Sat.Feb 16, 2013 - Fri.Feb 22, 2013

article thumbnail

That Guilty Pile of Outdated Technology

John Battelle's Searchblog

The post That Guilty Pile of Outdated Technology appeared first on John Battelle's Search Blog. ( image Wired ) Way back in the day when I was making magazines, I was buried in print. I subscribed to at least twenty periodicals, easily twice that many came my way without my asking. It made for a huge pile of printed material on the end of my desk (stuff I really should read), and it creeped into the horizontal spaces behind me (stuff I think I should read, in case I get the time), or on my

Sales 107
article thumbnail

Reaction overload.

Collaboration 2.0

'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'

78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Google's fixation on the office a weakness?

ChiefTech

It shouldn't really come as any surprise that Google doesn't actively encourage working from home (aka 'telecommuting' or the 'digital workplace'): Google believes working at home, or "teleworking", is not the best environment for ideas to flourish, according to its chief financial officer Patrick Pichette…. …'How many people telecommute at Google?' ” Mr Pichette said at a talk in Sydney on Monday.

IT 49
article thumbnail

Hunton Webinar Examines Obama Cybersecurity Executive Order

Hunton Privacy

On February 20, 2013, Hunton & Williams LLP hosted a webinar on cybersecurity risks and the Obama Administration’s recently-issued Executive Order on cybersecurity issues related to critical infrastructure. The webinar, entitled “ The Cybersecurity Executive Order: Understanding Its Impact on Your Business ,” covered issues such as the current threat landscape, U.S. and EU regulatory initiatives related to cybersecurity, and guidelines to help businesses prevent and manage cyber events.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

An Apology To My RSS Readers – But I Had To Do It.

John Battelle's Searchblog

The post An Apology To My RSS Readers – But I Had To Do It. appeared first on John Battelle's Search Blog. If you’re a fan of this site, you’re also probably a fan of RSS. (For the full story please click over to my site. Fraudsters have been ripping off my full text feed, so I had to do this. So sorry).

IT 106

More Trending

article thumbnail

Goodbye, Posterous (forever)

ChiefTech

Before hosting this site on Scriptogr.am , my last blog was hosted on Posterous. Unfortunately, Twitter are pulling the plug as of the 30th April: Posterous launched in 2008. Our mission was to make it easier to share photos and connect with your social networks. Since joining Twitter almost one year ago, we’ve been able to continue that journey, building features to help you discover and share what’s happening in the world – on an even larger scale.

article thumbnail

Consciously Consider Early Adoption

CGI

Consciously Consider Early Adoption. ravi.kumarv@cgi.com. Wed, 02/20/2013 - 07:00. At Logica, now part of CGI, my job is to advise CIOs on how they can realise the greatest net value from the adoption of disruptive technology trends. We’re happy with our methods for most of the talked-about trends (analytics, social media, mobility, cloud…). But we need to keep horizon-scanning too, so the question naturally arises: How soon should we adopt the next major trend into our method?

article thumbnail

Reporters Need to Understand Advertising. But Should They Be Making It?

John Battelle's Searchblog

The post Reporters Need to Understand Advertising. But Should They Be Making It? appeared first on John Battelle's Search Blog. ( image ) I know that when I do write here, I tend to go on, and on – and those of you who read me seem to be OK with that. But sometimes the best posts are short and clear. That was my thought when I read Journalists Need Advertising 101 by Brian Morrissey, writing in Digiday last week.

IT 105
article thumbnail

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Yahoo says no to remote working too

ChiefTech

So it turns out that Google isn't the only tech company to prefer that staff co-locate rather than work remotely or flexibly. Yahoo has just told all their remote and work from home staff to head back to the office: “Speed and quality are often sacrificed when we work from home,” reads the memo to employees from HR head Jackie Reses. “We need to be one Yahoo!

IT 43
article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

The Executive Order, “ Improving Critical Infrastructure Cybersecurity ,” and the Presidential Policy Directive (“PPD”), “ Critical Infrastructure Security and Resilience ,” signed by President Obama on February 12, 2013, raise the stakes in the national debate over cybersecurity requirements and seem likely, if not designed, to provoke a legislative response.

article thumbnail

The iWatch: What I Hope Apple Actually Does (But Probably Won’t)

John Battelle's Searchblog

The post The iWatch: What I Hope Apple Actually Does (But Probably Won’t) appeared first on John Battelle's Search Blog. ( image AppleInsider ) Back in April of last year, I pondered Pebble, the then-wildly successful darling of Kickstarter fame. Pebble is a wristwatch device that connects to iPhones and displays various smart things. In the piece, Does the Pebble Cause a Ripple In Apple’s Waters?

Insurance 105
article thumbnail

When It’s This Easy To Take Someone’s Money…

John Battelle's Searchblog

The post When It’s This Easy To Take Someone’s Money… appeared first on John Battelle's Search Blog. Earlier in the month I wrote about fraud in the advertising technology ecosystem – a post which has spawned dozens of fascinating conversations that I will continue to write about here and elsewhere. But this past weekend I encountered another kind of scam – a combination of time-honored phishing (online identity theft via social manipulation) and good old-fashi

Marketing 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Outlook for Data Privacy Issues in Congress

Hunton Privacy

On February 8, 2013, during the Centre for Information Policy Leadership’s First Friday call , Hunton & Williams partner Frederick Eames offered insights on how key U.S. government players are likely to approach privacy and data security initiatives this session. Eames discussed upcoming privacy legislation and outlined his predictions regarding how several Congressional committees, including the House of Representatives Energy & Commerce Committee and the Senate Committee on Commerce, S

Privacy 40