July, 2012

article thumbnail

Quarantining Facebook to control tracking

Collaboration 2.0

By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.

IT 265
article thumbnail

The Nexus 7 and The Cloud Commit Conundrum: Google Wins (For Now)

John Battelle's Searchblog

Google was kind enough to send me a Nexus 7 tablet to play with last month, and over the past week or so I’ve had the chance to actually put it to use. Even though I own an iPad, I have serious reservations about the constraints of Apple’s iOS ecosystem (more on that below), so I was eager to see how Google’s alternative performed.

Cloud 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social business is more than adding a social layer: A banking example

ChiefTech

Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.

article thumbnail

DB2 10 (and 9) for z/OS: I Need 128 GB of WHAT?

Robert's Db2

The other day, I got a note from a mainframe DB2 DBA who'd seen a system requirement for DB2 10 that had him concerned. This DBA, whose company was preparing for the migration of their DB2 9 subsystems to DB2 10, had read the following in the text of IBM APAR II14564 (an "info" APAR that documents some DB2 9-to-10 migration and fallback considerations): REAL STORAGE CONSIDERATION Ensure that you have defined a high enough value for HVSHARE. to satisfy all requests on this LPAR.

IT 48
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

FFIEC Issues Statement on Cloud Computing

Hunton Privacy

On July 10, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released a statement on outsourced cloud computing activities. The statement, which was prepared by the FFIEC Information Technology Subcommittee, discusses key risk considerations associated with using third-party vendors to implement cloud computing solutions, and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.

Cloud 40

More Trending

article thumbnail

Microsoft vs Google: Game on

Collaboration 2.0

Both global giants aspire to provide the complete underpinnings of your digital social and work life, and that lifestyle is changing very fast indeed.

257
257
article thumbnail

My, How the CMO Has Changed

John Battelle's Searchblog

A posting (and responses) on GM’s Facebook Wall, July 2012 When you visit Joel Ewanick, CMO of GM, in his offices in Detroit, the first thing you notice is that unlike most C-suite executives, he’s not on the 39th floor of GM’s Renaissance Center headquarters (the highest floor). Instead, you exit the elevators on the 24th floor, less than two thirds up the building.

Marketing 104
article thumbnail

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.

Cloud 65
article thumbnail

DB2 for z/OS: What's With DDF CPU Time?

Robert's Db2

Recently I got a question from a mainframer who was seeing rather high CPU times for the DB2 DDF address space. DDF, of course, is the distributed data facility -- the DB2 component that handles communications with client systems (usually application servers) that send requests to the DB2 for z/OS server using the DRDA protocol (DRDA being Distributed Relational Database Architecture).

Access 48
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

United States Approved for Participation in APEC Cross-Border Privacy Rules System

Hunton Privacy

On July 26, 2012, acting U.S. Secretary of Commerce Rebecca Blank announced that APEC’s Joint Oversight Panel has approved the United States’ request to participate in the APEC Cross-Border Privacy Rules System. The panel also approved the Federal Trade Commission’s participation as the system’s first privacy enforcement authority. The next step will be for the United States to nominate one or more accountability agents for the panel’s approval.

Privacy 40
article thumbnail

It’s Friday 13th! Time to consider the cost of getting privacy wrong

Privacy and Cybersecurity Law

Today is Friday 13th; so timely to consider the news stories this week saying that Google will soon be fronting up to […].

Privacy 40
article thumbnail

Enterprise licensing & support maze fatigue may undermine the old guard's next generation products

Collaboration 2.0

Bitter licensing and support memories may be a bigger impediment to adoption of the enterprise old guard's next generation product offerings than they realize, especially given third party options for legacy support, which can provide savings that can be applied to future customer innovation initiatives.

177
177
article thumbnail

On Mayer, Yahoo!, and The (Other) Customer

John Battelle's Searchblog

Mayer at the Web 2 Summit, San Francisco ( image James Duncan Davidson ) I try to let big news percolate for a few days before weighing in, and it seemes even more appropriate to follow that playbook when it came to the scrum around Marissa Mayer joining Yahoo. Yes, I’ve known both Marissa Mayer (and Ross Levinsohn) professionally, for more than a decade, but so do many other folks, and it seems nearly all of them – Steven Levy and Kara Swisher intelligently among them – have w

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Social Collaboration at Bayer with IBM Connections

ChiefTech

via youtube.com. Kurt De Ruwe is CIO of Bayer MaterialScience and he explains in this video how they are using IBM Connections to be more social internally. Earlier in June, he tweeted that: Today I have 4 of our 9 board members writing 1 to 2 microblogs per week on our internal ?#IBMConnections? platform. Just 5 more to onboard. You can read more about the Bayer story in this Forbes article by Mark Fidelman : De Ruwe’s has been able to get 66% of Bayer Material Science employees using the

58
article thumbnail

Digital archiving maturity model

Preservica

Organisations are realising that it is business critical to archive digital information for several years. Ensuring archived information can be accessed when the need arises is key, as is creating value from assets that are archived. The term “Digital Archive” is however used to cover many different types of solution for this problem. Our latest paper provides a way of categorising these different approaches to enable organisations to understand the differences and to select the best solution fo

article thumbnail

Congress Investigates Data Brokers’ Use of Consumer Information

Hunton Privacy

On July 24, 2012, a bipartisan group of eight members of Congress sent letters to nine major data brokerage companies requesting information on how the companies collect, assemble and sell consumer information to third parties. Representatives Ed Markey (D-MA) and Joe Barton (R-TX), who serve as co-chairmen of the Bipartisan Congressional Privacy Caucus, are leading the inquiry.

article thumbnail

Supreme Court decision on fair dealing

Privacy and Cybersecurity Law

Today the Supreme Court of Canada determined that 30 second previews of songs offered by online music services constitute “fair dealing […].

40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

'Tubes' - a tactile tour of the internet

Collaboration 2.0

A terrific book about how the planet is wired for multimedia and data, the locations, sights and smells of global to local internet infrastructure.

176
176
article thumbnail

What We Lose When We Glorify “Cashless”

John Battelle's Searchblog

Look, I’m not exactly a huge fan of grimy greenbacks, but I do feel a need to point out something that most coverage of current Valley darling Square seems to miss: The “ Death of Cash ” also means the “death of anonymous transactions” – and no matter your view of the role of government and corporations in our life, the very idea that we might lose the ability to transact without the creation of a record merits serious discussion.

article thumbnail

John Stepper explains "Working out loud"

ChiefTech

via johnstepper.com. A great explanation from John Stepper about how we use social business platforms for "working out loud", "observable work" and "narrating your work" in the workplace. These are simple but powerful ideas that underpin the value of social intranets and enterprise social networks. He writes in his introduction (emphasis added): Two of the most common objections I hear are “I don’t have enough time” and “I don’t know what to post.

article thumbnail

Google Penguin, Twitter, and Keyword Research

Interactive Information Management

Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

California Supreme Court’s Pineda Decision Applies Retrospectively to ZIP Code Collection Class Action Suit

Hunton Privacy

As reported in BNA’s Privacy & Security Law Report ,on June 25, 2012, a federal district court in California ruled that the California Supreme Court’s 2011 Pineda decision , which held that requesting and recording zip codes during credit card transactions violates the state’s Song-Beverly Credit Card Act, applies retrospectively to OfficeMax’s collection of zip codes from its customers.

Sales 40
article thumbnail

New European A29 Guidance on “Privacy in the Cloud”

Privacy and Cybersecurity Law

Privacy debates in connection with cloud computing often generate more heat than light! Some regulators (not in the UK!) have […].

Cloud 40
article thumbnail

Chrome 20 on Linux and Flash sandboxing

Scary Beasts Security

[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.

article thumbnail

First, Software Eats the World, Then, The Mirror World Emerges

John Battelle's Searchblog

David Gelernter of Yale ( image Edge.org ) A month or so ago I had the pleasure of sitting down with Valley legend Marc Andreessen , in the main for the purpose of an interview for my slowly-developing-but-still-moving-forward book. At that point, I had not begun re-reading David Gelernter’s 1991 classic Mirror Worlds: or the Day Software Puts the Universe in a Shoebox…How It Will Happen and What It Will Mean.

Mining 97
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Crossing the streams with Newsgator & Yammer

ChiefTech

I’m sure some users would get plenty of value from just being able to see updates happening in Yammer along with all the other data that [Newsgator] Social Sites can bring together (and we have some very cool features coming that make it extremely powerful to aggregate all the social data in one spot). But when we add in the potential to take an item from any external system (including Yammer), allow for editing, tagging, and workflow, and generate a wiki page in SharePoint from it, I think we g

IT 54
article thumbnail

A Common Approach to Federal Enterprise Architecture - Actionable Solutions

Interactive Information Management

The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.

article thumbnail

Hunton & Williams Advises Serbian Commissioner on Data Protection Law

Hunton Privacy

Lisa Sotto , partner and head of the Global Privacy and Data Security Practice at Hunton & Williams, was interviewed on July 18, 2012 about her participation in the USAID-funded Judicial Reform and Government Accountability Project’s initiative to educate and provide data protection awareness to the Serbian government. As we reported last week, Sotto was invited to Belgrade to assist Rodoljub Sabic, Serbia’s Commissioner for Information of Public Importance and Personal Data Protection, and