2013

Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact

John Battelle's Searchblog

The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero.

Retail 114

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

113
113

SAP SuccessFactors raise the user experience bar for a digital workplace

ChiefTech

Yesterday I attended day 1 of SAP SuccessFactor''s SuccessConnect conference in Sydney. I was there to learn more about SAP''s roadmap for its enterprise social software offering (SAP Jam) and also to see how well it currently extends into the broader SAP''s HR technology ecosystem.

DB2 for z/OS Work: the Task's the Thing

Robert's Db2

To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.

Blog 60

The Chief Marketing Technology Officer (CMTO) and the Enterprise Architecture Perspective

Interactive Information Management

The Chief Marketing Technology Officer (CMTO) is recently an often-proposed role, that combines the interactive marketing savvy and experience of a Chief Marketing Officer (CMO) and the traditional information technology operations, management and investment knowledge of a CIO or CTO.

Fixing Sync Problems with SkyDrive Pro

JKevinParker

I had major problems with my SkyDrive Pro sync for Office 365.

IT 52

More Trending

Data, data everywhere! Where it comes from, nobody really knows?

Data Loss DB

While there are still a few weeks left in 2013, it has already been the most severe in terms of data breaches in the last 10 years with over 705 million records lost. In addition, 4 of the top 10 data breaches of all time happened in 2013, with the top spot now belonging to Adobe (at least for the moment). The Adobe breach was discovered and brought to light by Brian Krebs and information security researcher Alex Holden back in October ( Brian Krebs is an Advisor to Alex Holden’s company).

The Reality of HIPAA Violations and Enforcement

HIPAA

Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law. The real HIPAA enforcement agency is the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR).

CMS 39

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit. The exploit is notable because it is against 64-bit Linux.

Video 31

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual.

Tips 114

Behind the Banner, A Visualization of the Adtech Ecosystem

John Battelle's Searchblog

The post Behind the Banner, A Visualization of the Adtech Ecosystem appeared first on John Battelle's Search Blog.

The overconfidence problem

Collaboration 2.0

The cult of me continues.data from a survey of US freshmen shows increasing perceptions of being 'above average': Are they deluded or the greatest generation

Self-service checkouts - love them or hate them, its all about the customer

ChiefTech

Self-service checkouts in supermarkets and other retails shop fronts are fascinating on so many levels - from their design to the ethical dilemma of replacing people with machines.

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

Saving a SharePoint 2010 Site as a Template

JKevinParker

Perhaps the easiest way to create a standard site template for your organization's SharePoint 2010 solution is to build a site in the browser, get it just right, and save it as a template.

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements.

Looking Through the Cloudy PRISM

Data Loss DB

As you have no doubt heard, a lot of fuss has been made over the past couple days involving both NSA, Verizon, and Facebook, as well as several other companies and governments. Here, we want to provide a concise overview of the information available at this point, along with some links to additional reading about the program that is known as “PRISM”.

Gmail, Google Apps for Business HIPAA Business Associate Agreements

HIPAA

The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.”

Want to See How Detroit Is Coming Back?

John Battelle's Searchblog

The post Want to See How Detroit Is Coming Back? appeared first on John Battelle's Search Blog. Tonight I checked into my hotel room in Chicago as part of my regular cadence of visiting FM’s offices around the country.

On Coming Back to FMP

John Battelle's Searchblog

The post On Coming Back to FMP appeared first on John Battelle's Search Blog. Starting a business is a journey, as any founder will tell you.

Blog 114

It’s Time To Call Out Fraud In The Adtech Ecosystem

John Battelle's Searchblog

The post It’s Time To Call Out Fraud In The Adtech Ecosystem appeared first on John Battelle's Search Blog. A confusing landscape = ripe opportunities for fraud.

Video 114

Harley Earl's influence on Steve Jobs

Collaboration 2.0

Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run. Apple

IT 91

Tyco International case study - replacing your intranet with Yammer

ChiefTech

Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

Choosing an Internet, Digital Interactive Marketing Services Partner - Interviews and RFP/RFIs

Interactive Information Management

How to evaluate your digital, interactive marketing partner, for local and regional businesses - particularly in the Washington DC and Northern Virginia marketing and advertising area. We'll put it out there – as you evaluate prospective partners like KME Internet Marketing to help with web marketing initiatives, gaining exposure for your business and driving new sales from the Internet, this is exactly what you should seek.

Star Award: Employee of the Year

JKevinParker

I was honored by my current employer, T. White Parker (no relation), to be given their "Star Award" as employee of the year for 2013. This award is for "dedication and outstanding contribution". This firm has taught me a lot about management consulting and federal contracting. I feel I have taught them some things, also, about information management and technology.

Hunton Hosts Department of Commerce Data Privacy Speakers

Hunton Privacy

On September 30, 2013, Hunton & Williams LLP hosted representatives from the U.S.

Facebook Is No Longer Flat: On Graph Search

John Battelle's Searchblog

The post Facebook Is No Longer Flat: On Graph Search appeared first on John Battelle's Search Blog. A sample Graph Search result for the query “friends photos before 1999.”

Course 114

Five Steps to HIPAA Security Compliance

HIPAA

The health insurance portability and accountability act has set various guidelines, which should be adhered to by anyone who handles any electronic medical data. These guidelines stipulate that all medical practices must ensure that all necessary measures are in place while saving, accessing and sharing any electronic medical data to keep patient data secure. Lack of compliance to the HIPAA security standards could lead to large fines and in extreme cases even loss of medical licenses.

Yahoo! And Tumblr: It’s About Display, Streams & Native at Scale

John Battelle's Searchblog

The post Yahoo! And Tumblr: It’s About Display, Streams & Native at Scale appeared first on John Battelle's Search Blog. The world is atwitter about Tumblr’s big exit to Yahoo!, and from what I can tell it seems this one is going to really happen (ATD is covering it well).

IT 113

A Month In With The Nexus 4: Google Strengths Emerge

John Battelle's Searchblog

The post A Month In With The Nexus 4: Google Strengths Emerge appeared first on John Battelle's Search Blog. It’s been a month or so since I bailed on the iPhone and went all in on Google’s flagship Nexus 4.

Cloud 114

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

The post Portrait of Twitter As A Young Media Company appeared first on John Battelle's Search Blog. Last year I predicted that Twitter would become a media company. However, I focused mainly on the new “ Discover ” functionality, and I probably should have gone a lot further.

Video 113

4D printing: The new frontier

Collaboration 2.0

Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials

89