Sat.Feb 09, 2013 - Fri.Feb 15, 2013

article thumbnail

The 2013 Summit Arrives: Bridging Data And Humanity

John Battelle's Searchblog

The post The 2013 Summit Arrives: Bridging Data And Humanity appeared first on John Battelle's Search Blog. Some of the more than 25 speakers already joining us at the 2013 CM Summit. Over on the brand spanking new CM Summit website, we’ve announced our initial speaker lineup and progam theme for the 2013 event – Parting the Clouds: Bridging Data and Humanity.

Marketing 108
article thumbnail

SharePoint 2013: Is utility more important than usability?

ChiefTech

Is utility more important than usability? When evaluating SharePoint 2013 specifically as a collaboration platform, this question is often top of mind. The Metro user interface in SharePoint 2013 is a refreshing update to this mature platform, but usability goes deeper than just the front-end theme. A good user experience is both subjective in relation to the user's own experience and situated in the context of use.

IT 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Boosting UNLOAD and LOAD Performance with Pipes and FORMAT INTERNAL

Robert's Db2

My colleague Jorn Thyssen, who is based in Denmark, recently let me know of some nice work that he had done in setting up a high-performance process that gets data from one DB2 for z/OS table into another via the UNLOAD and LOAD utilities. What Jorn shared with me I'll share with you in this blog post. Here's how this got started: Jorn, an IBM System z Information Management Technical Specialist, had delivered presentations on the DB2 Analytics Accelerator for z/OS to a number of organizations.

article thumbnail

Cybersecurity Webinar: Understanding How the Obama Administration’s Executive Order Will Impact Your Business

Hunton Privacy

On February 12, 2013, the Obama Administration released its highly-anticipated Executive Order on cybersecurity. Evolving cyber threats and increased government attention to these issues will affect companies in every industry, and businesses must consider a proactive approach to protecting against risks to critical business systems, company personal data, intellectual property and other proprietary information.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New EU rules on security

Privacy and Cybersecurity Law

If you Google “EU law on security”, you’ll find the EU Data Protection Directive near the top of the search […].

More Trending

article thumbnail

Looking for a needle in a haystack couldn’t be easier!

CGI

Looking for a needle in a haystack couldn’t be easier! ravi.kumarv@cgi.com. Mon, 02/11/2013 - 07:00. Big data is a massive opportunity. It also presents some significant challenges that traditional systems find hard to handle. We’ve all seen the big data statistics: every minute 1,820 TB of data is created, 204m emails and 11 million instant messages are sent, 700,000 Google searches are made and businesses receive 35,000 Facebook likes.

Mining 40
article thumbnail

Obama Signs Presidential Policy Directive on Critical Infrastructure Security and Resilience

Hunton Privacy

On February 12, 2013, in conjunction with the release of an executive order on Improving Critical Infrastructure Cybersecurity (the “Executive Order”), President Obama signed a Presidential Policy Directive on Critical Infrastructure Security and Resilience (“PPD-21” or “PPD”). The PPD revokes the 2003 Homeland Security Presidential Directive-7 (issued by President George W.

article thumbnail

The Highly anticipated 'Mailbox' app

ChiefTech

Mailbox is another attempt to reinvent the email interface , alto. Designed for mobile (currently iPhone + gmail only) and built loosely around the inbox zero concept, Mailbox have: "redesigned the inbox to make email light, fast, and mobile-friendly. Quickly swipe messages to your archive or trash. Scan an entire conversation at once with chat-like organization.

article thumbnail

Obama Administration Releases Highly Anticipated Cybersecurity Executive Order

Hunton Privacy

Today, the Obama Administration released an executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”), which is focused primarily on government actions to support critical infrastructure owners and operators in protecting their systems and networks from cyber threats. The Executive Order requires administrative agencies with cybersecurity responsibilities to (1) share information in the near-term with the private sector within the scope of their current authority a

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FTC Study Reports on Inaccuracies in Consumer Credit Reports

Hunton Privacy

On February 11, 2013, the Federal Trade Commission announced that a congressionally-mandated study of the U.S. credit reporting industry found that 26 percent of consumers identified at least one error that might affect their credit score. The study reported that 5 percent of consumers had errors on their credit reports that could result in less favorable terms for loans and insurance.

article thumbnail

The writing is on the wall for organisational boundaries

ChiefTech

From Danah Boyd's talk at the American Society for Training and Development's TechKnowledge conference: Inside big companies, we take organizational boundaries for granted. Traditional organizational logic suggests that most employees of big corporations should primarily only talk to other people at their organization to do their work and should only engage with "competitors" when a deal is being brokered or there is a particular need for cross-sector collaboration.

article thumbnail

Comparing the usability of page creation: SharePoint 2013 versus other social intranets

ChiefTech

Yesterday I did a deep dive into the user experience of three different intranet and collaboration platforms: SharePoint 2013, Jive and Confluence. I looked specifically at how these particular products support tables in their rich text editors , because getting this right is quite tricky in a Web browser. While each product performs well overall, each also addresses the user experience quite differently.

article thumbnail

Mexico Issues Cookie and Web Beacon Rules and Privacy Notice Requirements

Hunton Privacy

On January 17, 2013, Mexico’s Ministry of Economy published its Lineamientos del Aviso de Privacidad (in Spanish) (“Privacy Notice Guidelines” or “Guidelines”), which it prepared in collaboration with the Mexican data protection authority. The Guidelines introduce heightened notice and opt-out requirements for the use of cookies, web beacons and similar technology, and they impose extensive requirements on the content and delivery of privacy notices generally (with respect to all personal data,

Privacy 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.