Quarantining Facebook to control tracking
Collaboration 2.0
JULY 3, 2012
By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.
Collaboration 2.0
JULY 3, 2012
By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.
John Battelle's Searchblog
JULY 13, 2012
Google was kind enough to send me a Nexus 7 tablet to play with last month, and over the past week or so I’ve had the chance to actually put it to use. Even though I own an iPad, I have serious reservations about the constraints of Apple’s iOS ecosystem (more on that below), so I was eager to see how Google’s alternative performed.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ChiefTech
JULY 6, 2012
Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.
Robert's Db2
JULY 29, 2012
The other day, I got a note from a mainframe DB2 DBA who'd seen a system requirement for DB2 10 that had him concerned. This DBA, whose company was preparing for the migration of their DB2 9 subsystems to DB2 10, had read the following in the text of IBM APAR II14564 (an "info" APAR that documents some DB2 9-to-10 migration and fallback considerations): REAL STORAGE CONSIDERATION Ensure that you have defined a high enough value for HVSHARE. to satisfy all requests on this LPAR.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Hunton Privacy
JULY 30, 2012
On July 10, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released a statement on outsourced cloud computing activities. The statement, which was prepared by the FFIEC Information Technology Subcommittee, discusses key risk considerations associated with using third-party vendors to implement cloud computing solutions, and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
JULY 17, 2012
Both global giants aspire to provide the complete underpinnings of your digital social and work life, and that lifestyle is changing very fast indeed.
John Battelle's Searchblog
JULY 25, 2012
A posting (and responses) on GM’s Facebook Wall, July 2012 When you visit Joel Ewanick, CMO of GM, in his offices in Detroit, the first thing you notice is that unlike most C-suite executives, he’s not on the 39th floor of GM’s Renaissance Center headquarters (the highest floor). Instead, you exit the elevators on the 24th floor, less than two thirds up the building.
ChiefTech
JULY 2, 2012
I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.
Robert's Db2
JULY 12, 2012
Recently I got a question from a mainframer who was seeing rather high CPU times for the DB2 DDF address space. DDF, of course, is the distributed data facility -- the DB2 component that handles communications with client systems (usually application servers) that send requests to the DB2 for z/OS server using the DRDA protocol (DRDA being Distributed Relational Database Architecture).
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Hunton Privacy
JULY 27, 2012
On July 26, 2012, acting U.S. Secretary of Commerce Rebecca Blank announced that APEC’s Joint Oversight Panel has approved the United States’ request to participate in the APEC Cross-Border Privacy Rules System. The panel also approved the Federal Trade Commission’s participation as the system’s first privacy enforcement authority. The next step will be for the United States to nominate one or more accountability agents for the panel’s approval.
Privacy and Cybersecurity Law
JULY 13, 2012
Today is Friday 13th; so timely to consider the news stories this week saying that Google will soon be fronting up to […].
Collaboration 2.0
JULY 26, 2012
Bitter licensing and support memories may be a bigger impediment to adoption of the enterprise old guard's next generation product offerings than they realize, especially given third party options for legacy support, which can provide savings that can be applied to future customer innovation initiatives.
John Battelle's Searchblog
JULY 18, 2012
Mayer at the Web 2 Summit, San Francisco ( image James Duncan Davidson ) I try to let big news percolate for a few days before weighing in, and it seemes even more appropriate to follow that playbook when it came to the scrum around Marissa Mayer joining Yahoo. Yes, I’ve known both Marissa Mayer (and Ross Levinsohn) professionally, for more than a decade, but so do many other folks, and it seems nearly all of them – Steven Levy and Kara Swisher intelligently among them – have w
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
ChiefTech
JULY 15, 2012
via youtube.com. Kurt De Ruwe is CIO of Bayer MaterialScience and he explains in this video how they are using IBM Connections to be more social internally. Earlier in June, he tweeted that: Today I have 4 of our 9 board members writing 1 to 2 microblogs per week on our internal ?#IBMConnections? platform. Just 5 more to onboard. You can read more about the Bayer story in this Forbes article by Mark Fidelman : De Ruwe’s has been able to get 66% of Bayer Material Science employees using the
Preservica
JULY 12, 2012
Organisations are realising that it is business critical to archive digital information for several years. Ensuring archived information can be accessed when the need arises is key, as is creating value from assets that are archived. The term “Digital Archive” is however used to cover many different types of solution for this problem. Our latest paper provides a way of categorising these different approaches to enable organisations to understand the differences and to select the best solution fo
Hunton Privacy
JULY 27, 2012
On July 24, 2012, a bipartisan group of eight members of Congress sent letters to nine major data brokerage companies requesting information on how the companies collect, assemble and sell consumer information to third parties. Representatives Ed Markey (D-MA) and Joe Barton (R-TX), who serve as co-chairmen of the Bipartisan Congressional Privacy Caucus, are leading the inquiry.
Privacy and Cybersecurity Law
JULY 7, 2012
Privacy debates in connection with cloud computing often generate more heat than light! Some regulators (not in the UK!) have […].
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Collaboration 2.0
JULY 12, 2012
A terrific book about how the planet is wired for multimedia and data, the locations, sights and smells of global to local internet infrastructure.
John Battelle's Searchblog
JULY 24, 2012
Look, I’m not exactly a huge fan of grimy greenbacks, but I do feel a need to point out something that most coverage of current Valley darling Square seems to miss: The “ Death of Cash ” also means the “death of anonymous transactions” – and no matter your view of the role of government and corporations in our life, the very idea that we might lose the ability to transact without the creation of a record merits serious discussion.
ChiefTech
JULY 13, 2012
via johnstepper.com. A great explanation from John Stepper about how we use social business platforms for "working out loud", "observable work" and "narrating your work" in the workplace. These are simple but powerful ideas that underpin the value of social intranets and enterprise social networks. He writes in his introduction (emphasis added): Two of the most common objections I hear are “I don’t have enough time” and “I don’t know what to post.
Interactive Information Management
JULY 3, 2012
Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Hunton Privacy
JULY 26, 2012
As reported in BNA’s Privacy & Security Law Report ,on June 25, 2012, a federal district court in California ruled that the California Supreme Court’s 2011 Pineda decision , which held that requesting and recording zip codes during credit card transactions violates the state’s Song-Beverly Credit Card Act, applies retrospectively to OfficeMax’s collection of zip codes from its customers.
Scary Beasts Security
JULY 4, 2012
[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.
Privacy and Cybersecurity Law
JULY 3, 2012
In a press release entitled “Harper Government Says No to Fees on Memory Cards”, Minister of Industry Christian Paradis announced the […].
John Battelle's Searchblog
JULY 18, 2012
David Gelernter of Yale ( image Edge.org ) A month or so ago I had the pleasure of sitting down with Valley legend Marc Andreessen , in the main for the purpose of an interview for my slowly-developing-but-still-moving-forward book. At that point, I had not begun re-reading David Gelernter’s 1991 classic Mirror Worlds: or the Day Software Puts the Universe in a Shoebox…How It Will Happen and What It Will Mean.
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
ChiefTech
JULY 15, 2012
I’m sure some users would get plenty of value from just being able to see updates happening in Yammer along with all the other data that [Newsgator] Social Sites can bring together (and we have some very cool features coming that make it extremely powerful to aggregate all the social data in one spot). But when we add in the potential to take an item from any external system (including Yammer), allow for editing, tagging, and workflow, and generate a wiki page in SharePoint from it, I think we g
Interactive Information Management
JULY 2, 2012
The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.
Hunton Privacy
JULY 23, 2012
Lisa Sotto , partner and head of the Global Privacy and Data Security Practice at Hunton & Williams, was interviewed on July 18, 2012 about her participation in the USAID-funded Judicial Reform and Government Accountability Project’s initiative to educate and provide data protection awareness to the Serbian government. As we reported last week, Sotto was invited to Belgrade to assist Rodoljub Sabic, Serbia’s Commissioner for Information of Public Importance and Personal Data Protection, and
Let's personalize your content