July, 2008

article thumbnail

Building the UX Dreamteam - Part 2

ChiefTech

As we discussed in “part one&# :[link] the skills in research, information architecture, interaction design, graphic design and writing define the recognized areas of User Experience design. However, there still remains much to discuss about what makes a UX team dreamy. Each UX Dreamteam has a finely tuned mix of skills and qualities, as varied as the environments in which they operate.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Martin De Saulles " SMEs and the Web - Executive Summary

Information Matters

Martin De Saulles thoughts on the changing information landscape. Home. About. Contact. Categories. Companies. Information Users. Innovation. Market News. Search. Uncategorized. Archives. July 2008. June 2008. April 2008. March 2008. February 2008. January 2008. November 2007. October 2007. September 2007. August 2007. July 2007. June 2007. May 2007.

article thumbnail

Buffer overflow in libxslt

Scary Beasts Security

libxslt is an interesting attack surface; there are various places in which it is used to process untrusted stylesheets. This includes some browsers, although namespace issues seem to prevent the affected code from being reached in a browser context. Within libxslt itself, there are some built-in functions. These are usually a fruitful place to look for vulnerabilities, particularly those that take integers etc.

IT 20
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Calling in the Big Guns

ChiefTech

Discount for Boxes and Arrows readers: Get a 10% discount by purchasing the book “directly from Rosenfeld Media&# :[link] Just use the code WFDBA. The scene is all too familiar. You’re presenting wireframes of the registration process for a new web application when the discussion veers down a dark alley. The sky has turned the color of black ink, and you can smell sulfur in the air as one team member after another debates the alignment of form labels.

Mining 52

More Trending

article thumbnail

IIM event in Sydney: Managing Information in 2008 and Beyond - A Practical Perspective (13th August)

ChiefTech

Just doing my bit to help promote this IIM event during August: " The presentation examines the risks inherent in managing information in today's technology-enabled business world, and provides some guidance on how to deal with these risks. By generating increasing numbers of transactions and volumes of information (data, documents, web content and records), information technologies have stimulated the generation of even more information and at a faster rate.

Risk 40
article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

article thumbnail

Trusting the Cloud

ChiefTech

Nothing like a list in a blog post to start a discussion. in this case Stacey Higginbotham at GigaOM gives us 10 Reasons Enterprises Aren’t Ready to Trust the Cloud - she writes in her introduction: " I have no doubt that this is The Next Big Thing in computing, but sometimes I get a little tired of the noise. So let’s turn down the noise level and add a dose of reality.

Cloud 40
article thumbnail

Beware the gaps in SharePoint

ChiefTech

Alex Manchester interviewed me the other day for a Melcrum Internal Comms Hub article discussing SharePoint responding to a new report from Forrester. His article also contains a link to a SharePoint case study at BSI Group. I particularly like this quote: " Dellow's comments are supported by the Forrester research, which suggests you 'decide what role SharePoint will play to prevent unplanned demands. and user-generated chaos.

40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is the read/write web a friend or foe to information management?

ChiefTech

I haven't written anything other than blog posts for a quite a while, but this month I have a new article in the July/August edition of Image & Data Manager ( IDM ) magazine, titled So is the read/write web a friend or foe to information management? In this article I try to bring a bit of balance to concerns about Web 2.0 and issues around information security, privacy and records management.

article thumbnail

Information Management Strategy Reality Check

ChiefTech

On Tuesday I attended EMC Inform 2008 , my first event as a representative of IPP Consulting. I had been warned that the agenda was a little light on the business end of enterprise content management, however with the opportunity to hear a key note from EMC 's social software evangelist, Chuck Hollis , I thought it worth the effort. I ended up attending just two of the business stream sessions.

article thumbnail

Open for Business

ChiefTech

Its only been a few days and I'm still finding my feet at IPP Consulting , but I'm determined to hit the ground the running. That's right, I'm open for business and if you would like to learn more about how IPP might be able help your organisation with independent IT advice, please get in touch with either Brian Bailey or myself. In fact, one of the conversations on my first day was about our elevator pitch to describe the kind of business technology consulting services we are providing along si

article thumbnail

Dreaming of a new inbox

ChiefTech

One of the liberating aspects of changing jobs is the idea of starting a fresh with a new email inbox. However, following Luis' lead I've been thinking if I might be able to minimise use of my new work inbox from the very start. I'm quite serious about this, as looking the stats for my work email over the last three years I'm seeing some scary numbers: In 2006 I sent and received 10 emails per day on average, in 2007 it was 18 emails per day on average but in 2008 its now 30 per day on average.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 40
article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

article thumbnail

@Chieftech going 2 IPP. ttfn

ChiefTech

Since the cat was let out of the bag on Twitter last night, I thought I would write a brief post to let people know that this coming Friday will be my last day at CSC - I'm moving into a technology consulting role at a specialist consulting firm, called IPP Consulting. I'll be working along side Brian Bailey based out of their Sydney office. Brian and I have previously worked together at Ernst & Young.

Risk 40
article thumbnail

From EDP to CEO: Lessons from Ralph Norris, CEO at Commbank

ChiefTech

Tonight I attended an UNSW Australian School of Business alumni event ( I'm an MBT'er ), Meet the CEO , with Ralph Norris from Commbank. I wouldn't normally blog about this kind of thing, but I was pleasantly surprised to hear about Ralph 's background in information technology (Electronic data processing at Auckland Savings Bank in 1969, to be precise), which eventually saw him move into the role of CEO.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

article thumbnail

LinkedIn in Plain English

Information Matters

Looks like the marketing folks over at LinkedIn had the good wisdom to hire Lee and Sachi LeFever to make a LinkedIn video. Enjoy! I particularly like the emphasis on the idea that using LinkedIn isn’t just about building connections, but about actually getting business done. As LinkedIn expands functionality, expect to see more reinforcement of that concept.

article thumbnail

LinkedIn in Plain English

Information Matters

Looks like the marketing folks over at LinkedIn had the good wisdom to hire Lee and Sachi LeFever to make a LinkedIn video. Enjoy! I particularly like the emphasis on the idea that using LinkedIn isn’t just about building connections, but about actually getting business done. As LinkedIn expands functionality, expect to see more reinforcement of that concept.

article thumbnail

On FTP, SSL and broken interfaces

Scary Beasts Security

Oh what a fun day I just had piecing together a few SSL changes for vsftpd! Let's start with a brief background on SSL. SSL provides not just secrecy but also integrity - an attacker cannot change your data stream in flight. This includes obviously changing data in the stream, and less obviously, truncating the stream. The interesting attack to truncate the stream is to fake a TCP packet with FIN set.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Lame OpenOffice PCX crash

Scary Beasts Security

Sorry for the lame vuln. It's something I was playing with over a year ago and I just happened to notice it got fixed. I forget what the original deal was. I'm only posting because this blog serves as an RSS feed for the scary.beasts.org main vuln list. [link] A more interesting OpenOffice observation is in the works.

IT 20
article thumbnail

Fancy an exploitation challenge?

Scary Beasts Security

So you think you're 1337? Check out these just released details of a buffer overflow in bzip2: [link] It looks pretty harmless, and it probably is. but I'd love for it not to be. if you think you have what it takes.

IT 20
article thumbnail

iPhone Safari update fixes old libxslt version

Scary Beasts Security

This story is both interesting and boring at the same time. Boring because I didn't find anything new -- I just noted the applicability of something old to Apple's Safari. I've made sure to credit the finder of the old bug that applies to Safari; unfortunately not everyone in the security industry credits the original finder of the bug when noting it applies to a new context.

article thumbnail

AIIM Market IQ Research | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.