July, 2012

article thumbnail

The Nexus 7 and The Cloud Commit Conundrum: Google Wins (For Now)

John Battelle's Searchblog

Google was kind enough to send me a Nexus 7 tablet to play with last month, and over the past week or so I’ve had the chance to actually put it to use. Even though I own an iPad, I have serious reservations about the constraints of Apple’s iOS ecosystem (more on that below), so I was eager to see how Google’s alternative performed.

Cloud 105
article thumbnail

Microsoft vs Google: Game on

Collaboration 2.0

Both global giants aspire to provide the complete underpinnings of your digital social and work life, and that lifestyle is changing very fast indeed.

102
102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social business is more than adding a social layer: A banking example

ChiefTech

Australia’s big four banks (Commonwealth Bank, Westpac, ANZ and NAB) might well be the most profitable in the developed world, but its all relative in their home markets when they are all jostling for customers. How much is social business playing a part in this competition? It wasn't that long ago that the Australian banking sector was lagging behind the rest of the world.

article thumbnail

DB2 10 (and 9) for z/OS: I Need 128 GB of WHAT?

Robert's Db2

The other day, I got a note from a mainframe DB2 DBA who'd seen a system requirement for DB2 10 that had him concerned. This DBA, whose company was preparing for the migration of their DB2 9 subsystems to DB2 10, had read the following in the text of IBM APAR II14564 (an "info" APAR that documents some DB2 9-to-10 migration and fallback considerations): REAL STORAGE CONSIDERATION Ensure that you have defined a high enough value for HVSHARE. to satisfy all requests on this LPAR.

IT 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FFIEC Issues Statement on Cloud Computing

Hunton Privacy

On July 10, 2012, the Federal Financial Institutions Examination Council (“FFIEC”) released a statement on outsourced cloud computing activities. The statement, which was prepared by the FFIEC Information Technology Subcommittee, discusses key risk considerations associated with using third-party vendors to implement cloud computing solutions, and identifies applicable risk mitigation considerations contained in the various booklets that comprise the FFIEC IT Examination Handbook.

Cloud 40

More Trending

article thumbnail

My, How the CMO Has Changed

John Battelle's Searchblog

A posting (and responses) on GM’s Facebook Wall, July 2012 When you visit Joel Ewanick, CMO of GM, in his offices in Detroit, the first thing you notice is that unlike most C-suite executives, he’s not on the 39th floor of GM’s Renaissance Center headquarters (the highest floor). Instead, you exit the elevators on the 24th floor, less than two thirds up the building.

Marketing 104
article thumbnail

Quarantining Facebook to control tracking

Collaboration 2.0

By using one browser exclusively for Facebook only, it is currently possible to limit their tracking your activities across the broader web.

IT 106
article thumbnail

Socialtext case study of a family-owned, industrial company pushing innovation like a dot com

ChiefTech

I always like to see examples that show the application of mobile + social + cloud in situations beyond the normal office-based knowledgeworker scenarios. In this case, this Webinar from Socialtext provides a case study on Industrial Mold & Machine who are using mobile access to provide access to their social intranet on the shop floor. The Webinar also features Andrew McAfee, who provides context for the case study.

Cloud 65
article thumbnail

DB2 for z/OS: What's With DDF CPU Time?

Robert's Db2

Recently I got a question from a mainframer who was seeing rather high CPU times for the DB2 DDF address space. DDF, of course, is the distributed data facility -- the DB2 component that handles communications with client systems (usually application servers) that send requests to the DB2 for z/OS server using the DRDA protocol (DRDA being Distributed Relational Database Architecture).

Access 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

United States Approved for Participation in APEC Cross-Border Privacy Rules System

Hunton Privacy

On July 26, 2012, acting U.S. Secretary of Commerce Rebecca Blank announced that APEC’s Joint Oversight Panel has approved the United States’ request to participate in the APEC Cross-Border Privacy Rules System. The panel also approved the Federal Trade Commission’s participation as the system’s first privacy enforcement authority. The next step will be for the United States to nominate one or more accountability agents for the panel’s approval.

Privacy 40
article thumbnail

Google Penguin, Twitter, and Keyword Research

Interactive Information Management

Trendspotter Interactive Marketing Article - by Fulcrum Marketing Group Google Penguin and SEO Google regularly updates and tweaks its algorithms in order to reduce spam and remove weak pages from the first page of its organic search results. Google’s latest update, Penguin, targets Black Hat SEO artists that use aggressive SEO techniques and over-spamming and rewards those sites that focus on strong content and organic link-building.

article thumbnail

On Mayer, Yahoo!, and The (Other) Customer

John Battelle's Searchblog

Mayer at the Web 2 Summit, San Francisco ( image James Duncan Davidson ) I try to let big news percolate for a few days before weighing in, and it seemes even more appropriate to follow that playbook when it came to the scrum around Marissa Mayer joining Yahoo. Yes, I’ve known both Marissa Mayer (and Ross Levinsohn) professionally, for more than a decade, but so do many other folks, and it seems nearly all of them – Steven Levy and Kara Swisher intelligently among them – have w

article thumbnail

Enterprise licensing & support maze fatigue may undermine the old guard's next generation products

Collaboration 2.0

Bitter licensing and support memories may be a bigger impediment to adoption of the enterprise old guard's next generation product offerings than they realize, especially given third party options for legacy support, which can provide savings that can be applied to future customer innovation initiatives.

70
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Social Collaboration at Bayer with IBM Connections

ChiefTech

via youtube.com. Kurt De Ruwe is CIO of Bayer MaterialScience and he explains in this video how they are using IBM Connections to be more social internally. Earlier in June, he tweeted that: Today I have 4 of our 9 board members writing 1 to 2 microblogs per week on our internal ?#IBMConnections? platform. Just 5 more to onboard. You can read more about the Bayer story in this Forbes article by Mark Fidelman : De Ruwe’s has been able to get 66% of Bayer Material Science employees using the

58
article thumbnail

Copying ID documents – Dutch data regulator issues guidance

Privacy and Cybersecurity Law

We have all been asked before to provide copies of our passports to organisations such as telecoms providers, hotels and car rental companies. […].

Privacy 40
article thumbnail

Congress Investigates Data Brokers’ Use of Consumer Information

Hunton Privacy

On July 24, 2012, a bipartisan group of eight members of Congress sent letters to nine major data brokerage companies requesting information on how the companies collect, assemble and sell consumer information to third parties. Representatives Ed Markey (D-MA) and Joe Barton (R-TX), who serve as co-chairmen of the Bipartisan Congressional Privacy Caucus, are leading the inquiry.

article thumbnail

A Common Approach to Federal Enterprise Architecture - Actionable Solutions

Interactive Information Management

The recent " Common Approach to Federal Enterprise Architecture " (US Executive Office of the President, May 2 2012) is extremely timely and well-organized guidance for the Federal IT investment and deployment community, as useful for Federal Departments and Agencies as it is for their stakeholders and integration partners. The guidance not only helps IT Program Planners and Managers, but also informs and prepares constituents who may be the beneficiaries or otherwise impacted by the investment.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

What We Lose When We Glorify “Cashless”

John Battelle's Searchblog

Look, I’m not exactly a huge fan of grimy greenbacks, but I do feel a need to point out something that most coverage of current Valley darling Square seems to miss: The “ Death of Cash ” also means the “death of anonymous transactions” – and no matter your view of the role of government and corporations in our life, the very idea that we might lose the ability to transact without the creation of a record merits serious discussion.

article thumbnail

'Tubes' - a tactile tour of the internet

Collaboration 2.0

A terrific book about how the planet is wired for multimedia and data, the locations, sights and smells of global to local internet infrastructure.

70
article thumbnail

John Stepper explains "Working out loud"

ChiefTech

via johnstepper.com. A great explanation from John Stepper about how we use social business platforms for "working out loud", "observable work" and "narrating your work" in the workplace. These are simple but powerful ideas that underpin the value of social intranets and enterprise social networks. He writes in his introduction (emphasis added): Two of the most common objections I hear are “I don’t have enough time” and “I don’t know what to post.

article thumbnail

New European A29 Guidance on “Privacy in the Cloud”

Privacy and Cybersecurity Law

Privacy debates in connection with cloud computing often generate more heat than light! Some regulators (not in the UK!) have […].

Cloud 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

California Supreme Court’s Pineda Decision Applies Retrospectively to ZIP Code Collection Class Action Suit

Hunton Privacy

As reported in BNA’s Privacy & Security Law Report ,on June 25, 2012, a federal district court in California ruled that the California Supreme Court’s 2011 Pineda decision , which held that requesting and recording zip codes during credit card transactions violates the state’s Song-Beverly Credit Card Act, applies retrospectively to OfficeMax’s collection of zip codes from its customers.

Sales 40
article thumbnail

Chrome 20 on Linux and Flash sandboxing

Scary Beasts Security

[Very behind on blog posts so time to crank some out] A week or so ago, Chrome 20 was released to the stable channel. There was little fanfare and even the official Chrome blog didn't have much to declare apart from bugfixes. There were some things going on under the hood for the Linux platform, though. Security things, and some of them I implemented and am quite excited by.

article thumbnail

First, Software Eats the World, Then, The Mirror World Emerges

John Battelle's Searchblog

David Gelernter of Yale ( image Edge.org ) A month or so ago I had the pleasure of sitting down with Valley legend Marc Andreessen , in the main for the purpose of an interview for my slowly-developing-but-still-moving-forward book. At that point, I had not begun re-reading David Gelernter’s 1991 classic Mirror Worlds: or the Day Software Puts the Universe in a Shoebox…How It Will Happen and What It Will Mean.

Mining 97
article thumbnail

Halfway Through The Year: How’re The Predictions Doing?

John Battelle's Searchblog

It’s time to review how my Predictions 2012 are faring, now that half the year has slipped by (that was fast, no?). One thing that stands out is the timing wrt Twitter – my first two predictions were about the company, and now that I think about it, given the news just this week (and the attendant debate ), I should have realized how the two could be in direct conflict with each other.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Who’s On First? (A Modest Proposal To Solve The Problem with First- and Third-Party Marketing)

John Battelle's Searchblog

Early last month I wrote a piece entitled Do Not Track Is An Opportunity, Not a Threat. In it I covered Microsoft’s controversial decision to incorporate a presumptive “opt out of tracking” flag in the next release of its browser, which many in the ad industry see as a major blow to the future of our business. In the piece, I argued that Microsoft’s move may well force independent publishers (you know, like Searchblog, as well as larger sites like CNN or the New York Tim

article thumbnail

Will Our Industry Ever Innovate Like Morse? Probably Not.

John Battelle's Searchblog

Last month I finished a compelling biography of Samuel Morse: Lightning Man: The Accursed Life Of Samuel F.B. Morse , by Pulitzer-prize winning author Kenneth Silverman. If you’re a fan of great biographies, or just want to learn more about the history of both our industry and of the United States during a seminal and innovative period, I certainly recommend this book.

article thumbnail

If Google Were Really Evil…

John Battelle's Searchblog

My morning routine was interrupted today in a big way – because Twitter was down. I hadn’t realized how much I depend on the service for any number of things, from tossing out the headline or two that I find interesting as I read my feeds, to checking the status of the conversation around stuff I’ve written the day before, to logging into other services I use through my Twitter account.

IT 55