July, 2009

article thumbnail

New Socialtext Microblogging Appliance Signals Increased Flexibility

Collaboration 2.0

Socialtext are making available an ‘unbundled’ appliance version of their microblogging product ‘Signals‘ at an attractive $US1 per user per month, plus $1,000 per month server subscription. With the rapid increase in business use of Twitter, the hugely successful but internet based free microblogging platform, there has come an attendant focus on security concerns in [.

article thumbnail

Questions On the Yahoo Bing Deal

John Battelle's Searchblog

Unfortunately our schedules didn't match up yesterday, and I did not get a chance to talk to the folks now responsible for the Yahoo Microsoft deal. But as I thought through the deal and its implications, a ton of questions came to mind, and it seems worth the time to write them down. Perhaps folks can answer them in this thread- I know there has been a lot of information flying around, and it's entirely likely that many of these questions have been posed and answered elsewhere.

Sales 49
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mad World

Daradiction

In 1997 I went to Guiena, West Africa for three months to help build some housing for some folks. What I saw there changed me forever. To this day I marvel being able to open a stocked fridge for example (we have it soo good here in America and safe to say most folks have no clue). I’m creating a possibility for a world in which everyone in my lifetime is given the opportunity to learn to read, draw, & have basic needs met.

IT 49
article thumbnail

Washington Court Rules that IP Addresses Are Not Personally Identifiable Information

Hunton Privacy

In a closely-watched case, the U.S. District Court for the Western District of Washington recently held that Internet Protocol (“IP”) addresses do not constitute personally identifiable information (“PII”). The plaintiffs in Johnson v. Microsoft Corp. brought a class action suit against Microsoft claiming that the collection of consumer IP addresses during the Windows XP installation process violated the XP End User License Agreement.

Privacy 42
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

RIM Underpins Society

Positively RIM

Last Thursday at Paddington Station, I had tea with Andrew Griffin, UK Director of the International Records Management Trust ( www.irmt.org ). Andrew had recently returned from Sierra Leone, the West African democracy only two years removed from a devastating civil war. Sierra Leone ranks dead last in the United Nations 2008 Human Development Index.

More Trending

article thumbnail

Facebook - Snatching Defeat From the Jaws of Victory?

Collaboration 2.0

What on earth are Facebook doing? Imagine going into a stationary store and buying a Filofax personal organizer and then over time filling it with personal contacts info, photos and notes. You come home one night and it’s no longer on the coffee table by the phone, instead there’s a note from Filofax saying there’s a change [.

IT 50
article thumbnail

Is Being In the Mobile Biz License to Ignore the Internet?

John Battelle's Searchblog

and by the Internet, I mean the *values* of the Internet, in particular, the values of a platform. When you build a platform that leverages the Internet, it strikes me you should act like a player in that space - IE, not acting like a monopolist, a bully, or in your own self interest at the expense of those who use your platform - like your customers and developers.

IT 49
article thumbnail

Story Crawler

Daradiction

My pal Denny Dansereau gave me beta access to his new “Story Crawler&# web app and I’m stoked, and for a few reasons. Selfishly, the tool rocks, it takes the friction out of finding the melody in a sea of stories, it’s a research/collaborators dream. Think Google Alerts on steroids with ability to push out and publish or syndicate.

article thumbnail

FTC Extends Red Flags Compliance Deadline to November 1

Hunton Privacy

On July 29, 2009, the Federal Trade Commission ("FTC") announced another three-month delay in the enforcement of the provision of Identity Theft Red Flags and Address Discrepancies Rule (the "Rule") that requires creditors and financial institutions to implement an Identity Theft Prevention Program. The FTC noted that small businesses and entities with a low risk of identity theft remain uncertain about their obligations under the Rule and pledged to "redouble" its effort

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Daily Value

Positively RIM

For those of us trying to whip a Records & Information Management program into shape every day, we may view records as objects, challenges, obstacles, risks, clutter, detriti or worse. It’s hard to stay objective about records’ real importance and value. But sooner or later, reality or exigency enters our lives, and we re-connect with the real value of the “stuff” we manage daily.

article thumbnail

Beware the little pieces you use in your web app

Scary Beasts Security

I've just released the technical details behind some recently fixed vulnerabilities in mimetex: [link] "mimetex" is a little binary (written in the C language) used to render mathematical equations based on the TeX language. It looks very nice and is a cool concept to embed it in web apps. You can use a Google search to locate places that use it: [link] Unfortunately, the binary suffered from various classic stack-based buffer overflows as well as some commands that might leak inappropriate info

IT 20
article thumbnail

Out-Innovated by Management Practice Blowback - a Video Conversation with John Hagel

Collaboration 2.0

I had the opportunity to sit down for a discussion with John Hagel of Deloitte’s Center for the Edge last week. My previous post about the ‘Shift Index 2009′ report is augmented by this video, and fellow ZDNet blogger Dennis Howlett attended the ‘‘Eastern Philosophy: Management Lessons From Emerging Markets’ Brainstorm Tech panel John and I [.

article thumbnail

The Year's Half Over. So How Are My Predictions Tracking?

John Battelle's Searchblog

I like to do this exercise from time to time - asking how my predictions for the year are holding up given six months have passed since I posted them. Well, let's see, shall we? 1. We'll see an end to the recession, taken literally, by Q4 09. I think most folks agree this will happen. I'm not saying it has, just that the consensus is we're on the way there. 2.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Fast Eddy

Daradiction

Today is Fast Eddy’s 89th birthday. He passed away in 2007. He was my Grandpa, and it finally hit me today how much I miss him. He was a paratrooper in WWII (505th Parachute Infantry Regiment, 82nd Airborne Division) and jumped 9 times, including Battle of Bulge & North Africa. One thing that always made us laugh is how he’d describe himself as “tougher than cat shit and twice as nasty.&# Here’s some info about Fast Eddy from the Veterans History Project.

IT 49
article thumbnail

APEC Forum Discusses International Privacy Legislation Developments

Hunton Privacy

On July 28, 2009, the Data Privacy Subgroup meeting at the Asia-Pacific Economic Cooperation (APEC) Forum in Singapore reported a number of privacy-related legislative developments on the horizon. Among the highlights: On July 15, the Malaysian Cabinet approved privacy legislation to be enacted by the Parliament in early 2010 . Vietnam is set to enact consumer protection legislation including privacy provisions in 2010 .

Privacy 40
article thumbnail

TED Talks by Clay Shirky: How social media can make history

Daradiction

While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics. Tags: Cultural Anthropology Technology.

49
article thumbnail

Neon Indian – Deadbeat Summer

Daradiction

A new band out of Brooklyn. They’re Neon Indian, and as of right now there identity is a mystery. This tune is called “Deadbeat Summer&#. Click here to view the embedded video. Tags: Culture.

49
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Thinking About New Models for Search

John Battelle's Searchblog

Yesterday I spent an illuminating hour with the folks behind Wowd , a still-private-beta search upstart that is taking a new approach to, well, just about everything in search as we traditionally understand it. In a odd coincidence, this morning Venturebeat published a thoughtful piece on how search might shift when more data, in particular social data, is added to the mix.

Paper 45
article thumbnail

Twistory 101: It's All About Small Business

John Battelle's Searchblog

The world's abuzz this week with word that Twitter is getting serious about business - the proof point being Twitter's new subdomain " business.twitter.com " and the "Twitter 101" handbook currently living there, a white paper of sorts aimed at helping companies figure out how to leverage the sometimes befuddling service. This all reminds me of Fall 2004.

IT 45
article thumbnail

OMG! It's A New Yahoo Homepage

John Battelle's Searchblog

Yahoo has redesigned its homepage , on the same day it announced improved profits (thanks in large part to the painful cost cutting of the past few quarters). Quite directly, Yahoo says "This new launch represents the most significant change to our homepage since the company’s inception.". That's quite a statement. I've spent some time on the page, and I'm not sure it lives up to that billing.

IT 45
article thumbnail

Twitter Grows Again

John Battelle's Searchblog

The growth is back, impressive but slower than before, but it's probably quite a relief over at Twitter HQ to see no continuation of the trend from last month.

IT 45
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Twitter Security Crunch

Collaboration 2.0

There’s an awful symmetry about the strategic plans of the Twitter team being published on TechCrunch today: using password discovery techniques ‘Hacker Croll’ was able to access Google and other accounts. I literally just saw on Twitter as I write this the ‘ethical line’ TechCrunch have invented for themselves questioned by Twitter founder @ev: @TechCrunch @arrington “we [.

article thumbnail

Global Collaboration Competitive Success: Old Dogs, New Tricks & The Shift Index

Collaboration 2.0

The above CNBC video of John Hagel (Deloitte Center for the Edge) discusses the huge problem of applying old business thinking when adopting new technology, and the scary new realities around global business competitiveness. ‘Measuring the forces of long term change - the 2009 shift index‘, an important new report, addresses a major gap between the [.

41
article thumbnail

Enterprise 2.0 ROI Metrics: One Size Doesn't Fit All

Collaboration 2.0

‘The ROI of Online Customer Service communities‘ by Forrester customer experience and relationship management analyst Natalie Petouhoff is a $US 1,999 ‘Total Economic Impact™ Analysis’ (TEI) report. Mike Krigsman over at his ‘IT failures’ blog here on ZD Net seems impressed by the report’s findings, so I took a quick look at what is publicly available [.

article thumbnail

The FCC No Likey What Apple Did to Google, Either

John Battelle's Searchblog

And they are opening an investigation into it. According to a Dow Jones Newswire report, on Friday afternoon the FCC sent letters to Apple, AT&T, and Google. The federal inquiry asks Apple why the Google Voice application was rejected from its App Store for the iPhone and iPod Touch, and why it removed third-party applications built on the Google app that had been previously approved.

IT 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

SAP's Schwarz & Sikka: The Road to More Agile Business Performance

Collaboration 2.0

Last week I had the opportunity to spend time with SAP CTO Vishal Sikka and separately SAP executive board member John Schwarz, and I’ve been ruminating on our conversations a lot since those meetings. Fortunately I was part of a group of bloggers who have been following SAP closely, and their questions and insight were [.

40
article thumbnail

Yahoo and Microsoft Announce Deal

John Battelle's Searchblog

NYT has a good story : The terms of the 10-year agreement call for Microsoft to license some of Yahoo’s search technologies, and Yahoo will initially receive a lucrative 88 percent of search-generated ad revenue from Yahoo sites. Cnet does as well. Many folks are noting Yahoo's shares slide at the open this morning. No " Boatload " of cash upfront. More as morning coffee kicks in.

article thumbnail

New Twitter Homepage

John Battelle's Searchblog

What I find most interesting in Twitter's homepage overhaul is the focus on search. I mean, it's all about search. That might confuse some folks who don't understand what Twitter really is. And there's no explanation of that on the home page.So.what do you all think?

IT 40