January, 2013

article thumbnail

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

The post Portrait of Twitter As A Young Media Company appeared first on John Battelle's Search Blog. Last year I predicted that Twitter would become a media company. However, I focused mainly on the new “ Discover ” functionality, and I probably should have gone a lot further. In this piece, I intend to. So I’ll start with this: 2013 will be the year Twitter starts to create, curate, and co-create media experiences on top of its platform.

IT 111
article thumbnail

The overconfidence problem

Collaboration 2.0

The cult of me continues.data from a survey of US freshmen shows increasing perceptions of being 'above average': Are they deluded or the greatest generation?

94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Self-service checkouts - love them or hate them, its all about the customer

ChiefTech

Self-service checkouts in supermarkets and other retails shop fronts are fascinating on so many levels - from their design to the ethical dilemma of replacing people with machines. Writing recently recently in Computerworld, Patrick Thibodeau reports that while some retailers in the US are installing more self-service technology, others are now removing them.

Retail 74
article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

IT 62
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DB2 for z/OS Data Sharing: the Lock List Portion of the Lock Structure

Robert's Db2

With DB2's data sharing capability having been introduced back in the mid-1990s with DB2 for z/OS Version 4, a great many people -- including lots of folks whose organizations do not run DB2 in data sharing mode -- are quite familiar with the technology (for people new to this subject area, I posted, a few years ago, a "What is DB2 Data Sharing?" entry to the blog that I maintained while working as an independent DB2 consultant).

More Trending

article thumbnail

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet. If a text tweet = 140 characters, then a video tweet = 6 seconds. More details over at TNW , but this announcement is quite consistent with my post earlier this week: Portrait of Twitter As A Young Media Company.

article thumbnail

The value of automation question

Collaboration 2.0

Is there too much reliance on software to lead businesses into the future? Strategic thinking should arguably come from within firms, not as purchased generic techniques & enabling tools.

77
article thumbnail

Agile intranet strategies

ChiefTech

I co-wrote this piece for Image & Data Magazine in 2004 (PDF), but its still relevant to the question posted by Andrew Wright on LinkedIn : How should great intranets be developed? As a project or as a series of rapid incremental improvements? Or both? (For more see his blog post ). Our recommendation back in 2004 was that we should stop searching for intranet perfection, instead work in a way that is more 'agile': Flexibility and the ability to prioritise are key to success.

IT 62
article thumbnail

Do your customer calls all look the same? They shouldn’t.

Dark Reading

Without the ability to verify the Caller ID or ANI, all customer calls can look the same to call center agents. This a risky proposition for any financial institution that handles thousands of customer calls each day. In other words, if all calls appear the same there’s no way to answer some of the key questions all banks should know about customer calls, such as: Which calls are trustworthy?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CurateGear 2013

Preservica

We recently attended the CurateGear digital curation symposium at the University of North Carolina at Chapel Hill. In fact, we had two of our top digital preservation experts, Mark Evans and Mike Thuman attend to participate in the lightening talks and break-out sessions. It’s great to support Helen Tibbo and Cal Lee in bringing this community together to look at technology options in various stages.

article thumbnail

UK ICO Publishes Further Views on the European Commission’s Revised Data Protection Framework

Hunton Privacy

Following up on the UK Information Commissioner’s Office’s (“ICO’s”) positive reaction to the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”), the ICO has now published additional thoughts on the European Commission’s proposed revised data protection framework , reacting to the recent draft report prepared by the rapporteur to the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs, Jan Philipp Albrecht.

article thumbnail

We Are (About to Be) As Gods. Can We Get Used To It?

John Battelle's Searchblog

The post We Are (About to Be) As Gods. Can We Get Used To It? appeared first on John Battelle's Search Blog. Last month I finished another of my “must read” books - Regenesis: How Synthetic Biology Will Reinvent Nature and Ourselves , by George Church and Ed Regis. While the authors don’t veer into the religious, a reader can’t help but ponder the unknown and the supernatural – because the book rather calmly takes a fair amount of what we take for granted as p

IT 104
article thumbnail

Clash of the titans

Collaboration 2.0

'The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IBM Connections 4.5 coming in March 2013

ChiefTech

At IBM Connect 2013 (previously known as Lotusphere) this week, they have presented details of the March release of IBM Connections 4.5. Michael Sampson provided some rough but detailed notes about the new features in this release. Scanning the list for the highlights, there is a good spread of user interface, mobile app and back-end improvements. End-users in particular will welcome the new @ mentions and the ability to like within the main activity stream.

IT 52
article thumbnail

The Real Value of Bring Your Own

CGI

The Real Value of Bring Your Own. ravi.kumarv@cgi.com. Thu, 01/24/2013 - 07:00. Unsure about adopting “Bring Your Own”? You’re in good company! CIOs should use methods which reliably estimate benefits and costs, so they can make defensible judgements about value …. With CIOs thinking hard about the merits and pitfalls of allowing staff to connect their own devices to the corporate environment, the time seems right to help by providing a summary of our evaluation tools for “Bring Your Own Device

article thumbnail

Canada’s Anti-Spam Law (CASL) – Proposed New Regulations Would Soften Impact

Privacy and Cybersecurity Law

Draft Regulations recognize CASL should not apply to “regular business communications” Industry Canada has published long-awaited draft Regulations that would lessen the impact […].

article thumbnail

Article 29 Working Party Opines on Need for Implementing Acts in Proposed Regulation

Hunton Privacy

On January 22, 2013, the Article 29 Working Party released Opinion 01/2013 (the “Opinion”) on the implementing acts contained in the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). As previously reported , the Working Party has already adopted two Opinions on the Proposed Regulation (Opinion 01/2012 and Opinion 08/2012).

IT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Amazon is Amazin’ Me

John Battelle's Searchblog

The post Amazon is Amazin’ Me appeared first on John Battelle's Search Blog. I’m a fan of Amazon, always have been, though my relationship with the brand has, ironically, never been particularly personal. I don’t feel emotional about Amazon, I feel – transactional. This despite the fact that I have probably spent more on the site than the combined college savings accounts for my three kids (Hi Kids!).

Metadata 103
article thumbnail

Clash of the titans

Collaboration 2.0

The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

71
article thumbnail

Copyright confusion: The SMH, a duck and the Sydney Opera House

ChiefTech

I'm no lawyer so this is where I get confused about who is right and wrong around intellectual property, particularly with photos. The Sydney Morning Herald runs a series of articles about photographers intellectual property rights being infringed. Then they inappropriately use a picture that they discovered through Twitter, but didn't actually check the ownership.

IT 46
article thumbnail

How can we create a level playing field for diverse talent?

CGI

How can we create a level playing field for diverse talent? ravi.kumarv@cgi.com. Tue, 01/15/2013 - 07:00. Organisations have dominant cultures – ways of working and relating that are most comfortable for the majority of the workforce. The individuals who most represent these dominant cultures can often excel if they have true talent and the ambition.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Children’s Online Privacy Protection: U.S. Developments Compared to Canada

Privacy and Cybersecurity Law

There were two important developments in the U.S. regarding children and mobile technologies. FTC Staff Report On December 10, 2012, […].

Privacy 40
article thumbnail

FTC Settles Alleged Breach of Consumers’ Personal Information

Hunton Privacy

On January 28, 2013, the Federal Trade Commission announced a proposed settlement agreement with CBR Systems, Inc. (“CBR”), an operator of a cord blood bank, which collects personal information about consumers and physicians through its websites and in connection with the provision of its services, including names, addresses, dates of birth, Social Security numbers, credit card numbers and health information.

Privacy 40
article thumbnail

Phones! Now With Multitasking! Why Mobile Is About To Have Its Web Revolution.

John Battelle's Searchblog

The post Phones! Now With Multitasking! Why Mobile Is About To Have Its Web Revolution. appeared first on John Battelle's Search Blog. While at CES last week, I had the pleasure of moderating a panel with four extraordinary publishers – all FM authors. The topic was “2013 Trends” and I got to hear Anand Shimpi (of AnandTech ), Brad McCarthy (of The Next Web ), Elaine Fiolet (of UberGizmo ) and Leander Kahney (from the Cult of Mac ) expound on what they’d seen in Vega

IT 101
article thumbnail

Lance Armstrong & digital power brokering challenges

Collaboration 2.0

'Negative viral infection of social networks is an increasing issue: digital cliques can calcify into silos inside companies, and sophisticated communicators can be a force for good or bad.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Using networked lamps for ambient awareness

ChiefTech

There seems to be a lot of buzz around light-based Internet of Things projects, such as Light by Moore's Cloud. Slightly less ambitious than Moore's Cloud is the Good Night Lamp: I'm actually attracted more to this concept because it supports the idea of ambient awareness communicated through objects in the physical space than as a portal to other Internet of Things applications (which is my perception of Moore's Cloud).

Cloud 46
article thumbnail

DB2 for z/OS: An Interesting "Flip Side" to Native SQL Procedures

Robert's Db2

I heard the other day from a DB2 for z/OS DBA who communicated to me an interesting story. His organization had recently gotten into development and deployment of native SQL procedures on the mainframe DB2 platform. The native SQL procedures were working as advertised, but the move to utilize this DB2 technology had engendered grumbling on the part of some of the organizations' application programmers.

Access 48
article thumbnail

Predictions From Last Year: How I Did (2012 Edition)

John Battelle's Searchblog

The post Predictions From Last Year: How I Did (2012 Edition) appeared first on John Battelle's Search Blog. Every year around this time I do two things: First I look back at my predictions from a year ago and grade myself, then I get around to making a new set of predictions. These are often my most popular posts of the year, proving the old magazine saw that the world loves a list.

Marketing 101