March, 2012

article thumbnail

Rob Reid + Copyright Math = Hilarious

John Battelle's Searchblog

A highlight of TED this year was watching my pal Rob Reid do a short talk on the math of those who claim piracy is killing the content business. It’s short, it’s really funny, and it’s a prequel of sorts for Rob’s wonderful new comic novel, which comes out in May.

IT 111
article thumbnail

Sharepoint, Salesforce and the enterprise platform battle

Collaboration 2.0

The largest software company in the world and the ‘no software’ cloud world are colliding, and in the perceptions battle Sharepoint are shining a lot brighter

Cloud 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APAR PM29226 and DB2 for z/OS Native SQL Procedure Source Code Management

Robert's Db2

Sometimes an APAR (in IBM-ese, a description of a software functional enhancement or defect correction effected via application of a fix) is not what it -- at first -- seems. Take DB2 for z/OS APAR PM29226 , for example. The opening sentence of the brief (just one paragraph) APAR text reads as follows: "This APAR provides sample job DSNTEJ67 which initiates the process of converting source for an external SQL procedure into source for a native SQL procedure.

article thumbnail

Article 29 Working Party Opines on Proposed EU Data Protection Law Reform Package

Hunton Privacy

On March 23, 2012, the Article 29 Working Party (the “Working Party”) adopted an Opinion on the European Commission’s data protection law reform proposals , including the draft Regulation that is of particular importance for businesses. The Working Party’s Opinion serves as the national data protection authorities’ contribution to the legislative process before the European Parliament and the European Council.

Privacy 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

So you want to implement a digital preservation management system?

Preservica

You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.

More Trending

article thumbnail

LinkedIn, The Media Company?

John Battelle's Searchblog

Quick, what’s LinkedIn? If you’re like me, the first thing that comes to mind is “a professional social network.” Perhaps “a place to get a job, or find someone to fill a job.” Or maybe “the place my professional resume lives.” And certainly “a very successful Internet IPO.” But over the two years or so, LinkedIn has quietly built itself into a significant media business.

Marketing 105
article thumbnail

Small, medium or large collaboration headache?

Collaboration 2.0

Who’s going to be the primary technology ‘parents’ and who will be the ‘children’ in order to solve the fragmentation and information filtering issues that are plaguing efficiency in many larger firms? More importantly, who is going to be responsible for this important task?

79
article thumbnail

CRTC Finalizes Anti-Spam Regulations – A Bit More Flexibility for Businesses

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has made and registered its Electronic Commerce Protection Regulations for the Anti-Spam Act (CASL). […].

IT 40
article thumbnail

RockYou Settles FTC Charges Related to Data Breach, COPPA Violations

Hunton Privacy

On March 27, 2012, the Federal Trade Commission announced a proposed settlement order with RockYou, Inc. (“RockYou”), a publisher and developer of applications used on popular social media sites. The FTC alleged that RockYou failed to protect the personal information of 32 million of its users, and violated multiple provisions of the FTC’s Children’s Online Privacy Protection Act (“COPPA”) Rule when it collected information from approximately 179,000 children.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The paradox of open source and digital preservation

Preservica

Interesting view from Unesco about the economics of open source for a fully functioning OAIS digital preservation solution. Unesco is a big supporter of open source but it notes that when there is a need for a fully integrated standards based system for storage and management suitable for long term access an open source solution requires significant financial resource.

article thumbnail

Some random observations on Linux ASLR

Scary Beasts Security

I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.

article thumbnail

The Yin and Yang of Audience

John Battelle's Searchblog

( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ). The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin

article thumbnail

It's the people, stupid

Collaboration 2.0

There’s plenty of great online and mobile technology available across a wide range of price points for small & medium businesses right up to global enterprises, but none of them will be of much use without successfully motivating your prospective participants to start interacting through these channels

IT 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Anti-Spam Law: See updated CASL v. CAN-SPAM summary

Privacy and Cybersecurity Law

Are you one of those who have been monitoring the progress of Canada’s Anti-Spam Law (CASL)? If so, you may also […].

article thumbnail

FTC Privacy Report Emphasizes Privacy by Design, Individual Control and Transparency

Hunton Privacy

On March 26, 2012, the Federal Trade Commission issued a new privacy report entitled “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers.” The report charts a path forward for companies to act in the interest of protecting consumer privacy. In his introductory remarks, FTC Chairman Jon Leibowitz indicated his support for Do Not Track stating, “Simply put, your computer is your property; no one has the right to put anything on it that you d

Privacy 40
article thumbnail

The National Archives work with DROID and PRONOM

Preservica

Interested to read the comments from Ross Spencer on The National Archives' work with DROID and PRONOM visit blog.nationalarchives.gov.uk. Both have come a long way since we wrote the original versions. They are both cornerstones of Digital Preservation and it is great to see such a positive future for them. They are both of course a key part of our SDB system.

article thumbnail

vsftpd-3.0.0-pre1 and seccomp filter

Scary Beasts Security

For the brave, there now exists a pre-release version of vsftpd-3.0.0: [link] [link] The most significant change is an initial implementation of a secondary sandbox based on seccomp filter , as recently merged to Ubuntu 12.04. This secondary sandbox is pretty powerful, but I'll go into more details in a subsequent post. For now, suffice to say I'm interested in testing of this new build, e.g.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

On the State of Twitter Advertising: Adam Bain

John Battelle's Searchblog

Last week I wrote a post about Neal Mohan , who will be joining us for this month’s Signal conference in San Francisco. Today I’m focusing on Adam Bain and his role as President, Global Revenue at Twitter. I’ve known Adam for some time, since his days at Fox Interactive Media, where he built Fox’s advertising platform (initially as a product out of MySpace).

article thumbnail

The idea peloton

Collaboration 2.0

Recognizing who has created ideas and concepts, and who has done the relatively unglamorous work of achieving success with detail work is instrumental to the success of enduring confidence in collaborative work

76
article thumbnail

DB2 for z/OS: Trading Memory for MIPS (Part 1)

Robert's Db2

If you are a DB2 for z/OS DBA or systems programmer, chances are that a good bit of what you do is focused on improving the CPU efficiency of your organization's DB2-accessing application workload. There are various ways in which people go about reducing DB2-related CPU consumption, including SQL statement tuning, physical database design changes (e.g., adding or modifying indexes), shifting work to zIIP engines (for example, by going with native SQL procedures versus external stored procedures

Access 48
article thumbnail

Massachusetts Attorney General Announces $15,000 Settlement with Property Management Firm

Hunton Privacy

On March 21, 2012, Massachusetts Attorney General Martha Coakley announced that Maloney Properties Inc. (“MPI”), a property management firm, executed an Assurance of Discontinuance and agreed to pay $15,000 in civil penalties following an October 2011 theft of an unencrypted company-issued laptop. The laptop contained personal information of more than 600 Massachusetts residents and was left in an employee’s car overnight.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Whole life information management: enterprise digital preservation and enterprise content management

Preservica

Download available on Enterprise Digital Preservation and Enterprise Content Management. Content Management and Archiving.

article thumbnail

On the failings of Pwn2Own 2012

Scary Beasts Security

This year's Pwn2Own and Pwnium contests were interesting for many reasons. If you look at the results closely, there are many interesting observations and conclusions to be made. $60k is more than enough to encourage disclosure of full exploits As evidenced by the Pwnium results , $60k is certainly enough to motivate researchers into disclosing full exploits, including sandbox escapes or bypasses.

article thumbnail

China To Bloggers: Stop Talking Now. K Thanks Bye.

John Battelle's Searchblog

( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).

article thumbnail

It ain't what you do.

Collaboration 2.0

Achieving great collective performance has the same basic principles for musicians, sports teams and other groups of individuals.

IT 81
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The Yin and Yang of Audience

John Battelle's Searchblog

( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ) The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin&

article thumbnail

CM Summit White Paper from 2007

John Battelle's Searchblog

I am in the midst of writing a post on the history of FM, and I thought it’d be fun to post the PDF linked to below. It’s a summary of musings from Searchblog circa 2006-7 on the topic of conversational media, which is much in the news again, thanks to Facebook. We created the document as an addendum to our first ever CM Summit conference, as a way of describing why we were launching the conference.

Paper 67
article thumbnail

Morning on cloud planet

Collaboration 2.0

Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.

Cloud 76