Sat.Mar 23, 2013 - Fri.Mar 29, 2013

article thumbnail

Can We Bridge Data to Humanity? We Best Talk About It.

John Battelle's Searchblog

The post Can We Bridge Data to Humanity? We Best Talk About It. appeared first on John Battelle's Search Blog. The agenda for our seventh annual CM Summit is live. And it rocks. You can read all about it here. I am really looking forward to this conversation, mainly due to the quality of the folks who are coming. Oh, and the theme, of course. I won’t beat around the bush.

IT 105
article thumbnail

Disruptive digital cliques

Collaboration 2.0

We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Access 67
article thumbnail

A Copernican Shift In Our Economic Thinking

Daradiction

Eversince I read Kalle Lasn's (Adbusters Founder) book "Culture Jam: The Uncooling of America" I've been fascinated with his anti consumer stance. Idealism aside, this set of images from his most recent book "Meme Wars: The Creative Destruction of Neoclassical Econmics" paints a stark contrast to business as usual.

68
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How I “Crack” My Inbox

John Battelle's Searchblog

The post How I “Crack” My Inbox appeared first on John Battelle's Search Blog. Over on the LinkedIn Influencer network, I’ve revealed how I manage my often-overflowing inbox. It’s not exactly rocket science, but enough people have found it interesting that I thought I’d share it in a professional context. If you’re interested in stuff like this, give it a read and let me know what you think.

IT 89

More Trending

article thumbnail

Further reading on the Yammer + SharePoint roadmap

ChiefTech

If you are still trying to get your head around the deeper implications of the Yammer & SharePoint roadmap announcement , here is some further reading: Hold tight - its just a bump in the road. Jeremy Thake is one of my favourite SharePoint technologists - he's not afraid to dig into the details of SharePoint, good or bad. He still has questions he would like answered - for example: If you switch off the SharePoint Newsfeed and replace with Yammer, what happens to the actions and activity th

article thumbnail

German Law Enforcement Access to Cloud Data in Foreign Jurisdictions, Including the U.S.

Hunton Privacy

On March 8, 2013, the German government published a response to a formal inquiry from one of the German Parliament’s parties on the international security, data protection and surveillance implications of cloud computing. The response describes international cooperation between German and foreign law enforcement agencies that have used mutual legal assistance treaties to obtain cloud data in foreign jurisdictions.

Cloud 40
article thumbnail

Awesome archivists

Preservica

I was delighted to stumble upon the Archivists Being Awesome (ABA) Blog. Not only does it have one of the most fun mission statements I have seen for some time - “One part bragging platform, one part skill share, two parts making new friends and being inspired by the work of others, the ABA will give area archivists a chance to briefly describe exciting projects they’re involved in.” it also has some great content.

Access 40
article thumbnail

Disruptive digital cliques

Collaboration 2.0

'We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DCMS Wordpress-based intranet case study - cheaper, quicker, and user-centred

ChiefTech

Continuing what appears to be turning into a series on alternative intranets technologies, here is a great study from the UK about relaunching the Department for Culture, Media & Sport's intranet with Wordpress. There are two main reasons for reading this case study: If you haven't looked seriously under the hood of Wordpress in recent years, you probably won't appreciate that it has evolved from a blogging tool into a sophisticated Web content management system.

article thumbnail

Appeals Court Holds “Reasonable Suspicion” Required for Forensic Search of Laptop at the Border

Hunton Privacy

On March 8, 2013, a U.S. federal appeals court issued a decision in the case United States v. Cotterman , holding that the federal government must have “reasonable suspicion” of criminal activity to conduct a forensic search of laptops and similar devices in the possession of individuals attempting to cross the border. The case arose after Howard Cotterman attempted to enter the United States by car at a checkpoint on the Mexican border.

article thumbnail

HIPAA Final Rule: Today is Effective Date–Covered Entities and Business Associates Have 180 Days to Comply

HIPAA

March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.

article thumbnail

Disruptive digital cliques

Collaboration 2.0

'We are only beginning to understand the power digital networks can bring to opportunists: individuals and groups can overpower the best of business intentions with corrosive behavior and exclusive digital silos.

40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Are we short changing social intranet implementations?

ChiefTech

Presenting at the European Enterprise 2.0 Summit , Jane McConnell talked about five reasons why social intranets have not taken off and what to do about it based on data from her Digital Workplace Trends report : Social Intranet (R)evolution at Enterprise 2.0 Summit from Jane McConnell. One of the interesting points for me is the issue of 'Fragmented digital environments'.

article thumbnail

Department of Commerce Issues Notice of Inquiry Regarding Incentives to Adopt Improved Cybersecurity Practices

Hunton Privacy

On March 28, 2013, the Department of Commerce’s Notice of Inquiry into “Incentives to Adopt Improved Cybersecurity Practices” was published in the Federal Register (78 Fed. Reg. 18954). This Notice, which includes a series of broad questions for owners of the nation’s critical infrastructure, follows up on earlier Commerce inquiries focused on incentives for noncritical infrastructure.

article thumbnail

HIPAA Final Rule: Today is Effective Date–Covered Entities and Business Associates Have 180 Days to Comply

HIPAA

March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.

article thumbnail

Hackable office buildings

ChiefTech

Gensler, an American design and architecture firm, outlines their vision for 'hackable' office buildings: "Given workplace mobility trends, broadening employee and corporate interest in sustainability, in conjunction with growing economic pressure on businesses, the vision for the office building of the future in North America is no longer a new building.

Mining 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Australian manufacturing companies boost productivity and competitive advantage with enterprise social software

ChiefTech

While a bit light on details, I'm not going to complain about this positive story in the ITPro section of the Fairfax newspapers about two packaging manufacturing companies using enterprise social software to help their bottom-line. Pact Group, with staff spread across 70 sites in Australia, New Zealand and Asia, is currently using Salesforce Chatter with 600 of its 3500 employees.

article thumbnail

Hello, pump.io

ChiefTech

I've been watching open source microblogging engine, StatusNet , for sometime and blogged about it back in 2011. Status.net also powers identi.ca , which was the open alternative to Twitter before app.net grabbed all the attention. In December, Evan Prodromou announced that he was winding down the hosted Status.net service to concentrate on a new activity stream server, pump.io.

IT 49
article thumbnail

Sotto Named Among National Law Journal’s “100 Most Influential Lawyers”

Hunton Privacy

Hunton & Williams LLP is pleased to announce that Lisa J. Sotto , partner and head of the firm’s Global Privacy and Data Security practice , has been named to The National Law Journal’s “ The 100 Most Influential Lawyers in America ” list. Last published in 2006, this is only the eighth time this list of legal luminaries has been compiled since it was first established in 1985 as “Profiles in Power.”.

Privacy 40
article thumbnail

Baltic DPAs Hold Annual Meeting on Data Protection

Hunton Privacy

On March 21-22, 2013, the data protection authorities (“DPAs”) of the Baltic states of Estonia, Latvia and Lithuania met in Riga, Latvia, for their second annual meeting to discuss several practical cooperation matters regarding data protection. The Estonian DPA ( Andmekaitse Inspektsioon ) announced that the focus for their joint supervision in 2013 will be on the gambling sector.

IT 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Irish Presidency Reports on Progress of the Proposed EU Regulation

Hunton Privacy

On March 1, 2013, the Irish Presidency published a note to the European Council of Ministers regarding its progress on the European Commission’s proposed General Data Protection Regulation (“Proposed Regulation”). The Note details the Irish Presidency’s work to bring a more risk-based approach to the Proposed Regulation. According to the Note, several EU Member States have “voiced their disagreement with the level of prescriptiveness” of the Proposed Regulation, and stated that the risk inherent

Risk 40
article thumbnail

Peru Issues Data Protection Regulations

Hunton Privacy

On March 22, 2013, Peru issued the implementing regulations of its new data protection law. The Reglamento de la Ley No 29733, Ley de Protección de Datos Personales (“Regulations”) provide detailed rules on a variety of topics, including the following: Territorial scope; notice and consent; data transfers; processing of personal data relating to children and adolescents; data processing in the communications and telecommunications sectors; outsourcing; information security; data subjects’ rights

article thumbnail

Increased Cooperation Between EU and APEC on Cross-Border Data Transfer Rules

Hunton Privacy

On March 26, 2013, the Article 29 Working Party issued a press release on the recent developments concerning cooperation between the EU and the Asia-Pacific Economic Cooperation group (“APEC”) on cross-border data transfer rules. A joint EU-APEC committee, which includes the French and German data protection authorities as well as the European Data Protection Supervisor and the European Commission, has been studying similarities and differences between the EU’s binding corporate rules (“BCRs”) f

Privacy 40
article thumbnail

UK ICO Fines Company GBP 90,000 for Nuisance Calls

Hunton Privacy

On March 20, 2012, the UK Information Commissioner’s Office announced that it has issued a monetary penalty of £90,000 against DM Design Bedrooms Ltd. (“DM Design”) for making thousands of unwanted marketing calls. Under applicable UK electronic direct marketing rules, marketers are prohibited from making unsolicited telephone calls without checking whether individuals have registered with the Telephone Preference Service (“TPS”).

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

French Data Protection Authority Rules on Keylogger Software

Hunton Privacy

On March 20, 2013, the French Data Protection Authority (“CNIL”) issued (in French) guidance on keylogger software (the “Guidance”). Keylogger software enables an employer to monitor all the activities that take place on an employee’s computer (such as every key typed on the computer’s keyboard and every screen viewed by the employee), without the employee’s knowledge.

article thumbnail

HIPAA Final Rule: Today is Effective Date–Covered Entities and Business Associates Have 180 Days to Comply

HIPAA

March 26, 2013. Today is the first big milestone since the January 25, 2013, publication in the Federal Register of the Final Rule: Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act [HITECH Act] and the Genetic Information Nondiscrimination Act; Other Modifications of the HIPAA Rules.

article thumbnail

UK Government Launches Cybersecurity Partnership

Hunton Privacy

On March 27, 2013, the UK Government announced the Cyber Security Information Sharing Partnership (“CISP”), a partnership between government and industry to share intelligence on cybersecurity threats. Introduction of the CISP follows a successful pilot program across key UK sectors and is part of the UK’s Cyber Security Strategy to facilitate information-sharing on cyber threats.