August, 2012

article thumbnail

From “I” Space to “I” and “We” Space

ChiefTech

workspace design historically mirrored the organizational chart, with people jockeying to be as close as possible to the seat of all power – the CEO. But now that information revolution has made information the new seat of power, there is much more flexibility in workspace design. Historically, all sorts of technologies have impacted phyiscal workplace design.

111
111
article thumbnail

Here We Go Again: The Gray Market in Twitter and Facebook

John Battelle's Searchblog

So, casually reading through thi s Fast Company story about sexy femle Twitter bots , I come across this astounding, unsubstantiated claim: My goal was to draw a straight line from a Twitter bot to the real, live person whose face the bot had stolen. In the daily bot wars–the one Twitter fights every day, causing constant fluctuations in follower counts even as brands’ followers remain up to 48% bot –these women are the most visible and yet least acknowledged victims There is w

Marketing 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Targeted social communication comes of age

Collaboration 2.0

With Facebook's first earnings call post IPO the digitally connected business world came of age, with hype to be replaced by alignment with the financial world's demand for demonstrated effectiveness.

article thumbnail

When CICS and DB2 for z/OS Monitors Disagree (Part 2)

Robert's Db2

About a week ago, in part 1 of this two-part blog entry, I described a situation I've encountered several times at mainframe DB2 sites over the past 20 years: CICS users complain of elongated response times for DB2-accessing transactions, and these users' complaints are backed up by CICS monitor data that indicate elevated "wait for DB2" times as being the cause of the performance degradation.

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Philippines President Aquino Signs Data Protection Legislation

Hunton Privacy

On August 15, 2012, Philippines President Benigno S. Aquino III signed the Data Privacy Act of 2012 passed earlier this year by the Philippine Senate and House of Representatives. Concerns about the creation of the National Privacy Commission and the criminal penalties associated with the Act delayed final enactment. The Data Privacy Act of 2012 is a traditional data protection law that establishes privacy as a fundamental human right.

Privacy 49

More Trending

article thumbnail

An Introduction to Work Objects via the DoubleDutch Blog

ChiefTech

1) Human interactions and engagement revolve around Social Objects 2) Social Objects also exist in the workplace (“Work Objects”), such as customers, projects, and products 3) The current dominant collaboration app in the enterprise, Email, does a poor job of organizing content and engagement around work objects. 4) Structure on the input side allows for superior data organization and analytics 5) This disconnect between email and work objects is a problem (for companies), and an opportunity (fo

article thumbnail

The State of Digital Media: Passion, Goat Rodeos, and Unicorn Exits….

John Battelle's Searchblog

Earlier in the week I was interviewed by a sharp producer from an Internet-based media company. That company, a relatively well-known startup in industry circles, will be launching a new site soon, and is making a documentary about the process. Our conversation put a fine point on scores of similar meetings and calls I’ve head with major media company execs, content startup CEOs, and product and business leaders at well known online content destinations.

IT 99
article thumbnail

Bill Kutik on state of HR Tech world

Collaboration 2.0

My annual recorded chat with leading HR analyst Kutik, where we cover the upcoming HR Tech conference, the mood and concerns of the HR executive, the rapid shift of focus to SaaS and associated strategic & tactical shifts.

79
article thumbnail

Great ideas are found in unexpected places

CGI

Great ideas are found in unexpected places. ravi.kumarv@cgi.com. Thu, 08/16/2012 - 08:00. A key part of my role is bringing our clients ideas to life and help answer the question “is there a better way?” Essentially I do this by working with Logica’s great people, our innovation ecosystem or a combination of both. When I say our innovation ecosystem, I mean our phenomenal collection of over 300 partners that ranges from universities who are looking at some whacky research to our global alliance

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Taiwan Proposes Revisions to Personal Data Protection Act

Hunton Privacy

On August 30, 2012, Taiwan’s Executive Yuan announced that the Personal Data Protection Act will become effective on October 1, 2012. In connection with the announcement, the Executive Yuan also proposed several amendments to certain controversial provisions to be discussed by the Legislative Yuan in September. Reportedly, the amendments would include the following changes: adding “medical records” as a type of sensitive personal data, and inserting exceptions to restrictions on the use of sensi

article thumbnail

The National Archives of Latvia chooses Tessella and Tieto to preserve Latvia’s digital heritage

Preservica

I am pleased to announce that we will be working with the National Archives of Latvia who have become the thirteenth organisation to deploy Preservica SDB which is proving to be the long term preservation solution of choice in this demanding sector. read more.

article thumbnail

How to design a spreadsheet for mobile

ChiefTech

Grid is a startup app for the iPad and iPhone designed around how people use these devices and spreadsheets themselves. This is the complete opposite to a solution that makes Excel available on a tablet or smartphone. At this stage the ability to actually perform calculations is a future feature. This isn't as odd as it sounds, since the beauty of the spreadsheet on a PC is that people use them in many different way - I know someone who even uses them for basic wireframing!

IT 58
article thumbnail

A Show Of Hands Please…

John Battelle's Searchblog

…from those of you in the marketing business out there. How many of you would love to promote your product on the home page of Google, in this fashion? It’s arguably the web’s most valuable ad placement, it’s not for sale, and no one knows how much traffic or conversion it drives save Google itself. Just one more sign that the Internet Big Five are girding for a massive fight to be the platform for your life.

Sales 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fax me your signed, sealed document.

Collaboration 2.0

Faxed documents and telephone voice prompts are at the heart of the thorniest bureaucracies, despite plenty of better alternatives.

76
article thumbnail

Sequestration Planning Benefits from Enterprise Architecture-Driven Value Engineering

Interactive Information Management

The next 5 months portend a spectacle of US Congressional battles to be waged ahead of the pending, mandatory “sequester” - automatic, mandatory federal government spending reductions of about $1 Trillion over 9 years, in non-exempt, discretionary appropriations, set to take effect 1/2/2013. Forward-thinking planners in government IT organizations, in large Programs that depend upon IT, and among the Systems Integration (SI) community are likely to dust off Enterprise Architecture skills for ana

article thumbnail

Minnesota Attorney General Announces $2.5 Million Settlement with Accretive Health

Hunton Privacy

On July 31, 2012, Minnesota Attorney General Lori Swanson announced a $2.5 million settlement with Accretive Health, Inc. (“Accretive”) for violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and its implementing regulations, and various Minnesota debt collection and consumer protection laws. As we previously reported in January 2012, Accretive, which acted as a business associate to two Minnesota hospital systems, experienced a breach in July 2011 that involv

article thumbnail

SharePoint 2010 CSS Reference Chart

JKevinParker

Check out the SharePoint 2010 CSS Reference Chart from Heather Solomon. It is a great tool for anyone doing branding and user interface design for SharePoint 2010.

IT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

No free lunches on Twitter

ChiefTech

Twitter’s new rules for third-party developers have spurred an online uproar. After the company imposed stricter rules for its application programming interface, or A.P.I., on Thursday, engineers and developers picked up their virtual pitchforks and took to Twitter and blogs to decry what some described as a “bait and switch.”. Via the NYT's Bits blog.

Risk 56
article thumbnail

The Future Is Cloudy

John Battelle's Searchblog

I’ve spent a lot of time thinking about data recently. It’s not just reading books like The Information or Mirror Worlds (or Super Sad True Love Story , a science fiction novel that is both compelling and scary), it’s my day to day work, both at FM (where we deal with literally 25 billion ad calls and associated data a month), and in reporting the book (I’ve been to MIT, Yale, Amazon, Microsoft, Facebook, Google, and many other places, and the one big theme everyone is ta

Cloud 72
article thumbnail

Over the social hype hump and back to practicality

Collaboration 2.0

Sensible voices are starting to be heard again above the noise as the new social enterprise realities mature.

80
article thumbnail

Seamless integration between source systems and digital archives: can we have it? Do we need it?

Preservica

An interesting article and feedback on our talk at ICA 2012 in Brisbane, Australia from the Netherlands Coalition for Digital Preservation (NCDD), visit [link].

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Far-Reaching Implications of Recent FCRA Enforcement Actions

Hunton Privacy

On August 8, 2012, the Federal Trade Commission settled with HireRight Solutions, Inc. (“HireRight”) for failure to comply with certain Fair Credit Reporting Act (“FCRA”) requirements. At first blush, the case may appear to be a simple FCRA matter – the FTC alleged that HireRight functioned as a consumer reporting agency when providing employment screening services to companies, but then failed to take steps to assure the accuracy of those reports and prevented consumers from dispute inaccurate

Privacy 40
article thumbnail

Word Cloud: Information Architecture Taxonomy

JKevinParker

I created an Information Architecture Taxonomy word cloud at www.wordle.net , built from the Information Architecture Taxonomy available at www.iainstitute.

article thumbnail

Collaboration is simply working with, together

ChiefTech

The word “collaboration” is so heavily over-used and over-hyped it’s becoming meaningless. People refer to all social software within a company as “collaboration,” and this causes confusion. Vendors get away with saying whatever they want because they’re not saying anything at all and companies end up failing in their “collaboration” initiatives. Via ThoughtFarmer's Social Intranet Blog.

article thumbnail

What Is Search Now? Disjoined.

John Battelle's Searchblog

(image shutterstock ) Today I answered a question in email for a reporter who works for Wired UK. He asked smart questions, as I would expect from a Wired writer. (Some day I’ll tell you all my personal story of Wired UK – I lived over there for the better part of a year back in 1997, trying to make that magazine work. I mostly failed – but it’s up and running strong now.

IT 69
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Is the new Regulation back on track?

Privacy and Cybersecurity Law

The Data Protection Regulation is potentially back on track after a major roadblock was resolved. Germany is reported to have agreed […].

40
article thumbnail

When CICS and DB2 for z/OS Monitors Disagree (Part 1)

Robert's Db2

Today I'm writing about a situation that I first encountered almost 20 years ago, and which I most recently saw about three months ago: an organization with a CICS transaction workload accessing a DB2 for z/OS database reports a performance problem. The company's CICS people point to monitor data that indicate higher "wait for DB2" times when CICS transactions run long.

IT 48
article thumbnail

California Court Denies Hulu’s Motion to Dismiss in Video Privacy Protection Act Case

Hunton Privacy

On August 10, 2012, a federal district court in California denied Hulu’s motion to dismiss the remaining claim in a putative class action suit alleging that the online streaming video provider transmitted users’ personal information to third parties in violation of the Video Privacy Protection Act (“VPPA”). The VPPA prohibits a “video tape service provider” from transmitting personally identifiable information of “consumers,” except in certain, limited circumstances.

Privacy 40