July, 2012

article thumbnail

Quarantining Facebook to control tracking

Collaboration 2.0

By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.

IT 106
article thumbnail

The Nexus 7 and The Cloud Commit Conundrum: Google Wins (For Now)

John Battelle's Searchblog

Google was kind enough to send me a Nexus 7 tablet to play with last month, and over the past week or so I’ve had the chance to actually put it to use. Even though I own an iPad, I have serious reservations about the constraints of Apple’s iOS ecosystem (more on that below), so I was eager to see how Google’s alternative performed.

Cloud 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social business is more than adding a social layer: A banking example

ChiefTech

Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.

article thumbnail

DB2 10 (and 9) for z/OS: I Need 128 GB of WHAT?

Robert's Db2

The other day, I got a note from a mainframe DB2 DBA who'd seen a system requirement for DB2 10 that had him concerned. This DBA, whose company was preparing for the migration of their DB2 9 subsystems to DB2 10, had read the following in the text of IBM APAR II14564 (an "info" APAR that documents some DB2 9-to-10 migration and fallback considerations): REAL STORAGE CONSIDERATION Ensure that you have defined a high enough value for HVSHARE. to satisfy all requests on this LPAR.

IT 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FFIEC Issues Statement on Cloud Computing

Hunton Privacy

On July 10, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released a statement on outsourced cloud computing activities. The statement, which was prepared by the FFIEC Information Technology Subcommittee, discusses key risk considerations associated with using third-party vendors to implement cloud computing solutions, and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.

Cloud 40

More Trending

article thumbnail

Microsoft vs Google: Game on

Collaboration 2.0

Both global giants aspire to provide the complete underpinnings of your digital social and work life, and that lifestyle is changing very fast indeed.

102
102
article thumbnail

My, How the CMO Has Changed

John Battelle's Searchblog

A posting (and responses) on GM’s Facebook Wall, July 2012 When you visit Joel Ewanick, CMO of GM, in his offices in Detroit, the first thing you notice is that unlike most C-suite executives, he’s not on the 39th floor of GM’s Renaissance Center headquarters (the highest floor). Instead, you exit the elevators on the 24th floor, less than two thirds up the building.

Marketing 104
article thumbnail

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.

Cloud 65
article thumbnail

DB2 for z/OS: What's With DDF CPU Time?

Robert's Db2

Recently I got a question from a mainframer who was seeing rather high CPU times for the DB2 DDF address space. DDF, of course, is the distributed data facility -- the DB2 component that handles communications with client systems (usually application servers) that send requests to the DB2 for z/OS server using the DRDA protocol (DRDA being Distributed Relational Database Architecture).

Access 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

United States Approved for Participation in APEC Cross-Border Privacy Rules System

Hunton Privacy

On July 26, 2012, acting U.S. Secretary of Commerce Rebecca Blank announced that APEC’s Joint Oversight Panel has approved the United States’ request to participate in the APEC Cross-Border Privacy Rules System. The panel also approved the Federal Trade Commission’s participation as the system’s first privacy enforcement authority. The next step will be for the United States to nominate one or more accountability agents for the panel’s approval.

Privacy 40
article thumbnail

It’s Friday 13th! Time to consider the cost of getting privacy wrong

Privacy and Cybersecurity Law

Today is Friday 13th; so timely to consider the news stories this week saying that Google will soon be fronting up to […].

Privacy 40
article thumbnail

Enterprise licensing & support maze fatigue may undermine the old guard's next generation products

Collaboration 2.0

Bitter licensing and support memories may be a bigger impediment to adoption of the enterprise old guard's next generation product offerings than they realize, especially given third party options for legacy support, which can provide savings that can be applied to future customer innovation initiatives.

70
article thumbnail

On Mayer, Yahoo!, and The (Other) Customer

John Battelle's Searchblog

Mayer at the Web 2 Summit, San Francisco ( image James Duncan Davidson ) I try to let big news percolate for a few days before weighing in, and it seemes even more appropriate to follow that playbook when it came to the scrum around Marissa Mayer joining Yahoo. Yes, I’ve known both Marissa Mayer (and Ross Levinsohn) professionally, for more than a decade, but so do many other folks, and it seems nearly all of them – Steven Levy and Kara Swisher intelligently among them – have w

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Social Collaboration at Bayer with IBM Connections

ChiefTech

via youtube.com. Kurt De Ruwe is CIO of Bayer MaterialScience and he explains in this video how they are using IBM Connections to be more social internally. Earlier in June, he tweeted that: Today I have 4 of our 9 board members writing 1 to 2 microblogs per week on our internal ?#IBMConnections? platform. Just 5 more to onboard. You can read more about the Bayer story in this Forbes article by Mark Fidelman : De Ruwe’s has been able to get 66% of Bayer Material Science employees using the

58
article thumbnail

Digital archiving maturity model

Preservica

Organisations are realising that it is business critical to archive digital information for several years. Ensuring archived information can be accessed when the need arises is key, as is creating value from assets that are archived. The term “Digital Archive” is however used to cover many different types of solution for this problem. Our latest paper provides a way of categorising these different approaches to enable organisations to understand the differences and to select the best solution fo

article thumbnail

Congress Investigates Data Brokers’ Use of Consumer Information

Hunton Privacy

On July 24, 2012, a bipartisan group of eight members of Congress sent letters to nine major data brokerage companies requesting information on how the companies collect, assemble and sell consumer information to third parties. Representatives Ed Markey (D-MA) and Joe Barton (R-TX), who serve as co-chairmen of the Bipartisan Congressional Privacy Caucus, are leading the inquiry.

article thumbnail

New European A29 Guidance on “Privacy in the Cloud”

Privacy and Cybersecurity Law

Privacy debates in connection with cloud computing often generate more heat than light! Some regulators (not in the UK!) have […].

Cloud 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

'Tubes' - a tactile tour of the internet

Collaboration 2.0

A terrific book about how the planet is wired for multimedia and data, the locations, sights and smells of global to local internet infrastructure.

70
article thumbnail

What We Lose When We Glorify “Cashless”

John Battelle's Searchblog

Look, I’m not exactly a huge fan of grimy greenbacks, but I do feel a need to point out something that most coverage of current Valley darling Square seems to miss: The “ Death of Cash ” also means the “death of anonymous transactions” – and no matter your view of the role of government and corporations in our life, the very idea that we might lose the ability to transact without the creation of a record merits serious discussion.

article thumbnail

John Stepper explains "Working out loud"

ChiefTech

via johnstepper.com. A great explanation from John Stepper about how we use social business platforms for "working out loud", "observable work" and "narrating your work" in the workplace. These are simple but powerful ideas that underpin the value of social intranets and enterprise social networks. He writes in his introduction (emphasis added): Two of the most common objections I hear are “I don’t have enough time” and “I don’t know what to post.

article thumbnail

Google Penguin, Twitter, and Keyword Research

Interactive Information Management

Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

California Supreme Court’s Pineda Decision Applies Retrospectively to ZIP Code Collection Class Action Suit

Hunton Privacy

As reported in BNA’s Privacy & Security Law Report ,on June 25, 2012, a federal district court in California ruled that the California Supreme Court’s 2011 Pineda decision , which held that requesting and recording zip codes during credit card transactions violates the state’s Song-Beverly Credit Card Act, applies retrospectively to OfficeMax’s collection of zip codes from its customers.

Sales 40
article thumbnail

Chrome 20 on Linux and Flash sandboxing

Scary Beasts Security

[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.

article thumbnail

MicroSD memory cards to be excluded from copyright levies

Privacy and Cybersecurity Law

In a press release entitled “Harper Government Says No to Fees on Memory Cards”, Minister of Industry Christian Paradis announced the […].

article thumbnail

First, Software Eats the World, Then, The Mirror World Emerges

John Battelle's Searchblog

David Gelernter of Yale ( image Edge.org ) A month or so ago I had the pleasure of sitting down with Valley legend Marc Andreessen , in the main for the purpose of an interview for my slowly-developing-but-still-moving-forward book. At that point, I had not begun re-reading David Gelernter’s 1991 classic Mirror Worlds: or the Day Software Puts the Universe in a Shoebox…How It Will Happen and What It Will Mean.

Mining 97
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Crossing the streams with Newsgator & Yammer

ChiefTech

I’m sure some users would get plenty of value from just being able to see updates happening in Yammer along with all the other data that [Newsgator] Social Sites can bring together (and we have some very cool features coming that make it extremely powerful to aggregate all the social data in one spot). But when we add in the potential to take an item from any external system (including Yammer), allow for editing, tagging, and workflow, and generate a wiki page in SharePoint from it, I think we g

IT 54
article thumbnail

A Common Approach to Federal Enterprise Architecture - Actionable Solutions

Interactive Information Management

The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.

article thumbnail

Hunton & Williams Advises Serbian Commissioner on Data Protection Law

Hunton Privacy

Lisa Sotto , partner and head of the Global Privacy and Data Security Practice at Hunton & Williams, was interviewed on July 18, 2012 about her participation in the USAID-funded Judicial Reform and Government Accountability Project’s initiative to educate and provide data protection awareness to the Serbian government. As we reported last week, Sotto was invited to Belgrade to assist Rodoljub Sabic, Serbia’s Commissioner for Information of Public Importance and Personal Data Protection, and