Sat.Jun 23, 2012 - Fri.Jun 29, 2012

article thumbnail

Microsoft's scattered strategic vision

Collaboration 2.0

Enterprise customers continue to be frustrated by a lack of clarity or momentum in key areas around business productivity ‘front office’ strategy from Microsoft; partners are picking up the slack but some big questions are being asked this summer

88
article thumbnail

Why is IBM System z Essential to Your Business?

Robert's Db2

Earlier this year, some of my colleagues and I who work with IBM information management software for the System z platform were invited to write essays addressing the question, "Why is IBM System z essential to business?" I decided to act on this invitation, and to get my creative juices flowing I imagined an impromptu conversation with a skeptical CEO on the business value of System z.

Retail 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s Hard to Lay Fallow

John Battelle's Searchblog

I’ll admit it, I’m one of those people who has a Google News alert set for my own name. Back in the day, it meant a lot more than it does now – the search results used to pick up blog mentions as well as “regular” news mentions, and before FacebookLand took over our world (and eschewed Google’s), a news alert was a pretty reliable way to find out what folks might be saying about you or your writing on any given day.

Sales 65
article thumbnail

Time, place and context for a mobile knowledge worker

ChiefTech

via headshift.com.au. Cross posted from the Headshift Asia Pacific blog, this is one in a series of diagrams I'm sharing from my forthcoming report on mobile apps for business. This diagram is an example of what I call a situational map, intended to help designers explore possible scenarios where mobile apps could be used. See the original post for further explanation.

49
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Generation connected looks for clues

Collaboration 2.0

For ‘Generation Connected’, talk about what is possible and trends are dime a dozen, but everyone is looking for evidence of practical, experiential business successes

76

More Trending

article thumbnail

“Fair dealing” online? No quick test, no one-size fits all

Privacy and Cybersecurity Law

Mark and Constance Fournier operate the Free Dominion website as a political news discussion forum. Richard Warman had an exclusive […].

Privacy 40
article thumbnail

TecTiles: Stick on NFC tags from Samsung

ChiefTech

via youtube.com. An interesting idea from Samsung , but I also wonder if they will really work. Personally I'm not sure that the NFC approach is any better than using QR codes - and both appear to be open to simple social engineering hacks and human error. QR codes are also a lot cheaper to produce. BTW NFC = Near Field Communication. Permalink.

article thumbnail

New report – Designing Mobile Apps: A Roadmap for Businesses

ChiefTech

The report covers: Key concepts about enterprise mobility and mobile apps. The business context (including how mobile apps relate to intranets, training and social business). How to identify user requirements and develop use cases. A roadmap for developing mobile apps. Case studies and examples of the approaches taken by Alcatel-lucent, Apache Corporations, King & Wood Mallesons, Woods Bagot and Zurich. via headshift.com.au.

40
article thumbnail

NLRB on a Mission to Curb Anti-Social Media Policies in the Workplace

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : In recent years, the National Labor Relations Board (“NLRB”) and unions have placed a growing emphasis on extending the application of labor law into the social media arena. As part of this initiative, the NLRB has adopted a strong stance against social media policies that it believes pose a threat to employees’ right to engage in protected activities under Section 7 of the National Labor Relations Act (“NLRA&

IT 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

HHS Settles First HIPAA Enforcement Action Against a State Agency

Hunton Privacy

On June 26, 2012, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $1.7 million settlement with the Alaska Department of Health and Social Services (“DHSS”) for violations of the HIPAA Security Rule. This is the first HIPAA enforcement action taken by HHS against a state agency. In connection with the announcement, the HHS Office for Civil Rights (“OCR”) Director Leon Rodriguez stated that OCR “expect[s] organizations to comply with their obligations under

article thumbnail

FTC Files Complaint Against Wyndham Hotels

Hunton Privacy

On June 26, 2012, the Federal Trade Commission announced that it had filed suit against Wyndham Worldwide Corporation and three of its subsidiaries (“Wyndham”) alleging failures to maintain reasonable security that led to three separate data breaches involving hackers accessing sensitive consumer data. The FTC’s complaint claims that Wyndham violated the FTC Act by posting misleading representations on Wyndham websites regarding how the company safeguarded customer information, and by failing to

article thumbnail

OCR releases audit protocols for HIPAA Security, Privacy and Breaches

Privacy and Cybersecurity Law

The Department of Health & Human Services (HHS) is required under Section 13411 of the HITECH Act to conduct periodic […].

Privacy 40
article thumbnail

Connecticut Amends State Breach Law Amid Introduction of Federal Breach Notification Legislation

Hunton Privacy

In recent weeks, both state and federal regulators have considered security breach notification legislation. On June 15, 2012, Connecticut Governor Dannel Malloy signed a budget bill that, among other things, amends the state’s security breach notification law. The changes, which will take effect on October 1, 2012, most notably require businesses to notify the state Attorney General no later than the time when notice of a security breach is provided to state residents.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.