March, 2013

article thumbnail

Who Owns The Right to Filter Your Feed?

John Battelle's Searchblog

The post Who Owns The Right to Filter Your Feed? appeared first on John Battelle's Search Blog. (image) Last week I was in Salt Lake City for the Adobe Summit, on a stage the size of a parking lot. After some opening remarks about how the world is increasingly lit with data, I brought out Adam Bain, President of Global Revenue for Twitter. (He Vined it, natch.

IT 110
article thumbnail

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

111
111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

IT 95
article thumbnail

Apple finally turns HTTPS on for the app store, fixing a lot of vulnerabilities

Elie

Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users.

IT 62
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Access 67

More Trending

article thumbnail

Can We Bridge Data to Humanity? We Best Talk About It.

John Battelle's Searchblog

The post Can We Bridge Data to Humanity? We Best Talk About It. appeared first on John Battelle's Search Blog. The agenda for our seventh annual CM Summit is live. And it rocks. You can read all about it here. I am really looking forward to this conversation, mainly due to the quality of the folks who are coming. Oh, and the theme, of course. I won’t beat around the bush.

IT 105
article thumbnail

Disruptive digital cliques

Collaboration 2.0

We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

88
article thumbnail

Atos says they are winning the war on email, using Bluekiwi

ChiefTech

Back in 2011 lots of people were skeptical about Atos CEO, Thierry Breton, and his war on email. However, the Financial Times reports that Atos are making progress: "Almost two years on, zero email has not only begun to take hold within Atos, but the initiative has attracted interest from a growing number of business leaders.". (Sorry, the link above might get paywalled when you click on it).

IT 75
article thumbnail

German Law Enforcement Access to Cloud Data in Foreign Jurisdictions, Including the U.S.

Hunton Privacy

On March 8, 2013, the German government published a response to a formal inquiry from one of the German Parliament’s parties on the international security, data protection and surveillance implications of cloud computing. The response describes international cooperation between German and foreign law enforcement agencies that have used mutual legal assistance treaties to obtain cloud data in foreign jurisdictions.

Cloud 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Why? Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

article thumbnail

SXSW 2013 Highlights: Kurt Daradics & Stephen Wolfram

Daradiction

Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf extension), which he's proclaiming as the convergence of the past 30 years of his work.

Cloud 64
article thumbnail

How I “Crack” My Inbox

John Battelle's Searchblog

The post How I “Crack” My Inbox appeared first on John Battelle's Search Blog. Over on the LinkedIn Influencer network, I’ve revealed how I manage my often-overflowing inbox. It’s not exactly rocket science, but enough people have found it interesting that I thought I’d share it in a professional context. If you’re interested in stuff like this, give it a read and let me know what you think.

IT 89
article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

87
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Further reading on the Yammer + SharePoint roadmap

ChiefTech

If you are still trying to get your head around the deeper implications of the Yammer & SharePoint roadmap announcement , here is some further reading: Hold tight - its just a bump in the road. Jeremy Thake is one of my favourite SharePoint technologists - he's not afraid to dig into the details of SharePoint, good or bad. He still has questions he would like answered - for example: If you switch off the SharePoint Newsfeed and replace with Yammer, what happens to the actions and activity th

article thumbnail

Appeals Court Holds “Reasonable Suspicion” Required for Forensic Search of Laptop at the Border

Hunton Privacy

On March 8, 2013, a U.S. federal appeals court issued a decision in the case United States v. Cotterman , holding that the federal government must have “reasonable suspicion” of criminal activity to conduct a forensic search of laptops and similar devices in the possession of individuals attempting to cross the border. The case arose after Howard Cotterman attempted to enter the United States by car at a checkpoint on the Mexican border.

article thumbnail

Awesome archivists

Preservica

I was delighted to stumble upon the Archivists Being Awesome (ABA) Blog. Not only does it have one of the most fun mission statements I have seen for some time - “One part bragging platform, one part skill share, two parts making new friends and being inspired by the work of others, the ABA will give area archivists a chance to briefly describe exciting projects they’re involved in.” it also has some great content.

Access 40
article thumbnail

Private Sector CloudStore, anyone?

CGI

Private Sector CloudStore, anyone? ravi.kumarv@cgi.com. Mon, 03/18/2013 - 08:00. In February 2012 the Cabinet Office launched something rather revolutionary: A catalogue of IT services, available on-demand to any public sector buyer, with predictable prices, and from pre-vetted suppliers. This innovation much-simplifies normal public sector procurement process.

Sales 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

I’ve Turned Full Feeds Back On

John Battelle's Searchblog

The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog. I heard you all , and I just made my RSS feed full text and images again. Thanks for all your feedback, and we’ll just have to live with the fraudsters. Till we don’t. Which will probably be never! The post I’ve Turned Full Feeds Back On appeared first on John Battelle's Search Blog.

71
article thumbnail

Disruptive digital cliques

Collaboration 2.0

'We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

74
article thumbnail

Three Social Workflow Patterns

ChiefTech

I'm seeing the phrase 'social workflows' being bounced around with more frequency. In the past, it was a good idea to avoid the word 'workflow' in discussions about enterprise social computing because people immediately jumped to thinking about highly structured and automated workflows that you might find in a system of record or a collaboration platform, like SharePoint or Dominio/Lotus Note.

Sales 60
article thumbnail

Department of Commerce Issues Notice of Inquiry Regarding Incentives to Adopt Improved Cybersecurity Practices

Hunton Privacy

On March 28, 2013, the Department of Commerce’s Notice of Inquiry into “Incentives to Adopt Improved Cybersecurity Practices” was published in the Federal Register (78 Fed. Reg. 18954). This Notice, which includes a series of broad questions for owners of the nation’s critical infrastructure, follows up on earlier Commerce inquiries focused on incentives for noncritical infrastructure.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The latest version of award winning technology now available

Preservica

I am excited to announce the release of the latest version award winning SDB technology, SDB4.3.1 now available. So what’s in the new in this version 4.3.1? Advanced Search Filtering allowing complex queries using metadata and content. Improved user interface for reviewing the audit trail. Generic metadata viewing to allow the use of any metadata schema.

article thumbnail

Google called before European privacy authorities

Privacy and Cybersecurity Law

In October 2012, the Article 29 Working Party highlighted their concerns about Google’s new consolidated privacy policy. This converted a […].

Privacy 40
article thumbnail

HIPAA Final Rule: Today is Effective Date–Covered Entities and Business Associates Have 180 Days to Comply

HIPAA

March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.

article thumbnail

Not much Klout

Collaboration 2.0

'Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn''t helping.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred

ChiefTech

Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.

article thumbnail

Sotto Named Among National Law Journal’s “100 Most Influential Lawyers”

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Lisa J. Sotto , partner and head of the firm’s Global Privacy and Data Security practice , has been named to The National Law Journal’s “ The 100 Most Influential Lawyers in America ” list. Last published in 2006, this is only the eighth time this list of legal luminaries has been compiled since it was first established in 1985 as “Profiles in Power.”.

Privacy 40
article thumbnail

Wellcome Library shows the power of digitization to reveal the influence, insight and inspiration behind critical moments of scientific discovery

Preservica

It has been my pleasure to work with the digital team at Wellcome Library as they put Tessella’s SDB in place to manage and preserve their digital collections, so I was delighted to be able to attend the launch of the Wellcome Library Codebreakers: makers of modern genetics - [link]. This fascinating collection holds the papers of the pioneers of modern genetics, including Francis Crick, James D.