February, 2013

article thumbnail

On Coming Back to FMP

John Battelle's Searchblog

The post On Coming Back to FMP appeared first on John Battelle's Search Blog. Starting a business is a journey, as any founder will tell you. When I started Federated Media Publishing almost eight years ago, I did my best to collect all the lessons learned from Wired, The Industry Standard, and Web 2 Summit, and apply them to my new venture. One of those lessons was that it’s [.

IT 111
article thumbnail

Yahoo: back to the future office

Collaboration 2.0

Yahoo's command and control move of all employees back onsite may be a pyrrhic victory: bricks and mortar economics don't add up now that the epicenter of modern firms is the screen you're reading this on.

89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SharePoint 2013: Is utility more important than usability?

ChiefTech

Is utility more important than usability? When evaluating SharePoint 2013 specifically as a collaboration platform, this question is often top of mind. The Metro user interface in SharePoint 2013 is a refreshing update to this mature platform, but usability goes deeper than just the front-end theme. A good user experience is both subjective in relation to the user's own experience and situated in the context of use.

IT 54
article thumbnail

DB2 for z/OS: Boosting UNLOAD and LOAD Performance with Pipes and FORMAT INTERNAL

Robert's Db2

My colleague Jorn Thyssen, who is based in Denmark, recently let me know of some nice work that he had done in setting up a high-performance process that gets data from one DB2 for z/OS table into another via the UNLOAD and LOAD utilities. What Jorn shared with me I'll share with you in this blog post. Here's how this got started: Jorn, an IBM System z Information Management Technical Specialist, had delivered presentations on the DB2 Analytics Accelerator for z/OS to a number of organizations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Choosing an Internet, Digital Interactive Marketing Services Partner - Interviews and RFP/RFIs

Interactive Information Management

How to evaluate your digital, interactive marketing partner, for local and regional businesses - particularly in the Washington DC and Northern Virginia marketing and advertising area. We'll put it out there – as you evaluate prospective partners like KME Internet Marketing to help with web marketing initiatives, gaining exposure for your business and driving new sales from the Internet, this is exactly what you should seek.

More Trending

article thumbnail

The 2013 Summit Arrives: Bridging Data And Humanity

John Battelle's Searchblog

The post The 2013 Summit Arrives: Bridging Data And Humanity appeared first on John Battelle's Search Blog. Some of the more than 25 speakers already joining us at the 2013 CM Summit. Over on the brand spanking new CM Summit website, we’ve announced our initial speaker lineup and progam theme for the 2013 event – Parting the Clouds: Bridging Data and Humanity.

Marketing 108
article thumbnail

Reaction overload.

Collaboration 2.0

'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'

78
article thumbnail

VXConnect: Virgin America's Chatter-based intranet goes live

ChiefTech

I'm pretty sure there were some that said this sort of thing couldn't be done - run an intranet on an enterprise microblogging, cloud-based platform like Salesforce Chatter. But a few weeks ago - the concept we heard about last year - went live at Virgin America : The encouraging thing here is that, Appirio , the site's developer: "helped guide Virgin America away from making merely cosmetic tweaks to the existing Chatter experience and towards the development of a new application built on the C

Cloud 52
article thumbnail

Consciously Consider Early Adoption

CGI

Consciously Consider Early Adoption. ravi.kumarv@cgi.com. Wed, 02/20/2013 - 07:00. At Logica, now part of CGI, my job is to advise CIOs on how they can realise the greatest net value from the adoption of disruptive technology trends. We’re happy with our methods for most of the talked-about trends (analytics, social media, mobility, cloud…). But we need to keep horizon-scanning too, so the question naturally arises: How soon should we adopt the next major trend into our method?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.

article thumbnail

Singapore Personal Data Protection Commission Issues Advisory Guidelines

Hunton Privacy

Following up on its February 5, 2013 consultation paper , Singapore’s Personal Data Protection Commission has issued two additional public consultation papers concerning the guidelines the Commission is empowered to issue under the new data protection law. The first proposed set of advisory guidelines examines key concepts in the Personal Data Protection Act (“PDPA”), with thorough discussions of definitions as well as data protection obligations set forth in the PDPA.

article thumbnail

That Guilty Pile of Outdated Technology

John Battelle's Searchblog

The post That Guilty Pile of Outdated Technology appeared first on John Battelle's Search Blog. ( image Wired ) Way back in the day when I was making magazines, I was buried in print. I subscribed to at least twenty periodicals, easily twice that many came my way without my asking. It made for a huge pile of printed material on the end of my desk (stuff I really should read), and it creeped into the horizontal spaces behind me (stuff I think I should read, in case I get the time), or on my

Sales 107
article thumbnail

Reaction overload.

Collaboration 2.0

The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges

78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Highly anticipated 'Mailbox' app

ChiefTech

Mailbox is another attempt to reinvent the email interface , alto. Designed for mobile (currently iPhone + gmail only) and built loosely around the inbox zero concept, Mailbox have: "redesigned the inbox to make email light, fast, and mobile-friendly. Quickly swipe messages to your archive or trash. Scan an entire conversation at once with chat-like organization.

article thumbnail

CIOs must back technology innovation

CGI

CIOs must back technology innovation. ravi.kumarv@cgi.com. Thu, 02/07/2013 - 07:00. It can be damaging to talk about business innovation in technology terms. Unless you’re a company like Apple, which designs or manufactures technology products, your colleagues outside the IT department are likely to question your motivation. They’ll rightly assert that innovation is only legitimate when it supports the business goals.

article thumbnail

New EU rules on security

Privacy and Cybersecurity Law

If you Google “EU law on security”, you’ll find the EU Data Protection Directive near the top of the search […].

article thumbnail

FTC Settles Charges in First Case Against Mobile Device Manufacturer

Hunton Privacy

On February 22, 2013, the Federal Trade Commission announced that it had settled charges against HTC America, Inc. (“HTC”) alleging that the mobile device manufacturer “failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

An Apology To My RSS Readers – But I Had To Do It.

John Battelle's Searchblog

The post An Apology To My RSS Readers – But I Had To Do It. appeared first on John Battelle's Search Blog. If you’re a fan of this site, you’re also probably a fan of RSS. (For the full story please click over to my site. Fraudsters have been ripping off my full text feed, so I had to do this. So sorry).

IT 106
article thumbnail

Yahoo: Back to the future office

Collaboration 2.0

'Yahoo''s command and control move of all employees back onsite may be a pyrrhic victory: Bricks and mortar economics don''t add up now that the epicenter of modern firms is the screen you''re reading this on.

73
article thumbnail

Is Google's fixation on the office a weakness?

ChiefTech

It shouldn't really come as any surprise that Google doesn't actively encourage working from home (aka 'telecommuting' or the 'digital workplace'): Google believes working at home, or "teleworking", is not the best environment for ideas to flourish, according to its chief financial officer Patrick Pichette…. …'How many people telecommute at Google?' ” Mr Pichette said at a talk in Sydney on Monday.

IT 49
article thumbnail

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit.

IT 33
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The EU Data Protection Regulation: timing

Privacy and Cybersecurity Law

As we’re all aware the new Data Protection Regulation (the Regulation) was announced to much bombast a little over a […].

40
article thumbnail

NIST Issues RFI for Framework for Reducing Cyber Risks

Hunton Privacy

On February 26, 2013, the National Institute of Standards and Technology (“NIST”) issued a Request for Information (“RFI”) to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported , the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”), released on February 12, 2013, directs NIST to coordinate development of this framework.

Risk 40
article thumbnail

Reporters Need to Understand Advertising. But Should They Be Making It?

John Battelle's Searchblog

The post Reporters Need to Understand Advertising. But Should They Be Making It? appeared first on John Battelle's Search Blog. ( image ) I know that when I do write here, I tend to go on, and on – and those of you who read me seem to be OK with that. But sometimes the best posts are short and clear. That was my thought when I read Journalists Need Advertising 101 by Brian Morrissey, writing in Digiday last week.

IT 105
article thumbnail

Maintenance is the battleground, innovation the prize

Collaboration 2.0

'Rimini Street''s 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.

80
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Goodbye, Posterous (forever)

ChiefTech

Before hosting this site on Scriptogr.am , my last blog was hosted on Posterous. Unfortunately, Twitter are pulling the plug as of the 30th April: Posterous launched in 2008. Our mission was to make it easier to share photos and connect with your social networks. Since joining Twitter almost one year ago, we’ve been able to continue that journey, building features to help you discover and share what’s happening in the world – on an even larger scale.

article thumbnail

DB2 for z/OS: What Might "Template" DDL for CREATE TABLESPACE and CREATE INDEX Look Like?

Robert's Db2

Recently, a DB2 for z/OS DBA sent me a question about a particular clause of the SQL DDL (data definition language) statements CREATE TABLESPACE and CREATE INDEX. In his note containing the question he also sent what you might call his "template" CREATE TABLESPACE and CREATE INDEX statements -- the statements that serve as a pattern that he uses when creating these objects in his DB2 environment.

Access 48
article thumbnail

Cookies: the UK ICO perspective

Privacy and Cybersecurity Law

We’re now well past the UK grace period for cookie compliance. But what are companies actually doing about this? Are […].