2014

Google: The Information-First Conglomerate

John Battelle's Searchblog

The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014.

Rethinking the Security “Con”

ShackF00

I realized a while back that I had lost the zeal to attend security conferences. I’ve been attending security conferences for a long damn time, as many of you have too. DEF CON, RSA, Shmoo, a whole $HIATLOAD of B-Sides, SANS of course, etc.

4D printing: The new frontier

Collaboration 2.0

Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

112
112

Calculate the Number of Connections Between Objects or People

JKevinParker

I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection.

Making Real Money for Bands in the Age of Social Media - Democratization of the Royalties Model, by Gideen.com

Interactive Information Management

Welcome to M usic Business 3.0 - it's not about the $1 song anymore. Most artists these days are gifting songs away just for email addresses, the occasional "like". The 3.0 music business model is about creating tracks and collecting many different revenue types internationally for each track/song.

DB2 for z/OS: How Low Can Synchronous Read Wait Time Go?

Robert's Db2

Short answer: lower than I'd previously thought. Short explanation: solid-state drives. OK, backstory: I was recently analyzing some performance information related to a client's production DB2 for z/OS environment. Included in the documentation provided by the client were some Accounting Long reports generated by their DB2 monitor (these reports format data contained in DB2 accounting trace records).

More Trending

A Breakdown and Analysis of the December, 2014 Sony Hack

Data Loss DB

Another incredibly far-reaching in-depth compromise of Sony Pictures has happened, this time by a group known as the Guardians of Peace (GOP). The new compromise has all of the excitement of the old events and more, as blaming North Korea for the attack in retaliation to a movie being released by Sony Pictures is all the rage. Risk Based Security has been keeping an updated timeline of the breach, analyzing the leaked documents, and providing links to additional information.

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. narmada.devarajan. Wed, 12/10/2014 - 02:05. In my last blog , I shared the potential value of Apple’s iBeacon technology in transforming the passenger experience and transport operations.

German DPAs Issue Guidelines on CCTV Use

Hunton Privacy

On March 10, 2014, the German Federal Commissioner for Data Protection and Freedom of Information and all 16 German state data protection authorities responsible for the private sector issued guidelines on the use of closed-circuit television (“CCTV”) by private companies. The guidelines provide information regarding the conditions under which CCTV may be used and outline the requirements for legal compliance.

Internet Bug Bounty issues its first $10,000 reward

Scary Beasts Security

One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards. Earlier today, David Rude collected $10,000 for a vulnerability recently fixed in APSB13-28. My thoughts on this are too long to fit into a tweet, so I summarize them here: This shows that the IBB is serious about rewarding research which makes us all safer. 10,000 is a respectable reward by modern bug bounty program standards.

IT 31

What Will Search Look Like In Mobile? A Visit With Jack

John Battelle's Searchblog

The post What Will Search Look Like In Mobile? A Visit With Jack appeared first on John Battelle's Search Blog. I’ve come across any number of interesting startups in my ongoing grok of the mobile world (related posts: 1 , 2 , 3 ).

Phoning it in

ShackF00

This will be a short post, really an end note to 2014 and a thought with which to start 2015. I’ve actually been meaning to write this since early November, but…life. What inspired me to think of this post, and inspired me in general, was a concert.

IT 59

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope

Digital Accountability and Transparency Act (DATA Act)

JKevinParker

On May 9, 2014, President Barack Obama signed the Digital Accountability and Transparency Act (DATA Act), Public Law No. 113-101, which had been passed unanimously by both the House of Representatives and the Senate. —Data Transparency Coalition ( [link] ).

Video 52

A Day in the Life of an SEO'd Blog Article, from the Local Washington DC SEO Provider's Perspective

Interactive Information Management

think Blogs are good for SEO. The SEO customer SAYS: "I'll write a Blog article, you SEO it, and we'll post it as part of our online marketing!" The SEO customer THINKS: "I'll quickly write a fun, helpful blog entry (or get a Guest Blogger!),

Blog 56

A Tiger Changes His Stripes: I LIKE Java on z/OS

Robert's Db2

I well remember a phone conversation, from about six or seven years ago, during which a friend of mine and I discussed an application project at his site which involved use of DB2 for z/OS stored procedures. Me: "In what language will the stored procedure programs be written?" My friend (sounding like someone whose favorite sports team had just lost the championship game): "Java." Me (groaning): " Java? Why Java?"

Is IG a new package and labeling of RIM?

Positively RIM

Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.

Hacking Exposed 78% Of All Records Compromised In First Half Of 2014

Data Loss DB

Mid-year 2014 data breaches exposed over 502 million records far exceeding the mid-year point in 2013, the previous all-time record setting year. We are pleased to announce the release of the next installment of Risk Based Security’s Mid Year Data Breach QuickView report. The report shows that 2014 is on pace to replace 2013 as the highest year on record for exposed records, and the recently reported exposure of 1.2 billion email addresses and user names has not been included.

Improving the passenger journey through iBeacon technology

CGI

Improving the passenger journey through iBeacon technology. ravi.kumarv@cgi.com. Wed, 12/03/2014 - 06:51. About a year ago, Apple launched a new technology called iBeacon.

Poland Amends Its Personal Data Protection Act

Hunton Privacy

On November 24, 2014, the Polish President Bronis?aw aw Komorowski signed into law a bill that was passed by Polish Parliament on November 7, 2014, which amends, among other laws, certain provisions of the Personal Data Protection Act 1997.

Using E-mail for Direct Marketing: Do You Know the Rules?

Managing Your Information

I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.

What Media Must Do To Succeed

John Battelle's Searchblog

The post What Media Must Do To Succeed appeared first on John Battelle's Search Blog. Wired Founder Louis Rossetto at work in the early days. image ).

Exile for the BBC Micro; some elegant solutions

Scary Beasts Security

[Prelude: sorry, this has nothing to do with security whatsoever. Feel free to bail now if you're not interested in a classic 1980's game, and rest assured that non-security posts to this blog will remain extremely rare.]

Video 26

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope

Rethinking Records Management with SharePoint: An AIIM Webinar

JKevinParker

On May 28, 2014, I had the privilege of being the featured speaker for an AIIM webinar called "Rethinking Records Management with SharePoint".

DC, Northern Virginia Digital Strategy - for Businesses, Agencies, Nonprofits - Upcoming NVTC.org Committee Meetings 2014-2015

Interactive Information Management

Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015.

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now."

New Records Technology: Structured Data Archiving

Positively RIM

Care for an example of how IT, Legal, and Records need to work together (commonly known as Information Governance?) Here’s one development: Technology at ARMA International is a fascinating mélange. Each year, we see incremental improvements. There are faster scanners, increasingly subtle analytics, greater capacities, more resolution, less-volatile media, and more. But the one technological breakthrough I saw in San Diego filled a glaring abyss in Records & Information capabilities.

First Quarter 2014 Exposes 176 Million Records

Data Loss DB

Troubling Trend Of Larger, More Severe Data Breaches Continues. We are pleased to announce the release of the next installment of Risk Based Security’s Data Breach QuickView report. Analysis of data compromise activity for Q1 2014 shows that, while the number of incidents taking place remains comparable to Q1 2013, the number of records lost per incident is on the rise.

The remote control tower ….the remote control airport? Enabled by the Internet of Things.

CGI

The remote control tower ….the the remote control airport? Enabled by the Internet of Things. ravi.kumarv@cgi.com. Wed, 11/26/2014 - 02:06.

IoT 52

Chinese Postal Bureau Issues Personal Information Protection Rules

Hunton Privacy

10 Step Guide To An Epic Box Dev

Box

10 Step Guide To An Epic Box Dev. Box_User1. Mon, 03/24/2014 - 22:12. Joining us at Box Dev tomorrow? Here are 10 things not to miss to make the most of the day! Check out the agenda and speaker lineup here: [link]. Aaron Levie unveiling new platform products.

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up.

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool. But what if we attempted to use is as a tool for protection?