September, 2011

article thumbnail

Facebook As Storyteller

John Battelle's Searchblog

( image ) Recently I was in conversation with a senior executive at a major Internet company, discussing the role of the news cycle in our industry. We were both bemoaning the loss of consistent "second day" story telling - where a smart journalist steps back, does some reporting, asks a few intelligent questions of the right sources, and writes a longer form piece about what a particular piece of news really means.

IT 104
article thumbnail

Dreamforce efficiently sells Salesforce global cloud vision

Collaboration 2.0

Salesforce exhibit marketing & presentation genius on a par with Apple to roll out new products across the global internet; pragmatic challenges in planning and realizing your needs are sometimes underestimated during roll out after digesting the dream

Cloud 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The World is Now a Global Village

Daradiction

Marshall McLuhan was a post modern day prophet. Read his prediction of the internet from 1962, “The next medium, whatever it is – it may be the extension of consciousness – will include television as its content, not as its environment, and will transform television into an art form. A computer as a research and communication instrument could enhance retrieval, obsolesce mass library organization, retrieve the individual’s encyclopedic function and flip into a private line to speedil

article thumbnail

DB2 for z/OS Version 10: Moving Objects from One Buffer Pool to Another

Robert's Db2

Over the past 15 years or so, I have written magazine articles, and presented, and blogged on the topic of DB2 for z/OS buffer pools and their impact on application performance (two of my more recent blog entries in this category were posted in September and October of last year). Often, the message boils down to this: bigger buffer pool configuration = good.

IT 59
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

OnStar Announces Reversal of Controversial Vehicle Data Collection Proposals

Hunton Privacy

On September 27, 2011, OnStar announced it was reversing proposed changes to its Terms and Conditions that would have allowed the company to continue to receive data from former subscribers’ vehicles unless they specifically opted out. OnStar’s current Privacy Statement indicates that the GM subsidiary collects information regarding its customers’ vehicle operation, location, approximate speed, collision data and safety belt usage in connection with OnStar’s in-vehicle GPS navigation and emerge

More Trending

article thumbnail

The Future of Twitter Ads

John Battelle's Searchblog

( image ) As I posted earlier , last week I had a chance to sit down with Twitter CEO Dick Costolo. We had a pretty focused chat on Twitter's news of the week , but I also got a number of questions in about Twitter's next generation of ad products. As usual, Dick was frank where he could be, and demurred when I pushed too hard. (I'll be talking to him at length at Web 2 Summit next month.

Marketing 103
article thumbnail

Cult of leadership

Collaboration 2.0

Enterprise leadership is often out of touch with innovation, collaborative processes and the levers for success: ‘Car Guys vs Bean Counters - The battle for the soul of American Business’ by Bob Lutz encapsulates much of what is wrong

85
article thumbnail

The World is Now a Global Village

Daradiction

Marshall McLuhan was a post modern day prophet. Read his prediction of the internet from 1962, "The next medium, whatever it is it may be the extension of consciousness will include television as its content, not as its environment, and will transform television into an art form. A computer as a research and communication instrument could enhance retrieval, obsolesce mass library organization, retrieve the individual's encyclopedic function and flip into a private line to speedily tailored data

article thumbnail

How big can a DB2 for z/OS index be?

Robert's Db2

That looks like a pretty simple question, doesn't it? I mean, if I were asking about maximum table space size, you'd be able to answer, really quickly, with "64 GB for a non-partitioned table space, 128 TB for a non-LOB partitioned table space," right? Asking about maximum size for an index doesn't make the question that much harder, does it? Or does it?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Seventh Circuit Finds in Favor of Resellers in DPPA Suit

Hunton Privacy

On September 28, 2011, a federal court in Illinois held that West Publishing Company (“West”) had not violated the Driver’s Privacy Protection Act (“DPPA”) by reselling driver’s license information obtained from state DMVs. The court held that (1) the DPPA creates a federal private right of action permitting individuals like the plaintiffs to bring their class action suit, but (2) the lower court’s dismissal for failure to state a claim was proper.

Privacy 40
article thumbnail

Blurring the lines between work and play

CGI

Blurring the lines between work and play. ravi.kumarv@cgi.com. Mon, 09/12/2011 - 08:00. Last weekend I watched my friend’s 2-year-old son swipe through her iPhone to find his favourite video clip. I realised then just how much the future of business applications will need to change in order to keep the future generation of iBabies engaged. Game dynamics have long been used to build loyalty in brands and to encourage behavioural trends.

article thumbnail

Just In Case Ya Missed It, Google Is Pushing Google+, Hard

John Battelle's Searchblog

This is what users who are not logged in see on the home page of Google. Clearly, folks at Google would very much like you to sign up for Google+. There's a lot more to say on this subject, but I'm on the road. Just wanted to capture this for posterity. Google+ is a major play by the company to put digital mortar between all of its offerings, and create a new sense of what the brand *means* - far more than search.

IT 94
article thumbnail

Lives of others - two aspects of social engineering

Collaboration 2.0

Kevin Mitnicks’ exciting ‘Ghost in the Wires’ book is fundamentally a memoir of solo social engineering capers; is the modern ’social’ web vulnerable to the few controlling the many in the style of the East German STASI?

74
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Buckminster Fuller: San Quentin Prison, 31 Jan 1959

Daradiction

It’s long (over 3 hours) but covers Bucky’s story and lots of insights.

IT 49
article thumbnail

Managing DB2 for z/OS CPU Parallelism for Dynamic SQL

Robert's Db2

DB2 for z/OS query CPU parallelism (hereinafter referred to simply as "query parallelism"), introduced with DB2 Version 4 i n the mid-1990s, enables DB2 to split a query into multiple tasks that can execute concurrently on a mainframe server. The primary benefit of query parallelism is improved performance from an elapsed time perspective (query parallelism tends to increase statement execution CPU time somewhat -- this because DB2 needs to evaluate a candidate statement to determine whether or

IT 48
article thumbnail

Hunton & Williams Expands Privacy Practice in London with the Addition of Rosemary Jay

Hunton Privacy

Hunton & Williams announces that Rosemary Jay, formerly head of the privacy practice at Pinsent Masons and the former head of the legal team at the UK Information Commissioner’s Office, will join the firm’s Privacy and Data Security practice in October. Ms. Jay will be based in the firm’s London office. As a senior lawyer, Ms. Jay will bring more than 20 years of data protection experience to Hunton & Williams, enhancing both the firm’s renowned privacy practice and its Centre for Info

Privacy 40
article thumbnail

Facebook As Storyteller

John Battelle's Searchblog

( image ) Recently I was in conversation with a senior executive at a major Internet company, discussing the role of the news cycle in our industry. We were both bemoaning the loss of consistent "second day" story telling - where a smart journalist steps back, does some reporting, asks a few intelligent questions of the right sources, and writes a longer form piece about what a particular piece of news really means.

IT 92
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Maybe There Really Will Only Be Five Computers.

John Battelle's Searchblog

Thomas J. Watson , legendary chief of IBM during its early decades and the Bill Gates of his time, has oft been quoted - and derided - for stating, in 1943, that "I think there is a world market for maybe five computers." Whether he actually said this quote is in dispute, but it's been used in hundreds of articles and books as proof that even the richest men in the world (which is what Watson was for a spell) can get things utterly wrong.

article thumbnail

Google As Content Company - A Trend Worth Watching

John Battelle's Searchblog

It's been a while since I've said this, but I'll say it again: Google is a media company, and at some point, most media companies get pretty deep into the Making Original Content business. With the acquisition of Zagat * Google has clearly indicated it's going to play in a space it once left to the millions of partners who drove value in its search and advertising business.

Sales 80
article thumbnail

Enterprise strata isn't as firm as it appears

Collaboration 2.0

Enterprises often appear to be like rocks - never changing. The pace of global change socially & technologically is increasingly catching out sedentary firms who fail to evolve, but what are their options?

IT 74
article thumbnail

The Web 2 Summit Data Layer Is Live

John Battelle's Searchblog

Earlier this year I posted about an idea we've come up with to create a new "data layer" on top of last year's popular "Points of Control" map. We created this map to visualize the theme of the Web 2 Summit conference, which is coming up again in a few weeks. As you can see from the map, we've visualized eight key Internet players as cities, with each of the buildings representing storehouses of key data types.

IT 72
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

On Location, Brand, and Enterprise

John Battelle's Searchblog

From time to time I have the honor of contributing to a content series underwritten by one of FM's marketing partners. It's been a while since I've done it, but I was pleased to be asked by HP to contribute to their Input Output site. I wrote on the impact of location - you know I've been on about this topic for nearly two years now. Here's my piece.

Retail 71
article thumbnail

Help Me Interview Mark Pincus, CEO/Founder, Zynga

John Battelle's Searchblog

T oday kicks off my annual postings on folks I'll be in interviewing for the Web 2 Summit. Every year I seek your input, every year you help me get smarter, and I thank you for that. The Web 2 Summit (to which all readers of this site are invited) kicks off Oct. 17th with Mark Pincus , a fellow I've known for over a decade, since his days at Freeloader, Support.com, and Tribe.

article thumbnail

Twitter Makes a Statement

John Battelle's Searchblog

I could not make Twitter's press event today, but I did get a chance to sit with CEO Dick Costolo (the Web 2 Summit dinner speaker this year) yesterday afternoon, and got a chance to do a deep dive on today's news. I'll write up more on that as soon as I can, but the recap: 100 million active users around the globe turn to Twitter to share their thoughts and find out what’s happening in the world right now.

63
article thumbnail

Privacy Piracy Host Interviews Sotto

Hunton Privacy

On September 19, 2011, Privacy Piracy host Mari Frank interviewed Lisa J. Sotto , partner and head of the Global Privacy and Data Security practice at Hunton & Williams LLP, on KUCI 88.9 FM radio in Irvine, California. In the interview, Ms. Sotto discussed critical current privacy and data security issues, including lessons learned from the recent data breaches, the regulatory framework in the U.S. and EU, and expected legislative changes in the privacy arena globally.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Data Breach Bills Clear Senate Judiciary Committee

Hunton Privacy

On September 22, 2011, the Senate Judiciary Committee approved three separate bills that would establish a national data breach notification standard. Because the bills were approved on a party-line vote, and several other data breach bills currently are under consideration by other Senate committees, the prospects for these three bills in the full Senate are uncertain.

article thumbnail

French Data Protection Authority Elects New Chair

Hunton Privacy

On September 21, 2011, the board of the French Data Protection Authority (the “CNIL”) elected Isabelle Falque-Pierrotin as its new Chair, following Alex Türk’s resignation which he officially tendered at the board meeting. Ms. Falque-Pierrotin is a graduate of the National School of Administration ( l’École Nationale d’Administration ) and the Paris School of Business Management ( l‘École des Hautes Études Commerciales ).

article thumbnail

Angola Passes Personal Data Protection Law

Hunton Privacy

On June 17, 2011, the National Assembly of the Republic of Angola passed Law 22/11 on Personal Data Protection. The omnibus privacy legislation applies to the automated and non-automated processing of personal data by controllers based or operating in Angola, or subject to, or using equipment governed by, Angola’s laws. Some highlights of the law are listed below.