2014

article thumbnail

Google: The Information-First Conglomerate

John Battelle's Searchblog

'The post Google: The Information-First Conglomerate appeared first on John Battelle's Search Blog. Larry Page on the cover of Fortune, Nov. 13 2014. Last week Google CEO Larry Page got the Fortune magazine cover treatment , the latest of many such pieces attempting to quantify Google’ sprawling business. The business press is obsessed with answering the question of whether we’ve reached “ Peak Google.” (Clearly Fortune’s opinion is that we have not, given they

Marketing 111
article thumbnail

Harley Earl's influence on Steve Jobs

Collaboration 2.0

'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nanu Nanu to Robin Williams, Bill Griffin, & Ashley Taylor too.

Daradiction

'Hearing the news about Robin Wililams' death this past week hit me like a dump truck. It felt like losing a family member. I grew up watching "Mork & Mindy" and remember as a kid being so amused by his "nanu nanu's", and inspired by other characters that he played over the years like Good Morning Vietnam, Dead Poet's Society, and Good Will Hunting.

IT 76
article thumbnail

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now." In the space below, I'll provide some background information on DB2 11's bind concurrency enhancement, and then I'll give you the bonus insight that you might see as the "cherry on top" -- the important scenario that is addressed by DB2 11 bind concurrency but which has received little (if any) coverage in documents and

IT 54
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

You Saw It Here First: Information Governance Moves Beyond "Buzzword"

Positively RIM

Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.

More Trending

article thumbnail

German DPAs Issue Guidelines on CCTV Use

Hunton Privacy

On March 10, 2014, the German Federal Commissioner for Data Protection and Freedom of Information and all 16 German state data protection authorities responsible for the private sector issued guidelines on the use of closed-circuit television (“CCTV”) by private companies. The guidelines provide information regarding the conditions under which CCTV may be used and outline the requirements for legal compliance.

Retail 56
article thumbnail

Calculate the Number of Connections Between Objects or People

JKevinParker

I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection. One way to calculate this for more than 2 objects is to add up all the whole numbers between 1 and (n-1) where n is the number of objects.

article thumbnail

A case study on the use of iBeacon technology at a major theme park

CGI

A case study on the use of iBeacon technology at a major theme park. narmada.devarajan. Wed, 12/10/2014 - 02:05. In my last blog , I shared the potential value of Apple’s iBeacon technology in transforming the passenger experience and transport operations. As I noted, there are already many real-life examples of its application in other industries such as retail.

article thumbnail

Privacy Politics at IAPP, Brussels!

Privacy and Cybersecurity Law

The recent IAPP Congress in Brussels provided a platform to bring out the “big guns” on privacy. Needless to say, […].

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Internet Bug Bounty issues its first $10,000 reward

Scary Beasts Security

One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards. Earlier today, David Rude collected $10,000 for a vulnerability recently fixed in APSB13-28. My thoughts on this are too long to fit into a tweet, so I summarize them here: This shows that the IBB is serious about rewarding research which makes us all safer. $10,000 is a respectable reward by modern bug bounty program standards.

IT 36
article thumbnail

Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh

John Battelle's Searchblog

'The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up. Recently I began a walkabout of sorts, with a goal of ameliorating my rather thin understanding of the mobile marketplace. If you read me closely, you know I’ve been more than frustrated with what I call the “ chicletized world ” of disconnected mobile apps.

Marketing 112
article thumbnail

7 habits of highly overrated people - managing over communicators and self promoters

Collaboration 2.0

'Stopping smart self promoters from dominating collaborative processes is far more important than most realize - overcommunicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.

article thumbnail

Using E-mail for Direct Marketing: Do You Know the Rules?

Managing Your Information

I was recently attending a training session and a discussion started late in the afternoon about e-mail marketing and making the most of customer lists. There wasn’t much of the day left and after a brief chat, we made a joint decision it would be an ideal first topic for my blog. So a big thank you to everyone for the inspiration to get started! Connecting with customers is hugely important for all kinds of organisations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DB2 for z/OS Stored Procedures: Native SQL, or Java?

Robert's Db2

Recently, a mainframe DB2 DBA put a question to me: when should DB2 for z/OS native SQL procedures be used versus Java stored procedures, and vice versa? Why he asked: the DBA worked with a group of developers who, collectively, could code both of these DB2 stored procedure types. Within this group, individuals tended to go with what they were used to.

Access 48
article thumbnail

Is IG a new package and labeling of RIM?

Positively RIM

Recently, the Records Management ListServ hosted a spirited discussion on the above question. Here was my response: Information Governance means coordinating all the records' stakeholders, focusing them on their organizations' goals. The role requires team building across disciplines and the ability to forge potent alliances. An Information Governor must be able to speak Legalese to the attorneys and techno-babble to IT, as well as being adept with records.

article thumbnail

Hand-held Motorola CP200 Radios vs. Cellphones Identified as Key to Safety & Reliable DR/Continuity of Operations, for Industry and Government

Interactive Information Management

News reports and incidents regarding issues with reliance on cellphones for event, incident or other monitoring and operations activities requiring mobile communications continues to surface. In this context, those responsible for finding, purchasing and using critical hand-held communications devices are maintaining their use of advanced hand-held radios - including the extremely popular and durable Motorola CP200 handheld radio. ( This is a noteworthy industry perspective, from a KME client pa

article thumbnail

Poland Amends Its Personal Data Protection Act

Hunton Privacy

On November 24, 2014, the Polish President Bronis?aw Komorowski signed into law a bill that was passed by Polish Parliament on November 7, 2014, which amends, among other laws, certain provisions of the Personal Data Protection Act 1997. As a result of the amendments, data controllers will be able to transfer personal data to jurisdictions that do not provide an “adequate level” of data protection without obtaining the prior approval of the Polish Data Protection Authority ( Generalny Inspektor

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information

JKevinParker

This presentation is adapted from a tutorial I wrote for AIIM , which is available in their SharePoint Resource Center. I also presented some of this material at the SharePoint Users Group of DC (SUGDC) on 9/11/2014. How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information from Kevin Parker. The AIIM Resource Centers offer lots of tutorials, webinars, publications, perspectives and more on SharePoint and a host of Information Management topics.

article thumbnail

Improving the passenger journey through iBeacon technology

CGI

Improving the passenger journey through iBeacon technology. ravi.kumarv@cgi.com. Wed, 12/03/2014 - 06:51. About a year ago, Apple launched a new technology called iBeacon. This technology makes it possible for a smart device (phone or tablet) to perform an action when it comes in proximity to an iBeacon, which is a type of low-cost transmitter. The possibilities of iBeacons seem limitless, and they have the potential to create value across many industries.

article thumbnail

Canada’s Anti-Spam Law (CASL) applies to Software January 15

Privacy and Cybersecurity Law

Earlier this year we told you that Canada’s Anti-Spam Law (CASL) is not just for Canadians. CASL is also not just […].

article thumbnail

Using ASAN as a protection

Scary Beasts Security

AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

“Facebook Is a Weatherless World”

John Battelle's Searchblog

'The post “Facebook Is a Weatherless World” appeared first on John Battelle's Search Blog. ( image ). This quote, from a piece in Motherboard , hit me straight between the eyeballs: Facebook…will not let you unFacebook Facebook. It is impossible to discover something in its feeds that isn’t algorithmically tailored to your eyeball.

IT 111
article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

111
111
article thumbnail

What Media Must Do To Succeed

John Battelle's Searchblog

'The post What Media Must Do To Succeed appeared first on John Battelle's Search Blog. Wired Founder Louis Rossetto at work in the early days. ( image ). Man, there’s been a ton of hand wringing over “the media” of late, from all the fuss over First Look and the New Republic to questions about whether a publication can survive if it’s not at 20-30mm uniques and growing – like current darlings Vox, BuzzFeed, and Vice.

Paper 111
article thumbnail

My 2014 NewCo SF Schedule: Hard Choices

John Battelle's Searchblog

'The post My 2014 NewCo SF Schedule: Hard Choices appeared first on John Battelle's Search Blog. As I did last year, I picked my NewCo San Francisco schedule early, so I could prepare in advance of the festival this September 10-12. There are nearly 130 extraordinary companies to choose from, so it’s not easy to decide where to spend your time.

Marketing 111
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

The Next Stage of Mobile Quickening: Links Get Intelligent

John Battelle's Searchblog

'The post The Next Stage of Mobile Quickening: Links Get Intelligent appeared first on John Battelle's Search Blog. How Branch Metrics works…click to enlarge. Early in a conversation with Alex Austin, CEO of mobile startup Branch Metrics , I had to interrupt and ask what seemed like a really dumb question. “So, wait, Alex, you’re telling me that the essence of your company’s solution is that it… makes sure a link works?

Passwords 111
article thumbnail

To Be Clear: Do Not Build Your Brand House On Land You Don’t Own

John Battelle's Searchblog

'The post To Be Clear: Do Not Build Your Brand House On Land You Don’t Own appeared first on John Battelle's Search Blog. ( image ) I took a rigorous walk early this morning, a new habit I’m trying to adopt – today was Day Two. Long walks force a certain meditative awareness. You’re not moving so fast that you miss the world’s details passing by - in fact, you can stop to inspect something that might catch your eye.

Marketing 111
article thumbnail

What Is Google?

John Battelle's Searchblog

'The post What Is Google? appeared first on John Battelle's Search Blog. Every so often it’s fun to see what Google says about itself via its autocomplete function. For your enjoyment, a few choice images: The post What Is Google? appeared first on John Battelle's Search Blog.

IT 111