October, 2013

article thumbnail

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

'The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual. We met with the comms team for Google X, tested Google Glass, and took a spin in a self-driving car. And while those projects are fascinating and worthy of their own posts (or even chapters in the book), the most interesting meeting we had was with Johanna Wright, VP on the Android team

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler'

IT 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High-end macbook pro retina (late 2013, 15in) benchmark

Elie

I was lucky enough to get the new 2013 high-end Macbook Pro Retina (15in) yesterday and started wondering about how it compares to the mid-2012 Retina (15in) model. On a personal level, I'm also pretty interested in how its gaming performance compares with its predecessor's.

IT 48
article thumbnail

DB2 for z/OS: Something You Might Not Know About Character String Literal Values

Robert's Db2

Here's something I imagine a lot of you (or programs written by you) do all the time: issue DB2 for z/OS-accessing SQL statements that contain character string literal values. Below is a query that I issued from Data Studio earlier today, targeting a table that I'd created on one of our test DB2 subsystems: SELECT PRODUCT_ID, UNIT_SALES FROM PRODUCT_SALES WHERE PRODUCT_ID = 'A12345'; Now, a question for you: is that character string literal value, 'A12345', fixed-length or varying-length?

IT 48
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. What do you need to know, where to start? (Reprinted from KME Internet Marketing - Northern Virginia and Loudoun Datacenter CoLocation Retail Providers – please send your updated contact information to us if we don’t already have it, for more i

IT 45

More Trending

article thumbnail

What Do Drones Mean for Humanity?

John Battelle's Searchblog

'The post What Do Drones Mean for Humanity? appeared first on John Battelle's Search Blog. ( Image ) One of the “artifacts” that Sara and I are paying close attention to as we work on the book is “the drone.” Drones ply the liminal space between the physical and the digital – pilots fly them, but aren’t in them.

IT 109
article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge - but perseverance is well worth it to make work lives simpler'

IT 78
article thumbnail

China Passes Amendment to Consumer Protection Law

Hunton Privacy

On October 25, 2013, the Standing Committee of the National People’s Congress of the People’s Republic of China passed an amendment to the P.R.C. Law on the Protection of Consumer Rights and Interests (the “Amendment”). The Amendment, which was adopted after three readings and will take effect on March 15, 2014, adds provisions designed to respond to the recent boom in online shopping and focuses on improving protections in the area of consumer rights and interests by: increasing penalties for v

Privacy 40
article thumbnail

The Reality of HIPAA Violations and Enforcement

HIPAA

Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law.

CMS 44
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DB2 for z/OS: How Big is Big?

Robert's Db2

For several decades I've enjoyed reading the comic strip, B.C. , about a bunch of cavemen. In one strip published long ago (I may be assigning quotes to the wrong characters, but you'll get the point), B.C. asks one of his compadres, "Thor, how far can you see?" Thor responds, "Well, I can see that cave over there, and it's about a mile away, so I guess I can see about a mile.

article thumbnail

Information Architecture – “the battery in the toy”

CGI

Information Architecture – “the battery in the toy”. ravi.kumarv@cgi.com. Tue, 10/29/2013 - 09:00. You know the scene. Xmas morning, a child’s delight as the shiny new toy emerges from the wrapping paper, the disappointment as the realisation dawns that it doesn’t work, followed by the recriminations as the parents argue about who was supposed to buy the batteries; whilst in the background the toys really are thrown out of the pram!

article thumbnail

Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook?

John Battelle's Searchblog

'The post Twitter’s S1: How Do the Numbers Stack Up To Google and Facebook? appeared first on John Battelle's Search Blog. Twitter’s S-1 filing is now public, you can read it here. There’s no dearth of coverage, just Google News it. I’m interested in a few metrics compared to its most likely comparables, namely Google and Facebook.

Marketing 109
article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC Settles Spying Case Against Rent-to-Own Retailer

Hunton Privacy

On October 22, 2013, the Federal Trade Commission announced a proposed settlement with Aaron’s, Inc. (“Aaron’s”) stemming from allegations that it knowingly assisted its franchisees in spying on consumers. Specifically, the FTC alleged that Aaron’s facilitated its franchisees’ installation and use of software on computers rented to consumers that surreptitiously tracked consumers’ locations, took photographs of consumers in their homes, and recorded consumers’ keystrokes in order to capture logi

Retail 40
article thumbnail

Gmail, Google Apps for Business HIPAA Business Associate Agreements

HIPAA

The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.” Complete compliance with HIPAA guidelines requires implementation of basic a

article thumbnail

Poll: What’s On the Google Barge?

John Battelle's Searchblog

'The post Poll: What’s On the Google Barge? appeared first on John Battelle's Search Blog. ( image USA Today ) I’m fascinated by this “Google Barge” story. It reminds me of the Google container stories of years past, which first sparked all manner of speculation, but turned out to be pretty mundane – a portable, water cooled data center, as I recall.

IT 99
article thumbnail

A World Lit, Literally, By Data

John Battelle's Searchblog

'The post A World Lit, Literally, By Data appeared first on John Battelle's Search Blog. As you work on a book, even one as slow to develop as if/then , certain catch phrases develop. People ask you what the book is about, or the shape of its core argument, and some of the descriptions start to stand out and hit home. One of those is “a world lit by data,” an idea I’ve been toying with for some time now.

Retail 92
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

else 10.28: “Merging with the technology”

John Battelle's Searchblog

'The post else 10.28: “Merging with the technology” appeared first on John Battelle's Search Blog. This week in our news round up: artists play with the possibilities of the 3-D printing medium, the lines between the digital world and the physical world of drones and dating blur, and Silicon Valley is getting more overtly political.

Retail 86
article thumbnail

else 10.7: A Dread Pirate Gives Up His Bitcoins

John Battelle's Searchblog

'The post else 10.7: A Dread Pirate Gives Up His Bitcoins appeared first on John Battelle's Search Blog. Anonymity on the web becomes increasingly fractious as Tor and Bitcoin come into question with recent headline-grabbing stories. A quick scan of this weekend’s NYTimes reveals three big articles on the novel ways our digital histories stay with us.

article thumbnail

else 10.21: Are Drones Over Burning Man “Evil”?

John Battelle's Searchblog

'The post else 10.21: Are Drones Over Burning Man “Evil”? appeared first on John Battelle's Search Blog. This week we pondered how Google defines norms, how we understand ourselves through technology, and how our present technical reality moves faster than speculative fiction. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 85
article thumbnail

else 10.14: “Drones don’t feel” – But the people who see them do.

John Battelle's Searchblog

'The post else 10.14: “Drones don’t feel” – But the people who see them do. appeared first on John Battelle's Search Blog. Between OpenCo, the Quantified Self conference, and our visit to Google , it was a busy week for the book. From around the web: drones get the critical treatment, sensors develop new capabilities, the internet of things gets more connected, and our twitter streams start speaking for themselves.

IT 73
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Be Assured

CGI

Be Assured. ravi.kumarv@cgi.com. Fri, 10/25/2013 - 08:00. I’ll let you into a little secret: I don’t know everything about IT. And here’s another one: In most of the areas where I do know something, I’m still far from expert. The same goes for you I’m afraid. And indeed, for everyone else. So no wonder that IT assurance is becoming increasingly popular.

article thumbnail

NIST Issues Preliminary Cybersecurity Framework

Hunton Privacy

On October 22, 2013, the National Institute of Standards and Technology (“NIST”) issued the Preliminary Cybersecurity Framework (the “Preliminary Framework”), as required under Section 7 of the Obama Administration’s February 2013 executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”). The Preliminary Framework includes standards, procedures and processes for reducing cyber risks to critical infrastructure.

article thumbnail

European Parliament Approves Compromise Text on Regulation

Hunton Privacy

On October 21, 2013, the European Parliament approved its Compromise Text of the proposed EU General Data Protection Regulation (the “Proposed Regulation”). The approval follows months of negotiations between the various parliamentary committees. The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE”) has been in charge of working toward an agreement on the Compromise Text in the European Parliament.

article thumbnail

Simplifying and streamlining digital workflows

Collaboration 2.0

'Differentiating effective Digital Enterprise workflows from the sea of casual solo social digital grazing continues to be a challenge — but perseverance is well worth it to make work lives simpler. Enterprise 2.

IT 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Indian Privacy Law in the Works

Hunton Privacy

On October 19, 2013, the Center for Internet and Society (“CIS”), the Federation of Indian Chambers of Commerce and Industry , and the Data Security Council of India held a Privacy Roundtable in New Delhi , the last in a series of roundtables that began in April 2013. The events were designed to elicit comments on a draft Privacy Protection Bill , proposed legislation for a privacy and personal data protection regime in India.

Privacy 40
article thumbnail

California Governor Vetoes Electronic Communications Privacy Bill

Hunton Privacy

On October 12, 2013, California Governor Jerry Brown vetoed an electronic communications privacy bill. The bill, SB 467 , would have compelled law enforcement to obtain a search warrant before seeking to access any email or other electronic communication maintained by service providers. The bill went beyond the scope of the federal Electronic Communications Privacy Act, which obligates law enforcement to obtain search warrants only for electronic communications that are unopened or stored by ser

article thumbnail

Insurance Policy’s Statutory Rights Exclusion Does Not Apply to Data Breach Claims

Hunton Privacy

On October 7, 2013, the United States District Court for the Central District of California held that a general liability insurance policy covered data breach claims alleging violations of California patients’ right to medical privacy. Hartford Casualty Insurance Co. v. Corcino & Associates , CV 13-03728-GAF (C.D. Cal. Oct. 7, 2013). The court rejected the insurer’s argument that coverage was negated by an exclusion for liabilities resulting from a violation of rights created by state or fed