Sat.Jan 19, 2013 - Fri.Jan 25, 2013

article thumbnail

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

The post Portrait of Twitter As A Young Media Company appeared first on John Battelle's Search Blog. Last year I predicted that Twitter would become a media company. However, I focused mainly on the new “ Discover ” functionality, and I probably should have gone a lot further. In this piece, I intend to. So I’ll start with this: 2013 will be the year Twitter starts to create, curate, and co-create media experiences on top of its platform.

IT 111
article thumbnail

Lance Armstrong & digital power brokering challenges

Collaboration 2.0

'Negative viral infection of social networks is an increasing issue: digital cliques can calcify into silos inside companies, and sophisticated communicators can be a force for good or bad.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS Data Sharing: the Lock List Portion of the Lock Structure

Robert's Db2

With DB2's data sharing capability having been introduced back in the mid-1990s with DB2 for z/OS Version 4, a great many people -- including lots of folks whose organizations do not run DB2 in data sharing mode -- are quite familiar with the technology (for people new to this subject area, I posted, a few years ago, a "What is DB2 Data Sharing?" entry to the blog that I maintained while working as an independent DB2 consultant).

article thumbnail

Copyright confusion: The SMH, a duck and the Sydney Opera House

ChiefTech

I'm no lawyer so this is where I get confused about who is right and wrong around intellectual property, particularly with photos. The Sydney Morning Herald runs a series of articles about photographers intellectual property rights being infringed. Then they inappropriately use a picture that they discovered through Twitter, but didn't actually check the ownership.

IT 46
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet. If a text tweet = 140 characters, then a video tweet = 6 seconds. More details over at TNW , but this announcement is quite consistent with my post earlier this week: Portrait of Twitter As A Young Media Company.

More Trending

article thumbnail

New HIPAA Omnibus Rule: A Compliance Guide

Hunton Privacy

The wait is over. On January 17, 2013, the Department of Health and Human Services’ (“HHS’”) Office for Civil Rights (“OCR”) released its long-anticipated megarule (“Omnibus Rule”) amending the HIPAA Privacy, Security, Breach Notification and Enforcement Rules. These amendments implement and expand on the requirements of the Health Information Technology for Economic and Clinical Health (“HITECH”) Act and the Genetic Information Nondiscrimination Act of 2008.

article thumbnail

Using networked lamps for ambient awareness

ChiefTech

There seems to be a lot of buzz around light-based Internet of Things projects, such as Light by Moore's Cloud. Slightly less ambitious than Moore's Cloud is the Good Night Lamp: I'm actually attracted more to this concept because it supports the idea of ambient awareness communicated through objects in the physical space than as a portal to other Internet of Things applications (which is my perception of Moore's Cloud).

Cloud 46
article thumbnail

The Real Value of Bring Your Own

CGI

The Real Value of Bring Your Own. ravi.kumarv@cgi.com. Thu, 01/24/2013 - 07:00. Unsure about adopting “Bring Your Own”? You’re in good company! CIOs should use methods which reliably estimate benefits and costs, so they can make defensible judgements about value …. With CIOs thinking hard about the merits and pitfalls of allowing staff to connect their own devices to the corporate environment, the time seems right to help by providing a summary of our evaluation tools for “Bring Your Own Device

article thumbnail

Lance Armstrong & digital power broking challenges

Collaboration 2.0

Negative viral infection of social networks is an increasing issue: digital cliques can calcify into silos inside companies, and sophisticated communicators can be a force for good or bad.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK ICO Fines Sony GBP 250,000

Hunton Privacy

On January 24, 2013, the UK Information Commissioner’s Office (“ICO”) served Sony Computer Entertainment Europe Limited (“Sony”) with a monetary penalty of £250,000 resulting from a serious breach of the Data Protection Act 1998. An April 2011 security incident involving the Sony PlayStation Network Platform affected the personal data of millions of customers, including names, addresses, email addresses, dates of birth, account passwords and credit card details.

article thumbnail

Connecting: A short film on Interaction Design & User Experience

ChiefTech

A short 18 minute film that explores trends in UI, Interaction, & Experience Design. Source: connectingthefilm.com.

54
article thumbnail

Sotto Discusses Top Privacy Trends for 2013

Hunton Privacy

In an interview with Tom Field of BankInfoSecurity , Lisa J. Sotto , partner and head of the Global Privacy and Data Security practice at Hunton & Williams LLP, discussed the top privacy trends and threats for 2013. Lisa predicts that security vulnerabilities will remain the biggest threat to privacy, particularly with the move toward mobile computing.

Privacy 40
article thumbnail

Enterprise wikis can contribute to the bottom line - productivity up, costs down

ChiefTech

I've mentioned Industrial Mold & Machine before, as they are a great example of a company making use of enterprise social software (in this case, Socialtext ) outside the typical office worker scenario. They have recently reported a great bottom line result by providing shop floor access to an enterprise wiki using tablet computers (iPads): "In just one year we were able to increase production by 20 percent and we cut our labor costs by 40 percent.

Access 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Reflecting on Government 2.0 in Australia

ChiefTech

I apologise for the limited coverage of Government 2.0 in recent times. Its not from lack of interest by any means. At the federal level in Australia I've had the opportunity to work with a large agency over the last few years where it has been interesting to see from the inside the influence of the Government 2.0 movement (if we can call it that). It is definitely having an impact on how they approach technology and social media, although the end results might not be immediately obvious.

article thumbnail

Key Changes in Australian Privacy Law

Hunton Privacy

Reporting from Australia, former Australian Privacy Commissioner Malcolm Crompton, Managing Director of Information Integrity Solutions Pty Ltd (“IIS”), writes: The Australian Privacy Amendment (Enhancing Privacy Protection) Act 2012 (the “Act”) will make significant changes to the Privacy Act 1988. It’s early days for the changes and the impact for organizations will depend on their circumstances.

Privacy 40
article thumbnail

PwC Jive Software case study

ChiefTech

A detailed backgrounder on PwC's global deployment of Jive , called Spark, reports: 80% of the frequent users think that Spark increases both their efficiency and effectiveness. Some systems with a similar scope used on a national level have already been partly or fully replaced by Spark, directly saving cost. …a new employee who explicitly stated that Spark was among the key reasons for him to decide for PwC and against offers from the competition.

IT 49
article thumbnail

FFIEC Issues Draft Guidance on Social Media

Hunton Privacy

On January 23, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released proposed guidance, Social Media: Consumer Compliance Risk Management Guidance (the “Guidance”) to address how federal consumer protection laws may apply to the social media activities of financial institutions that are supervised by the Consumer Financial Protection Bureau.

Risk 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.