This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Collective business collaboration is very different to our individual digital interaction choices: how do we leverage past generations of training technologies to align with new opportunities to define and formalize the best ways to work together, and which CxO group should be responsible for this, or should this be a cross enterprise initiative?
If Facebook’s IPO filing does anything besides mint a lot of millionaires, it will be to shine a rather unsettling light on a fact most of us would rather not acknowledge: The web as we know it is rather like our polar ice caps: under severe, long-term attack by forces of our own creation. And if we lose the web, well, we lose more than funny cat videos and occasionally brilliant blog posts.
As a mainframe DB2 guy, I'm bullish on stored procedures -- I've presented on the topic at international conferences and regional user group meetings , written about stored procedures for the old DB2 Magazine (now known as IBM Data Magazine ), and posted many a related entry to my DB2 blogs, both this blog (an example being an entry from August of last year ) and the one I maintained while working as an independent DB2 consultant (included among these is part 1 of a 3-part entry on stored proced
NuCaptcha is the first widely deployed video captcha scheme. Since Technology Review interviewed me about NuCaptcha in October 2010, I have been working on evaluating its security and usability.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
The Digital Advertising Alliance (“DAA”) recently announced that its members will work “to add browser-based header signals to the set of tools by which consumers can express their preferences” not to be tracked online and will work with browser providers to develop “consistent language across browsers…that describes to consumers the effect of exercising such choice.”.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Designing quality business strategy that realizes the power of modern technologies requires alignment with traditional business values; the siren song of projected futurism can look embarrassingly naive in hindsight
The news alert from the Wall St. Journal hit my phone about an hour ago, pulling me away from tasting “ Texas Bourbon ” in San Antonio to sit down and grok this headline: Google’s iPhone Tracking. Now, the headline certainly is attention-grabbing, but the news alert email had a more sinister headline: “Google Circumvented Web-Privacy Safeguards.” Wow!
So, last week I posted a blog entry describing one of the two really important (in my opinion) DB2 10 for z/OS enhancements related to LOB (large object) data management -- that being the ability to "in-line" a portion (or even all) of a LOB column's data values in a base table space, alongside the associated table's non-LOB data values (this as opposed to having to store all of every LOB value in a LOB table space that -- while logically transparent -- is physically distinct from a table's base
The PASIG event was really useful, thanks to everyone who came along and made it such a productive occasion - it is a pleasure to sponsor such elite events. Thank you also to the people who gave such positive feedback on Mark Evans' talks - we will be making them available on line in the near future.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On January 25, 2012, the UK Information Commissioner’s Office (“ICO”) published an initial statement welcoming the European Commission’s proposed new General Data Protection Regulation (the “Proposed Regulation”), and commended the Commission’s efforts to strengthen the rights of individuals, recognize important privacy concepts such as privacy by design and privacy impact assessments, and include accountability requirements.
Flash on Linux hasn't always been the best experience in the stability and security departments. Users of 64-bit Linux, in particular, have to put up with NSPluginWrapper , a technology which bridges a 64-bit browser process to the 32-bit Flash library. In terms of sandboxing, your distribution might slap a clunky SELinux or AppArmor policy on Flash, but it may or may not be on by default.
Who remembers the moment, back in 1995, when Bill Gates wrote his famous Internet Tidal Wave Memo ? In it he rallied his entire organization to the cause of the Internet, calling the new platform an existential threat/opportunity for Microsoft’s entire business. In the memo Gates wrote: “I assign the Internet the highest level of importance.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
We’re in for more cloud/SaaS merger and acquisitions this year; will continued innovation triumph over old guard purchase integrations, and do the customers and prospects care as much as the financial markets think they do?
We’re in for more cloud/SaaS merger and acquisitions this year. Will continued innovation triumph over old guard purchase integrations? And do the customers and prospects care as much as the financial markets think they do?
Your on the job contributions in collaborative environments are much more protected than elsewhere digitally, but getting credit for ideas is critical to continued use pattterns
Over the weekend I finished Larry Lessig’s most recent (and ambitious) book, Republic, Lost: How Money Corrupts Congress–and a Plan to Stop It. Amongst those of us who considered Lessig our foremost voice on issues of Internet policy, his abrupt pivot to focus on government corruption was both disorienting and disheartening: here was our best Internet thinker, now tilting at government windmills.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
In the normal course of research for the book, I wondered how quickly mobile phone use got to the 1 billion mark. I figured we’re well past that number now, but I had no idea how far past it we’ve blown.Like, six times past it. We hit 1 billion in the year 2000, and never looked back. According to the ITU , nearly 90% of people in the world use mobile phones.
I had the news on in the background while performing morning ablutions. It was tuned to CBS This Morning – Charlie Rose has recently joined the lineup and my wife, a former news producer, favors both Rose and the Tiffany Network. But the piece that was running as I washed the sleep from my eyes was simply unbelievable. It was about the two unfortunate british tourists detained by Homeland Security over jokes on Twitter about “destroying America” (a colloquialism for partying &#
I’m still in recovery mode after the wave of Apple-defenders inundated me with privacy-related comments over this past weekend, and I promise to continue the dialog – and admit where I may be wrong – once I feel I’ve properly grokked the story. The issue of privacy as it relates to the Intenet is rather a long piece of yarn, and I’m only a small part of the way toward unraveling this particular sweater.
( image ) I don’t have Siri yet – I’m still using my “old” iPhone 4. But I do have my hands on a new (unboxed) Nexus, which has Google Voice Actions on it, and I’m sure at some point I’ll get a iPhone 4GS. So this post isn’t written from experience as much as it’s pure speculation, or as I like to call it, Thinking Out Loud.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Not since Google’s 2004 filing have so many journalists sped-read one document at the same time, eager to glean any possible insight unique to their particular point of view or publication and rush to post it before anyone else. Yes, I’m one of those journalists, I suppose, but I know I have to read this thing for any number of reasons, so I may as well use the race as an excuse to force myself into action.
I promise, for at least 18 months, to not bring this topic up again. But I do feel the need to report to all you RSS lovin’ freaks out there that the combined interactions on my two posts – 680 and still counting – have exceeded the reach of my RSS feed (which clocked in at a miserable 664 the day I posted the first missive). And as I said in my original post: If I get more comments and tweets on this post than I have “reach” by Google Feedburner status, well, that’s enough f
My research manager turned up this gem in the course of answering a question I had about the popular response to the introduction of the telegraph in the US (a moment that informs the working title of my next book ). What I find fascinating is how the invention incited an innate religious response (this editorial from a local Albany, NY newspaper is in no way unique).
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
It took longer than I thought it would, but it’s finally happened. Apple’s admitted that it needs real search to bring it’s tangled app universe to heel, and purchased Chomp , a leading third-party app review and search service. Nearly two years ago I wrote this piece: Apple Won’t Build a (Web) Search Engine. From it: …but it will build the equivalent of an app search engine.
Yahoo has always been proud of the algorithms that drive its choice of personalized content, but it’s hard to grok exactly what they do behind the scenes to make the magic happen. Today the company released a visualization of its “C.O.R.E.” (Content Optimization and Relevance Engine) technology, and the result is pretty cool. From a release sent to me by Yahoo: C.O.R.E.
( image ) Waaaay back in January of this year , in my annual predictions, I offered a conjecture that seemed pretty orthogonal to my usual focus: “China will be caught spying on US corporations, especially tech and commodity companies. Somewhat oddly, no one will (seem to) care.” Well, I just got this WSJ news alert , which reports: Using seven passwords stolen from top Nortel executives, including the chief executive, the hackers—who appeared to be working in China—penetrated Nortel
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content