2014

What Will Search Look Like In Mobile? A Visit With Jack

John Battelle's Searchblog

The post What Will Search Look Like In Mobile? A Visit With Jack appeared first on John Battelle's Search Blog. I’ve come across any number of interesting startups in my ongoing grok of the mobile world (related posts: 1 , 2 , 3 ).

Rethinking the Security “Con”

ShackF00

I realized a while back that I had lost the zeal to attend security conferences. I’ve been attending security conferences for a long damn time, as many of you have too. DEF CON, RSA, Shmoo, a whole $HIATLOAD of B-Sides, SANS of course, etc.

4D printing: The new frontier

Collaboration 2.0

Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

112

Calculate the Number of Connections Between Objects or People

JKevinParker

I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection.

Making Real Money for Bands in the Age of Social Media - Democratization of the Royalties Model, by Gideen.com

Interactive Information Management

Welcome to M usic Business 3.0 - it's not about the $1 song anymore. Most artists these days are gifting songs away just for email addresses, the occasional "like". The 3.0 music business model is about creating tracks and collecting many different revenue types internationally for each track/song.

DB2 for z/OS: How Low Can Synchronous Read Wait Time Go?

Robert's Db2

Short answer: lower than I'd previously thought. Short explanation: solid-state drives. OK, backstory: I was recently analyzing some performance information related to a client's production DB2 for z/OS environment. Included in the documentation provided by the client were some Accounting Long reports generated by their DB2 monitor (these reports format data contained in DB2 accounting trace records).

You Saw It Here First: Information Governance Moves Beyond "Buzzword"

Positively RIM

Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.

More Trending

Internet Bug Bounty issues its first $10,000 reward

Scary Beasts Security

One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards. Earlier today, David Rude collected $10,000 for a vulnerability recently fixed in APSB13-28. My thoughts on this are too long to fit into a tweet, so I summarize them here: This shows that the IBB is serious about rewarding research which makes us all safer. 10,000 is a respectable reward by modern bug bounty program standards.

IT 31

Using E-mail for Direct Marketing: Do You Know the Rules?

Managing Your Information

I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.

Jonty Hurwitz 3D printed nano sculptures at the same scale as a human sperm

3ders

Artist Jonty Hurwitz has created so far the most detailed nano-sculptures with 3D printing and a technique called "Multi-Photon Lithography". Similar to standard photolithography techniques, multiphoton lithography is a technique for creating small features in a photosensitive material.

Google: The Information-First Conglomerate

John Battelle's Searchblog

The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014.

Phoning it in

ShackF00

This will be a short post, really an end note to 2014 and a thought with which to start 2015. I’ve actually been meaning to write this since early November, but…life. What inspired me to think of this post, and inspired me in general, was a concert.

IT 59

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope

Digital Accountability and Transparency Act (DATA Act)

JKevinParker

On May 9, 2014, President Barack Obama signed the Digital Accountability and Transparency Act (DATA Act), Public Law No. 113-101, which had been passed unanimously by both the House of Representatives and the Senate. —Data Transparency Coalition ( [link] ).

Video 52

A Day in the Life of an SEO'd Blog Article, from the Local Washington DC SEO Provider's Perspective

Interactive Information Management

think Blogs are good for SEO. The SEO customer SAYS: "I'll write a Blog article, you SEO it, and we'll post it as part of our online marketing!" The SEO customer THINKS: "I'll quickly write a fun, helpful blog entry (or get a Guest Blogger!),

A Tiger Changes His Stripes: I LIKE Java on z/OS

Robert's Db2

I well remember a phone conversation, from about six or seven years ago, during which a friend of mine and I discussed an application project at his site which involved use of DB2 for z/OS stored procedures. Me: "In what language will the stored procedure programs be written?" My friend (sounding like someone whose favorite sports team had just lost the championship game): "Java." Me (groaning): " Java? Why Java?"

Is IG a new package and labeling of RIM?

Positively RIM

Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.

Hacking Exposed 78% Of All Records Compromised In First Half Of 2014

Data Loss DB

Mid-year 2014 data breaches exposed over 502 million records far exceeding the mid-year point in 2013, the previous all-time record setting year. We are pleased to announce the release of the next installment of Risk Based Security’s Mid Year Data Breach QuickView report. The report shows that 2014 is on pace to replace 2013 as the highest year on record for exposed records, and the recently reported exposure of 1.2 billion email addresses and user names has not been included.

Exile for the BBC Micro; some elegant solutions

Scary Beasts Security

[Prelude: sorry, this has nothing to do with security whatsoever. Feel free to bail now if you're not interested in a classic 1980's game, and rest assured that non-security posts to this blog will remain extremely rare.]

Video 26

What Media Must Do To Succeed

John Battelle's Searchblog

The post What Media Must Do To Succeed appeared first on John Battelle's Search Blog. Wired Founder Louis Rossetto at work in the early days. image ).

Japanese artist collaboration XSENSE develop gorgeous and artistic 3D printed artificial limbs

3ders

That 3D printing is a wonderful tool for developing customized and functional prosthetics, needs no further explanation. And that this same technology is an innovative and exciting tool for artistic also goes without saying.

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up.

“Facebook Is a Weatherless World”

John Battelle's Searchblog

The post “Facebook Is a Weatherless World” appeared first on John Battelle's Search Blog. image ). This quote, from a piece in Motherboard , hit me straight between the eyeballs: Facebook…will not let you unFacebook Facebook.

IT 114

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope

Rethinking Records Management with SharePoint: An AIIM Webinar

JKevinParker

On May 28, 2014, I had the privilege of being the featured speaker for an AIIM webinar called "Rethinking Records Management with SharePoint".

DC, Northern Virginia Digital Strategy - for Businesses, Agencies, Nonprofits - Upcoming NVTC.org Committee Meetings 2014-2015

Interactive Information Management

Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015.

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now."

New Records Technology: Structured Data Archiving

Positively RIM

Care for an example of how IT, Legal, and Records need to work together (commonly known as Information Governance?) Here’s one development: Technology at ARMA International is a fascinating mélange. Each year, we see incremental improvements. There are faster scanners, increasingly subtle analytics, greater capacities, more resolution, less-volatile media, and more. But the one technological breakthrough I saw in San Diego filled a glaring abyss in Records & Information capabilities.

First Quarter 2014 Exposes 176 Million Records

Data Loss DB

Troubling Trend Of Larger, More Severe Data Breaches Continues. We are pleased to announce the release of the next installment of Risk Based Security’s Data Breach QuickView report. Analysis of data compromise activity for Q1 2014 shows that, while the number of incidents taking place remains comparable to Q1 2013, the number of records lost per incident is on the rise.

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool. But what if we attempted to use is as a tool for protection?

The Next Stage of Mobile Quickening: Links Get Intelligent

John Battelle's Searchblog

The post The Next Stage of Mobile Quickening: Links Get Intelligent appeared first on John Battelle's Search Blog. How Branch Metrics works…click to enlarge.

Austrian artist creates life-like insect models using a Form1+ 3D printer

3ders

Are you sure these are 3D printed? All of these beautiful insects have been printed in multiple parts. The last one, a Midge larva, consists of 14 separate components. This article Austrian artist creates life-like insect models using a Form1+ 3D printer is first published at 3ders.org.

My 2014 NewCo SF Schedule: Hard Choices

John Battelle's Searchblog

The post My 2014 NewCo SF Schedule: Hard Choices appeared first on John Battelle's Search Blog. As I did last year, I picked my NewCo San Francisco schedule early, so I could prepare in advance of the festival this September 10-12.

The Web Will Kill Apps

John Battelle's Searchblog

The post The Web Will Kill Apps appeared first on John Battelle's Search Blog. Lots of the “apps are killing the web” meme going around these days, with the latest batch of casket sealant come from no greater validator of commonly agreed upon wisdom than the Wall St. Journal.

Harley Earl's influence on Steve Jobs

Collaboration 2.0

Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run. Collaboration Project Management

IT 87

Word Cloud: Information Chaos vs. Information Opportunity

JKevinParker

I created a Wordle word cloud of AIIM's eBook “Information Chaos V. Information Opportunity: THE information challenge for the next decade” Download this word cloud as a hi-res PDF These are the top 100 words in the paper.

eBook 52

Project Management, PMP, ITIL, Cost Estimating Business Training & Certification in Virginia

Interactive Information Management

If you're in any way associated with Government contracting, project or program management, project or system cost estimating or resourcing, whether on the job or during acquisition processes and proposal preparation - you may need PMP, ITIL or Cost Estimation Certification and/or training. This is important not only from the business manager perspective, but also from the Enterprise and Solution Architect perspective - it comes in very handy.