March, 2014

article thumbnail

Harley Earl's influence on Steve Jobs

Collaboration 2.0

'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.

IT 111
article thumbnail

Might Curators Be An Answer To Twitter’s Signal To Noise Problem?

John Battelle's Searchblog

'The post Might Curators Be An Answer To Twitter’s Signal To Noise Problem? appeared first on John Battelle's Search Blog. My stats in 2008. And at present. 10X the number of folks followed = Signal to Noise problem. Twitter’s lack of growth over the past few months has quickly become its defining narrative – witness Inside Twitter’s plan to fix itself from Quartz, which despite the headline, fails to actually explain anything about said plan.

IT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Project Management, PMP, ITIL, Cost Estimating Business Training & Certification in Virginia

Interactive Information Management

If you're in any way associated with Government contracting, project or program management, project or system cost estimating or resourcing, whether on the job or during acquisition processes and proposal preparation - you may need PMP, ITIL or Cost Estimation Certification and/or training. This is important not only from the business manager perspective, but also from the Enterprise and Solution Architect perspective - it comes in very handy.

article thumbnail

German DPAs Issue Guidelines on CCTV Use

Hunton Privacy

On March 10, 2014, the German Federal Commissioner for Data Protection and Freedom of Information and all 16 German state data protection authorities responsible for the private sector issued guidelines on the use of closed-circuit television (“CCTV”) by private companies. The guidelines provide information regarding the conditions under which CCTV may be used and outline the requirements for legal compliance.

Retail 56
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DB2 for z/OS People: Wearing Your "Applications" Hat Versus Your "Systems" Hat

Robert's Db2

Not long ago, a colleague of mine sent to me an e-mail message that he'd received from a person who supports DB2 for z/OS at a US-based company. In this message the IT professional wrote of some DB2-accessing application programs that were running into lock contention issues with page-level locking (the default) in effect. He knew that going to row-level locking for the target tables (accomplished by altering the associated table spaces with LOCKSIZE(ROW)) would likely resolve the locking confli

Mining 48

More Trending

article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

111
111
article thumbnail

We Have Yet to Clothe Ourselves In Data. We Will.

John Battelle's Searchblog

'The post We Have Yet to Clothe Ourselves In Data. We Will. appeared first on John Battelle's Search Blog. We are all accustomed to the idea of software “Preferences” – that part of the program where you can personalize how a particular application looks, feels, and works. Nearly every application that matters to me on my computer – Word, Keynote, Garage Band, etc. – have preferences and settings.

Retail 109
article thumbnail

Government Open Data Success Via Information Sharing, Enterprise Architecture and Data Assets

Interactive Information Management

The title of this article is quite a mouthful, and three very complex and broadly-scoped disciplines mashed together. But that's what's happening all over, isn't it, driven by consumer demand on their iPhones - mashing and manipulating information that's managed to leak through the risk-adverse, highly-regulated mantle of the government's secure data cocoon, and instantly sharing it for further rendering, visualization or actual, productive use.

article thumbnail

Article 29 Working Party Issues Opinion on BCR and APEC CBPR Requirements

Hunton Privacy

On March 6, 2014 the Article 29 Working Party (the “Working Party”) published a comprehensive Opinion: Opinion 02/2014 on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in the EU and Cross-Border Privacy Rules submitted to APEC CBPR Accountability Agents. This blog post provides an overview of the Opinion.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 for z/OS SQL PL Routines: REBIND PACKAGE vs. ALTER REGENERATE

Robert's Db2

I have long been a big fan of DB2 for z/OS native SQL procedures, but I also recognized early on that putting this technology to use would require DB2 DBAs to learn some new things. Much of this newness has to do with the fact that for a native SQL procedure (and for its more recently arrived cousin, the "native" SQL scalar function , also known as a compiled SQL scalar function or a non-inline SQL scalar function), there is no external-to-DB2 executable -- no object module, no load module.

Access 48
article thumbnail

Improving SharePoint Designer's Code View

JKevinParker

Typeface preferences are subjective. That said, some fonts are just more readable than others. This is true even in "code view". Code editors should generally use a monospaced font (a font where each character is the same width), as this allows us to see patterns within lines of code more easily. But your font does not have to be awful. Like Courier New.

IT 40
article thumbnail

Ego 2.0 and the tragedy of the shrinking digital commons

Collaboration 2.0

'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done'

85
article thumbnail

Thinking Out Loud: Potential Information

John Battelle's Searchblog

'The post Thinking Out Loud: Potential Information appeared first on John Battelle's Search Blog. Plenty of potential at the top of this particular system. ( image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Romanian DPA approves use of BCRs

Privacy and Cybersecurity Law

Yesterday (27 March 2014) the Romanian DPA approved a decision on the use of Binding Corporate Rules (BCRs). Historically the DPA […].

40
article thumbnail

Leak of Grid Vulnerabilities Creates National Security Risks

Hunton Privacy

The recent leak of an internal memo to the former Chair of the Federal Energy Regulatory Commission, which was widely reported by national news media, has created a national security setback for the United States. Many are concerned that the disclosure may provide terrorists and other bad actors a roadmap for causing a prolonged nationwide blackout.

article thumbnail

Together, we can make a difference

Scary Beasts Security

A couple of weeks back, I released a popular spreadsheet which lists many of the Adobe Flash Player 0-days used to harm people in the wild since 2010. I counted 18 and countless kind Twitterers pointed out some I may have missed. It was an interesting exercise, of course with an ulterior motive! Looking beyond the raw counts, the spreadsheet shouts two items: We should want to make a difference.

IT 20
article thumbnail

Fixing Enterprise Wiki Page Titles and URLs in SharePoint 2013

JKevinParker

Enterprise Wiki pages in SharePoint 2013 (as with SharePoint 2010) are pretty easy pages for users to create and author. There are a few things that bug me and other standards advocates out there, chief of which (for me) are the title and file name problems. Problems with Enterprise Wiki Page Titles Create a new page called "My New Page" in an existing page by enclosing that title in double square brackets: This will create a dashed underlined link that, when clicked, will prompt the user to cre

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

article thumbnail

Else 3.3.14: Is The Internet A Utility?

John Battelle's Searchblog

'The post Else 3.3.14: Is The Internet A Utility? appeared first on John Battelle's Search Blog. The week was dominated by Google related stories, but the top dialog had to do with the Internet itself. I’m sensing something of a shift in society’s beliefs about the Internet’s central role in our humanity. Five years ago, no one wanted to talk about Internet access as a basic human right.

Privacy 96
article thumbnail

The Importance of Policies

Privacy and Cybersecurity Law

A recent settlement with the US Department of Health and Human Services Office of Civil Rights (OCR) demonstrates the importance […].

article thumbnail

Australian Data Breach Notification Bill Re-Introduced

Hunton Privacy

On March 20, 2014, Australia’s Privacy Amendment (Privacy Alerts) Bill 2014 was re-introduced in the Senate for a first read. The bill, which was subject to a second reading debate on March 27, 2014, originally was introduced on May 29, 2013, but it lapsed on November 12, 2013 at the end of the session. As we previously reported , if passed, the bill would amend the Privacy Act 1988 by introducing a mandatory breach notification requirement for “serious data breaches.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Why You Should Read The Circle, Even If You Don’t Buy It

John Battelle's Searchblog

'The post Why You Should Read The Circle, Even If You Don’t Buy It appeared first on John Battelle's Search Blog. Last month I finished Dave Eggers’ latest novel The Circle , the first work by a bona fide literary light that takes on our relationship with today’s Internet technology and, in particular, our relationship with corporations like Google.

IT 87
article thumbnail

Else 3.10.13: Satoshi, Snowden, Google, And The Meaning of it All

John Battelle's Searchblog

'The post Else 3.10.13: Satoshi, Snowden, Google, And The Meaning of it All appeared first on John Battelle's Search Blog. The past week spun with controversy and breaking news around many of our society’s most interesting conversations: The elusive founder of bitcoin was identified, or perhaps not, Edward Snowden popped up at SXSW (by video, of course) and submitted testimony to the EU, the Aereo case is on its way to the Supreme Court (and launched in Austin at SXSW, of course), and

IT 84
article thumbnail

Else 3.24.14: “In front of us are two roads – which way are we going to go?”

John Battelle's Searchblog

'The post Else 3.24.14: “In front of us are two roads – which way are we going to go?” appeared first on John Battelle's Search Blog. Back in the saddle after missing a week of Else (sorry about that). The best stories from the past two weeks are below, and you’ll note a bit of TED, which ran last week, as well as a fair amount of Google, which is hard to avoid given the focus of this newsletter: If you’re going to cover “becoming data” it’s b

article thumbnail

Reaction overload.

Collaboration 2.0

'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'

78
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

7 habits of highly overrated people: Managing self-promoters

Collaboration 2.0

'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.

article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

94
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

77