Sat.Sep 22, 2012 - Fri.Sep 28, 2012

article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

Another year has passed and Step Two have released their annual intranet award winners. Its always interesting to poke around the list of companies. An Elgg-based solution wins again. Mitre won an award from Step Two in 2010 for its Elgg-based employee network. This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award.

article thumbnail

Cloud naivety and electric car dreams

Collaboration 2.0

Harnessing the power of cloud computing requires that you understand underlying concepts: loose understanding can cause more harm than good.

Cloud 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Linux on System z: a Better Place for Your DB2 for z/OS Client-Server Applications

Robert's Db2

In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. Back around 2003, when I was on the user side of the DB2 community, I was part of a team charged with developing a plan for the simplification and streamlining of my company's IT infrastructure. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running pr

article thumbnail

FTC Settles Spying Case

Hunton Privacy

On September 25, 2012, the Federal Trade Commission announced that it had settled a case involving allegations of spying by software company DesignerWare, LLC (“DesignerWare”) and several rent-to-own companies that rent computers to consumers, such as Aaron’s, Inc., ColorTyme, Inc., and Premier Rental Purchase. The FTC collaborated with Illinois Attorney General Lisa Madigan in its investigation.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mind the gap: Social on the inside, to support social on the outside

ChiefTech

One of the things I often remind clients is that if you want to be social on the outside, you need to be social on the inside too (that's sort of a short definition of "social business" too). I'm lucky to work not just within the isolated internal collaboration domain, but across the spectrum of internal to external and back again. So, interesting to see Hootsuite release a new internal " conversations " feature: They aren't the only vendor that supports features like this of course.

More Trending

article thumbnail

The joys and hazards of multi-process browser security

Scary Beasts Security

Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation methods. Spray techniques Probably the most significant security effect of multi-process models is the effect on spraying. Spraying, of course, is a technique where parts of a processes' heap or address space are filled with data helpful for exploitation.

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

On September 27, 2012, the European Commission presented its new strategy on cloud computing, entitled “ Unleashing the Potential of Cloud Computing in Europe.” The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The newly-released strategy follows the Commission’s consultation on cloud computing and the Article 29 Working Party’s Opinion on cloud computing.

Cloud 40
article thumbnail

Reimagining the digital workplace

ChiefTech

Technology - not just information technology - has played a critical role in creating the modern workplace (for example, see the history of the skyscraper ). There is an interesting dynamic between physical structures, technology and how we organise - without electric lighting , modern factories and offices would be very different places. If the " digital workplace " is more than simply giving people a better intranet or enabling telework (all things progressive companies have been working on si

Privacy 56
article thumbnail

Getting the most from (insert name of platform here)

ChiefTech

If you aren't using SharePoint, just ignore the fact that Sam Marshall's presentation is about SharePoint adoption: Getting the most from share point congressp keynote sam marshall clearbox d from Sam Marshall. This presentation really talks to any platform, although SharePoint may have a particular problem with an imbalance between the level of resource invested into technical deployment verses the 'soft' aspects, like people, process and content.

IT 43
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Enterprise RSS Value Chain (2008)

ChiefTech

Not a new piece, but I noticed a sudden surge of interest in my 2008 article, The Enterprise RSS Value Chain (also published under the title, Enterprise RSS benefits go ignored): Along the way, an important allied Web 2.0 technology has been largely neglected. This technology is Enterprise RSS and if you can understand how to harness it, the possibilities are endless.

IT 43
article thumbnail

UK ICO Publishes Cloud Computing Guidance

Hunton Privacy

On September 27, 2012, the UK Information Commissioner’s Office (“ICO”) published guidance on complying with the requirements of the UK Data Protection Act 1998 (“DPA”) in the context of cloud computing services (the “Guidance”). In its Guidance, the ICO reminds data controllers that transferring personal data to the cloud does not absolve them of their compliance obligations under the DPA.

Cloud 40
article thumbnail

NLRB Judge Invalidates “Chilling” Social Media Policy Despite Savings Clause

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : On September 20, 2012, Administrative Law Judge Clifford H. Anderson struck down telecommunications company EchoStar Corporation’s policy prohibiting employees from making disparaging comments about it on social media sites. The National Labor Relations Board (“NLRB”) judge found that the prohibition, as well as a ban on employees using social media sites with company resources or on company time, chilled employees’ exercise of

IT 40
article thumbnail

Getting down to practical use cases for using social software inside business

ChiefTech

Sorry, a bit of an accidental Salesforce theme at the moment (some big event happened last week or so I heard). Anyway, I missed this when it was first published a few months ago but I'm always looking for interesting examples of enterprise social software being used outside of the typical knowledge worker scenario (e.g white collar service industries or consulting firms).

Sales 46
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Yammer's trump card - the external networks?

ChiefTech

I've been looking for this slide since I saw it presented at a Yammer event earlier in the year. Source: SlideShare. I remember thinking at the time, forget the features of Yammer itself but look at what they are actually building with their external networks. If ever email should be worried, it would be what this diagram shows. (I'm sure that regulators and risk managers are too, but that's another discussion.).

Cloud 52