Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact

John Battelle's Searchblog

The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero.

Retail 114

Baja con Amigos


In 2008 I met Kris Krug. We share several auspiciously random overlapping networks, and since 2008 our friendship has blossomed into a deep personal friendship and working collaboration.

4D printing - the new frontier

Collaboration 2.0

Autodesk, academia and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials


SAP SuccessFactors raise the user experience bar for a digital workplace


Yesterday I attended day 1 of SAP SuccessFactor''s SuccessConnect conference in Sydney. I was there to learn more about SAP''s roadmap for its enterprise social software offering (SAP Jam) and also to see how well it currently extends into the broader SAP''s HR technology ecosystem.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

DB2 for z/OS Work: the Task's the Thing

Robert's Db2

To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.

Blog 60

More Trending

Fixing Sync Problems with SkyDrive Pro


I had major problems with my SkyDrive Pro sync for Office 365.

IT 52

Federal Court: Non-Public Facebook Wall Posts Are Protected Under the Federal Stored Communications Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , 2:11-CV-3305 (WMJ) (D.N.J. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp. MONOC”).

Data, data everywhere! Where it comes from, nobody really knows?

Data Loss DB

While there are still a few weeks left in 2013, it has already been the most severe in terms of data breaches in the last 10 years with over 705 million records lost. In addition, 4 of the top 10 data breaches of all time happened in 2013, with the top spot now belonging to Adobe (at least for the moment). The Adobe breach was discovered and brought to light by Brian Krebs and information security researcher Alex Holden back in October ( Brian Krebs is an Advisor to Alex Holden’s company).

The Reality of HIPAA Violations and Enforcement


Who is ultimately responsible for enforcement of HIPAA and what types of penalties are levied when a covered entity or business associate is found to be non-compliant with the regulations? Many healthcare offices and their staff don’t know the answer to this question; they have only a vague notion about the enforcement and the consequences of not adhering to the law. The real HIPAA enforcement agency is the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR).

CMS 39

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Meaningful Outcomes


Meaningful Outcomes. shobana.lv@cgi.com. Tue, 12/17/2013 - 05:45. It’s long been fashionable for us to knowingly advise each other to focus on outcomes. This is just common sense, so it’s hard to fault. But there’s an angle on outcomes which is usually overlooked.

Google Now: The Tip of A Very Long Spear

John Battelle's Searchblog

The post Google Now: The Tip of A Very Long Spear appeared first on John Battelle's Search Blog. Yesterday my co-author and I traveled down to Google, a journey that for me has become something of a ritual.

Tips 114

A Copernican Shift In Our Economic Thinking


Eversince I read Kalle Lasn's (Adbusters Founder) book "Culture Jam: The Uncooling of America" I've been fascinated with his anti consumer stance.


The overconfidence problem

Collaboration 2.0

The cult of me continues.data from a survey of US freshmen shows increasing perceptions of being 'above average': Are they deluded or the greatest generation

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Self-service checkouts - love them or hate them, its all about the customer


Self-service checkouts in supermarkets and other retails shop fronts are fascinating on so many levels - from their design to the ethical dilemma of replacing people with machines.

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 2)

Robert's Db2

In part one of this two-part blog entry, I pointed out that the notion that one cannot control a DB2 for z/OS client-server workload as one can a local-to-DB2 application is quite outdated, and I described a couple of the mechanisms (native SQL procedures, and roles and trusted contexts) by which a DB2 DDF workload can be controlled. In this part two entry, I'll cover some of the other available options for conforming DB2 client-server activity to organizational requirements.

Anatomy of a Crowdsourced Startup Funding Fail - 8 Recommendations for Marketing Successful KickStarter Campaigns

Interactive Information Management

This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.

Saving a SharePoint 2010 Site as a Template


Perhaps the easiest way to create a standard site template for your organization's SharePoint 2010 solution is to build a site in the browser, get it just right, and save it as a template.

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements.

Looking Through the Cloudy PRISM

Data Loss DB

As you have no doubt heard, a lot of fuss has been made over the past couple days involving both NSA, Verizon, and Facebook, as well as several other companies and governments. Here, we want to provide a concise overview of the information available at this point, along with some links to additional reading about the program that is known as “PRISM”.

Exploiting 64-bit Linux like a boss

Scary Beasts Security

Back in November 2012, a Chrome Releases blog post mysteriously stated: "Congratulations to Pinkie Pie for completing challenge: 64-bit exploit". Chrome patches and autoupdates bugs pretty fast but this is a WebKit bug and not every consumer of WebKit patches bugs particularly quickly. So I've waited a few months to release a full breakdown of the exploit. The exploit is notable because it is against 64-bit Linux.

Video 31

Enabling Enterprise Manoeuvrability with EIM


Enabling Enterprise Manoeuvrability with EIM. narmada.devarajan. Thu, 11/07/2013 - 00:18. The Agility Challenge. Since the 1990’s, Agile methodologies have gained credibility in project delivery.

B2C 52

Behind the Banner, A Visualization of the Adtech Ecosystem

John Battelle's Searchblog

The post Behind the Banner, A Visualization of the Adtech Ecosystem appeared first on John Battelle's Search Blog.

SXSW 2013 Highlights: Kurt Daradics & Stephen Wolfram


Everyday fun in Austin, bumping into one of my favorite minds of our time, Stephen Wolfram. Stephen's SXSW keynote was remarkable. You can read it here in 10 mins. His vision for the future ( Principal of Computational Equivalence ) is pretty wild. His ability to articulate his vision, and his body of work is undoubtably impressive. Stephen announced a new programing language called "Wolfram" (.wolf

Cloud 56

Harley Earl's influence on Steve Jobs

Collaboration 2.0

Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run. Apple

IT 90

Tyco International case study - replacing your intranet with Yammer


Unlike most of the Yammer case studies I've seen, Tyco International set out with the deliberate objective of replacing their traditional static intranet with Yammer, in order to create a social intranet. This video provides an introduction to the Tyco case study: There is further detail in this presentation: Tyco Transformed: A Case Study from Yammer.

Bringing Control to a DB2 for z/OS Client-Server Workload (Part 1)

Robert's Db2

At System z sites all over the world, DB2 for z/OS workloads are growing -- often at a brisk clip. You'd think that this would be unqualified good news for the folks who support mainframe DB2 subsystems , but in fact some people view a lot of this new DB2 activity with trepidation. Because the lion's share of application work being implemented these days on a DB2 for z/OS foundation is of the client-server variety.

Choosing an Internet, Digital Interactive Marketing Services Partner - Interviews and RFP/RFIs

Interactive Information Management

How to evaluate your digital, interactive marketing partner, for local and regional businesses - particularly in the Washington DC and Northern Virginia marketing and advertising area. We'll put it out there – as you evaluate prospective partners like KME Internet Marketing to help with web marketing initiatives, gaining exposure for your business and driving new sales from the Internet, this is exactly what you should seek.

Star Award: Employee of the Year


I was honored by my current employer, T. White Parker (no relation), to be given their "Star Award" as employee of the year for 2013. This award is for "dedication and outstanding contribution". This firm has taught me a lot about management consulting and federal contracting. I feel I have taught them some things, also, about information management and technology.

Hunton Hosts Department of Commerce Data Privacy Speakers

Hunton Privacy

On September 30, 2013, Hunton & Williams LLP hosted representatives from the U.S.

Gmail, Google Apps for Business HIPAA Business Associate Agreements


The Health Insurance Portability and Accountability of Act demands that all HIPAA covered businesses prevent unauthorized access to “Protected Health Information” or PHI. PHI includes patients’ names, addresses, and all information pertaining to the patients’ health and payment records. According to the Department of Health and Human Services, “ HIPAA Rules apply to covered entities and business associates.”

On Coming Back to FMP

John Battelle's Searchblog

The post On Coming Back to FMP appeared first on John Battelle's Search Blog. Starting a business is a journey, as any founder will tell you.

Blog 114