August, 2011

article thumbnail

Twitter and the Ultimate Algorithm: Signal Over Noise (With Major Business Model Implications)

John Battelle's Searchblog

Note: I wrote this post without contacting anyone at Twitter. I do know a lot of folks there, and as regular readers know, have a lot of respect for them and the company. But I wanted to write this as a "Thinking Out Loud" post, rather than a reported article. There's a big difference - in this piece, I am positing an idea. It's entirely possible my lack of reporting will make me look like an uninformed boob.

Insurance 111
article thumbnail

Escape to the cloud: Domino data extraction made easy

Collaboration 2.0

Unlocking information from elderly IT silos is essential to realize the benefits of modern technologies; CIMTrek show how to quickly extract content from Domino & Notes applications

Cloud 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS and SNA: Breaking the Ties that (Used to) Bind

Robert's Db2

I don't know if there are any industries in which things change as quickly (and constantly) as they do in the realm of information technology. Just a few years ago, clouds were what produced rain, streams were watercourses , and Ruby on Rails might have been a reference to your aunt taking the express train to New York City. Today, those are all IT terms.

article thumbnail

France Introduces Prior Opt-in Consent for Cookies

Hunton Privacy

On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Government IT Reform

JKevinParker

I'm currently working through the White House's 25 Point Implementation Plan to Reform Federal Information Technology Management. I want to quickly highlight the first paragraph of that document so that you will understand why I am so passionate about helping Uncle Sam make major improvements: Information technology should enable government to better serve the American people.

More Trending

article thumbnail

Who Am I, According to Google Ads? Who Am I, According to the Web? Who Do I Want to Be?

John Battelle's Searchblog

Over on Hacker News , I noticed this headline: See what Google knows about you. Now that's a pretty compelling promise, so I clicked. It took me to this page: Ah, the Google ad preferences page. It's been a while since I've visited this place. It gives you a limited but nonetheless interesting overview of the various categories and demographic information Google believes reflect your interests (and in a way, your identity, or "who you are" in the eyes of an advertising client).

IT 97
article thumbnail

With Tech, We Are Not Where We Want To Be (Or, This Cake Ain't Baked)

John Battelle's Searchblog

Last week I finished reading Sherry Turkle's " Alone Together ", and while I have various disagreements with the work (I typed in more than 70 notes on my Kindle, even with that terribly tiny keyboard), I still found myself nodding in agreement more than I thought I would. In her book, Turkle explores our relationship with technology, in particular what she calls "sociable robots" (toys like the Aibo or My Real Baby), as well as with email, IM, and shared virtual spaces like Second Life and Face

IT 88
article thumbnail

Physics of the Future, by Michio Kaku

John Battelle's Searchblog

As part of my ongoing self-education - so as to not be a total moron while writing " What We Hath Wrought " - this past weekend I read " Physics of the Future " by Michio Kaku. I was excited to read the book, because Kaku is a well regarded physicist, and that's a field that I know will inform what's possible, technologically, thirty or so years from now.

article thumbnail

More on Twitter's Great Opportunity/Problem

John Battelle's Searchblog

I n the comments on this previous post , I promised I'd respond with another post, as my commenting system is archaic (something I'm fixing soon). The comments were varied and interesting, and fell into a few buckets. I also have a few more of my own thoughts to toss out there, given what I've heard from you all, as well as some thinking I've done in the past day or so.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Who Will Be Here One Generation From Now?

John Battelle's Searchblog

( image ) I just re-read my post explaining What We Hath Wrought , the book I am currently working on. (Yes, I know that's a dangling participle, Mom). And it strikes me I might ask you all this question: Which company do you think will be around, and let me add - around and thriving - one generation from now? I could install a widget and let you vote for a company, but that's the easy way out.

IT 82
article thumbnail

Practical collaboration planning for profit

Collaboration 2.0

Regardless of improvements in collaboration software, the real business challenge is in identifying who takes responsibilities for collaboration, overcoming internal political agendas & driving new working methods

74
article thumbnail

Are you there?

Collaboration 2.0

Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications

86
article thumbnail

Dreamforce a textbook way to get the most from conferences

Collaboration 2.0

Salesforce tour de force in providing digital tools at Dreamforce is a great way to learn how to get the most out of all conferences and events

78
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Riotous times

Collaboration 2.0

Digital tools of choice in a world where our social fabric is rapidly changing can be used to market jeans or orchestrate looting.

article thumbnail

HP: The big data trucks aren't stopping

Collaboration 2.0

Don’t overlook the value of Autonomy and their competitors helping make sense of unstructured data at scale as HP struggle to remain relevant

article thumbnail

Are you there? The paradox of 'real time' communication

Collaboration 2.0

Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications

article thumbnail

An Important DB2 10 for z/OS Stored Procedures Enhancement

Robert's Db2

I've said it before, and I'll say it again: DB2 10 for z/OS is packed with new functionality. Along with the really high-profile features of the latest release of DB2 for the mainframe platform (temporal data support, enhanced CPU efficiency, row and column access control, etc.), you'll find several goodies that will likely be very useful to your organization.

Access 48
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Great DB2 Learning Opportunities in Prague this November

Robert's Db2

Greetings, folks. I know that an unusually long time has passed since I lasted posted an entry to this blog -- my apologies for that. I was out of commission during the second half of July and into early August, dealing with a medical issue. I'm much better now, and things are getting back to normal. I'm still on medical leave (until October 3), but I plan on posting several blog entries between now and then).

IT 48
article thumbnail

France Introduces Data Security Breach Notification Requirement for Electronic Communication Service Providers

Hunton Privacy

On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.

article thumbnail

German State DPA Orders Businesses to Close Facebook Pages

Hunton Privacy

On August 19, 2011, the Data Protection Commissioner’s Office of the German federal state of Schleswig-Holstein (“ULD”) ordered all businesses in that state “to shut down their fan pages on Facebook and remove social plug-ins such as the ‘like’-button from their websites.” Although this warning is specific to Facebook users, the regulator’s explanation of its motives reveals a fundamental concern about common data analytics practices: “By using the Facebook service traffic and content data are

article thumbnail

Belgium Simplifies the Authorization Procedure for Binding Corporate Rules

Hunton Privacy

On July 13, 2011, the Belgian Privacy Commission (the “Belgian DPA”) signed a Protocol with the Ministry of Justice which significantly simplifies the authorization procedure for binding corporate rules (“BCRs”) under Belgian law. The Protocol was just made public on the Belgian DPA’s website. The European Context. BCRs are a legal mechanism used by multinational companies for purposes of complying with EU data protection law, to provide an adequate level of data protection when transfer

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Outsourcers Exempt from India’s Privacy Regulations

Hunton Privacy

On August 24, 2011, the Government of India’s Ministry of Communications & Information Technology issued a clarification regarding India’s new privacy regulations, known as the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (the “Rules”), under Section 43A of the Information Technology Act 2000.

Privacy 40
article thumbnail

Washington, D.C.

JKevinParker

I have begun my new job in Washington, D.C. as a SharePoint Architect. I'm working with the Department of Labor to plan out a SharePoint deployment for ECM, ERM, and Government 2.0 within one of their agencies. It's really exciting stuff! The first day that I walked through the streets of the District, I was struck by the fact that their buildings are all only about 13-14 stories tall.

ECM 40
article thumbnail

Lush Avoids ICO Fine After Website Data Breach

Hunton Privacy

Lush Cosmetics Ltd. (“Lush”) has avoided a monetary penalty for its breach of the UK Data Protection Act 1998. Instead, the UK Information Commissioner’s Office (the “ICO”) has required Lush to sign an undertaking that obliges the company to “ensure that future customer credit card data will be processed in accordance with the Payment Card Industry Data Security Standard.”.

article thumbnail

English Translation of Peru’s Law for Personal Data Protection Released

Hunton Privacy

The Department of Commerce released an English translation of Peru’s Law for Personal Data Protection ( Ley de Protección de Datos Personales, Ley No. 29733 ). The law passed Peru’s Congress on June 7, 2011, and was signed by the president July 2, 2011. Peru’s adoption of this new law is in keeping with a recent trend in Latin America, where Uruguay, Mexico and Colombia also have passed privacy legislation.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

FTC Announces First Privacy Settlement Involving Mobile Applications

Hunton Privacy

On August 15, 2011, the Federal Trade Commission announced a settlement with W3 Innovations, LLC, doing business as Broken Thumbs Apps (“W3”) for violations of the Children’s Online Privacy Protection Act (“COPPA”) and the FTC’s COPPA Rule. This marks the FTC’s first privacy settlement involving mobile applications. The FTC alleged in its complaint ( main document , exhibits ) that W3, which has developed over forty mobile applications for the Apple iPhone and iPod Touch, collected more than 30

Privacy 40
article thumbnail

China Proposes New Rule Including Protections for Personal Information on the Internet

Hunton Privacy

On July 27, 2011, the Ministry of Industry and Information Technology of the People’s Republic of China (the “MIIT”) published a draft rule including provisions regulating the processing of personal information by “Internet Information Service Providers.” The draft rule, entitled “Provisions on the Administration of Internet Information Services” (the “Draft Provisions”), is not the first rule regulating Internet information services in China.

article thumbnail

Sotto Speaks on State and Federal Cyber Risk Law

Hunton Privacy

On June 9, 2011, Lisa J. Sotto , partner and head of Hunton & Williams LLP’s Privacy and Data Security practice, spoke during the regulatory session on state and federal laws at NetDiligence’s Cyber Risk & Privacy Liability Forum in Philadelphia. Sotto discussed recent changes to the legal landscape, emphasizing regulatory authorities’ growing interest in policy and enforcement issues and increased legislative activity on the state and federal levels.

Risk 40