DB2 11's bind concurrency enhancement, and then I'll give you the bonus insight that you might see as the "cherry on top" -- the important scenario that is addressed by DB2 11 bind concurrency but which has received little (if any) coverage in documents and

IT 54
article thumbnail

Monetizing Wellness, to Drive Value-Driven, Outcomes-Based #Healthcare Transformation in the U.S. #NVTC #NVTCBEA

Interactive Information Management

Thanks very much go to John Teeter - Managing Director, Federal Advisory at KPMG, Global Center of Excellence for Health and former HHS CIO - for his presentation and discussion leadership at today's #nvtc joint committee meeting (Health Technology and Business & Enterprise Architecture #nvtcbea ). The dialogue revolved around a principle challenge and opportunity in the Global and particularly the US healthcare transformation debate - bending the cost curve of US healthcare through better h

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chairman of French Data Protection Authority Elected Chair of Article 29 Working Party

Hunton Privacy

On February 27, 2014, Chairwoman of the French Data Protection Authority (the “CNIL”) Isabelle Falque-Pierrotin was elected Chairwoman of the Article 29 Working Party effective immediately. Ms. Falque-Pierrotin succeeds Jacob Kohnstamm, Chairman of the Dutch Data Protection Authority, who chaired the Article 29 Working Party for four years. The Working Party also elected two new Vice-Chairs: Wojciech Rafal Wiewiórowski of the Polish Data Protection Authority, and Gérard Lommel of the Luxembourg

More Trending

article thumbnail

We Are Not Google, Therefore, We Are

John Battelle's Searchblog

'The post We Are Not Google, Therefore, We Are appeared first on John Battelle's Search Blog. If you read me regularly, you know I am a fan of programmatic adtech. In fact, I think it’s one of the most important developments of the 21st century. And over the past few quarters, adtech has gotten quite hot, thanks to the recent successes of Rocket Fuel (up to 50 and holding from its open at 29), Criteo (trading above its already inflated opening price of 31), and, by extension, Facebook

Marketing 106
article thumbnail

Developing a clear blueprint for becoming a “cloud-enabled” enterprise

CGI

Developing a clear blueprint for becoming a “cloud-enabled” enterprise. ravi.kumarv@cgi.com. Wed, 02/12/2014 - 08:00. As cloud computing continues to increase, more and more organizations are adopting a “cloud-first” approach to IT service delivery and embarking on becoming “cloud-enabled” enterprises. Cloud-first advocates believe that this approach will eventually become the default approach for enterprises of all types.

Cloud 40
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

45
article thumbnail

DC, Northern Virginia Enterprise Architects, Health Technology Professionals - an #NVTC Joint Committee Meeting with Former HHS CIO John Teeter - 2/18/2014

Interactive Information Management

Northern Virginia Enterprise Architects, Health Technology Professionals , in the Washington DC metro region - if you are members, stakeholders or guests of the Northern Virginia Technology Council ( #NVTC ), please join us this next Tuesday Feb 8 th , 2014, from 7:30-9AM, for a Health Technology, Business and Enterprise Architecture Joint Committee Meeting.

CMS 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SSL Bugs Likely to Have Insurance Coverage Implications

Hunton Privacy

Hunton & Williams Insurance Litigation & Counseling partner Lon Berk reports: The recently publicized Secure Sockets Layer (“SSL”) bug affecting Apple Inc. products raises a question regarding insurance coverage that is likely to become increasingly relevant as “The Internet of Things” expands. Specifically, on certain devices, the code used to set SSL connections contains an extra line that causes the program to skip a critical verification step.

article thumbnail

Using a Regular Expression to Seach for HTML Nodes

JKevinParker

I am a lazy coder and data analyzer. I use text editing tools to search and replace and manipulate so I can then use a spreadsheet tool to break text into columns and rows. Then I can extract data or write code that follows patterns without a lot of manual work. If I am working on code, I can copy and paste it back into my text editor, remove the tabs, and then I have clean code.

IT 40
article thumbnail

Linked In Is Now A Publishing Platform. Cool. But First Get Your Own Site.

John Battelle's Searchblog

'The post Linked In Is Now A Publishing Platform. Cool. But First Get Your Own Site. appeared first on John Battelle's Search Blog. I’ve been a LinkedIn “Influencer” for a year or so, and while the honorific is flattering, I’m afraid I’ve fallen down in my duties to post there. The platform has proven it has significant reach, and for folks like me, who thrive on attention for words written, it’s certainly an attractive place to write.

IT 105
article thumbnail

California Court Interprets E-Mail Addresses under the Song-Beverly Act

Privacy and Cybersecurity Law

One of the most interesting and important developments in retail privacy cases is a recent unpublished decision, Capp v. Nordstrom. […].

Retail 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

40
article thumbnail

Internet Bug Bounty issues its first $10,000 reward

Scary Beasts Security

One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards. Earlier today, David Rude collected $10,000 for a vulnerability recently fixed in APSB13-28. My thoughts on this are too long to fit into a tweet, so I summarize them here: This shows that the IBB is serious about rewarding research which makes us all safer. $10,000 is a respectable reward by modern bug bounty program standards.

IT 36
article thumbnail

Puerto Rico Health Insurer Reports Record Fine Following PHI Breach Incident

Hunton Privacy

Triple-S Management Corporation reported in the 8-K it recently filed with the U.S. Securities and Exchange Commission that its health insurance subsidiary, Triple-S Salud, Inc. (“Triple S”), which is Puerto Rico’s largest health insurer, will be fined $6.8 million for a data breach that occurred in September 2013. The civil monetary penalty, which is being levied by the Puerto Rico Health Insurance Administration, will be the largest fine ever imposed following a breach of protected health info

article thumbnail

Remove External Users from SharePoint Online (Office 365 Enterprise)

JKevinParker

I had a problem where one of my teammates showed up twice in SharePoint people pickers and people search. I actually invited the wrong one to be part of a new site. It was the same person, but not from SharePoint's perspective. We had used this teammate's personal email account to test External User sharing, and that was the second account that showed up.

IT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Buh-Bye, CableCo

John Battelle's Searchblog

'The post Buh-Bye, CableCo appeared first on John Battelle's Search Blog. When it comes to television business models and the endless debate about “ cutting the cord ,” I consider myself in the “fast follower” camp – I’m not willing to endure the headaches and technical backflips required to get rid of cable entirely, but I sure am open to alternatives should they present themselves.

Marketing 102
article thumbnail

FTC steps up enforcement action

Privacy and Cybersecurity Law

Last week, the FTC announced that it had settled with a gaming company that falsely claimed to be certified under […].

IT 40
article thumbnail

IT Governance for Techies

CGI

IT Governance for Techies. Anonymous. Thu, 02/06/2014 - 09:35. Despite the increasing number of CIOs without an IT background, it's still fair to say that most were once techies. Historically, their expertise was in requirements analysis or SQL, service reporting or C++. They gradually moved up the ranks, either with a natural aptitude for management or picking-up management skills en route.

article thumbnail

Making Real Money for Bands in the Age of Social Media - Democratization of the Royalties Model, by Gideen.com

Interactive Information Management

Welcome to M usic Business 3.0 - it's not about the $1 song anymore. Most artists these days are gifting songs away just for email addresses, the occasional "like". The 3.0 music business model is about creating tracks and collecting many different revenue types internationally for each track/song. It's a new content marketing model and platform for music, for the entire music industry.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Greek Presidency Issues Notes on Proposed EU Data Protection Regulation

Hunton Privacy

On January 31, 2014, the Greek Presidency of the Council of the European Union issued four notes regarding the proposed EU Data Protection Regulation. These notes, discussed below, address the following topics: (1) one-stop-shop mechanism; (2) data portability; (3) data protection impact assessments and prior checks; and (4) rules applicable to data processors.

article thumbnail

SharePoint 2013 Content Types and Columns

JKevinParker

All of the available out-of-the-box content types and their related columns in SharePoint Server 2013 are listed below (let me know if I missed any). I retrieved this information using PowerShell, as I describe in an earlier post. The parent content types were discovered by analyzing the content type IDs (which continues to work as it did in previous versions of SharePoint ).

article thumbnail

Bill Gates Active Again At Microsoft? Bad Idea.

John Battelle's Searchblog

'The post Bill Gates Active Again At Microsoft? Bad Idea. appeared first on John Battelle's Search Blog. ( image ) This story reporting that Gates will return to Microsoft “one day a week” to focus on “product” has been lighting up the news this week. But while the idea of a founder returning to the mothership resonates widely in our industry (Jobs at Apple, Dorsey at Twitter), in Gates’ case I don’t think it makes much sense.

Marketing 102
article thumbnail

Copyright v. Privacy: Voltage Pictures LLC v. John Doe and Jane Doe

Privacy and Cybersecurity Law

The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has […].

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

What Would You Ask Sundar Pichai, SVP Android & Chrome at Google?

John Battelle's Searchblog

'The post What Would You Ask Sundar Pichai, SVP Android & Chrome at Google? appeared first on John Battelle's Search Blog. A week from this coming Sunday at SXSW , I’ll be interviewing Sundar Pichai , Google’s Senior Vice President, Android, Chrome & Apps. Pichai has a huge job at Google, overseeing the company’s mobile ecosystem, from hardware (the Nexus platform) to the burgeoning Play store (oh, and that little browser/OS called Chrome, to boot).

Marketing 101
article thumbnail

else 2.10: “Information that was never designed for a human to see”

John Battelle's Searchblog

'The post else 2.10: “Information that was never designed for a human to see” appeared first on John Battelle's Search Blog. This week, we were thinking about data post-language, reading the tea leaves of algorithms, and wondering how to protect the first principles of the web. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

else 2.4: “Seeing ourselves as bits and bytes”

John Battelle's Searchblog

'The post else 2.4: “Seeing ourselves as bits and bytes” appeared first on John Battelle's Search Blog. This week, lots of talk of data ethics and infopolitics. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.