April, 2014

article thumbnail

Google+ Won (Or Why Google Never Needed A Social Network)

John Battelle's Searchblog

'The post Google+ Won (Or Why Google Never Needed A Social Network) appeared first on John Battelle's Search Blog. Since the news that Google+ chief Vic Gundotra has abruptly left the company , the common wisdom holds that Google’s oft-derided Facebook clone will not be long for this world. But whether or not Google+ continues as a standalone product isn’t the question.

Honeypots 111
article thumbnail

A Tiger Changes His Stripes: I LIKE Java on z/OS

Robert's Db2

I well remember a phone conversation, from about six or seven years ago, during which a friend of mine and I discussed an application project at his site which involved use of DB2 for z/OS stored procedures. Me: "In what language will the stored procedure programs be written?" My friend (sounding like someone whose favorite sports team had just lost the championship game): "Java.

Access 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You Saw It Here First: Information Governance Moves Beyond "Buzzword"

Positively RIM

Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.

article thumbnail

Calculate the Number of Connections Between Objects or People

JKevinParker

I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection. One way to calculate this for more than 2 objects is to add up all the whole numbers between 1 and (n-1) where n is the number of objects.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Meaning matters: why google switched to numeric captchas

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

More Trending

article thumbnail

What Is Google?

John Battelle's Searchblog

'The post What Is Google? appeared first on John Battelle's Search Blog. Every so often it’s fun to see what Google says about itself via its autocomplete function. For your enjoyment, a few choice images: The post What Is Google? appeared first on John Battelle's Search Blog.

IT 111
article thumbnail

DB2 for z/OS: the Importance of Historical Performance Data

Robert's Db2

Just within the past couple of weeks, I've received questions of a similar nature from two different DB2 for z/OS people. In each message, a DBA described a change that he had made in a production DB2 environment (in one case a size increase for several buffer pools, and in the other a change from an external stored procedure to a native SQL procedure).

article thumbnail

Why Information Sharing Precedes Open Data - Coffee Talk

Interactive Information Management

The Agency Deputy CIO (DCIO), Enterprise Architect (EA), IT System/Security Manager (ITSM) and the Open Data Community Evangelist (ODCE) – Over Cafeteria Coffee The DCIO & ITSM at a table, talking about the annual IT budget status. The ODCE drifts over, recognizes the ITSM from a recent agency newsletter. ODCE – "Can I sit here? I wanted to talk to you about opening up data, freeing it, from your system to my Github group.

article thumbnail

Clarification of Last Post

Positively RIM

Gentle Reader: A statement in my last post, the wrapup to the Executive Conference on Information Governance, deserves clarification. When I reported that, " ARMA scraped to send five people to Amelia Island," I was referring to ARMA staff members. The greater ARMA community was well-represented, with some 80 percent of attendees registering through ARMA's efforts.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Europe under Review: Part 3 of 8 – Accuracy and Proportionality

Privacy and Cybersecurity Law

As the next in our series of “back to privacy basics”, we look at the rules regarding accuracy and proportionality […].

Privacy 40
article thumbnail

Japan Joins the APEC Cross-Border Privacy Rules System

Hunton Privacy

On April 30, 2014, the Asia-Pacific Economic Cooperation (“APEC”) released the Findings Report of the Joint Oversight Panel of the APEC Cross-Border Privacy Rules (“CPBR”) system, confirming that Japan has met the conditions for participation in the CBPRs. Accordingly, Japan has now joined the U.S. and Mexico as a participant in the APEC CBPRs. Canada recently expressed its intent to join the system soon, and other APEC economies are in the process determining how and when they may join.

Privacy 40
article thumbnail

The Next Vegas Will Be A City That Lets You Truly Disappear – If Only For A While

John Battelle's Searchblog

'The post The Next Vegas Will Be A City That Lets You Truly Disappear – If Only For A While appeared first on John Battelle's Search Blog. ( image ) My daily reading took me to two places today – to Compton, California , well-known for its crime to anyone who grew up in LA (as I did), and to this NYT piece , which muses that the city, once the place we went to disappear, is likely to be the first place where anonymity is no longer guaranteed.

Marketing 100
article thumbnail

Word Cloud: Information Chaos vs. Information Opportunity

JKevinParker

I created a Wordle word cloud of AIIM's eBook “Information Chaos V. Information Opportunity: THE information challenge for the next decade” Download this word cloud as a hi-res PDF These are the top 100 words in the paper. I replaced “IT” with “informationtechnology”, or else it would have been filtered out as a common word.

Cloud 40
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Northern Virginia Hire a US Veteran Information Campaign Kickoff - Lake Ridge, VA Wed Apr 30 10AM-2PM

Interactive Information Management

Northern Virginia Business Center (NVABC) Hire a Vet Kickoff Date: Wed 30 April 2014 Time: 10:00 AM - 2:00 PM (Networking Coffee 9-10am) Location: Northern Virginia Business Center (NVABC), 3421 Commission Ct., Suite 100, Lake Ridge, VA 22192 Registration is required, at this registration link. NVABC, in conjunction with a long list of sponsors, is proud to support our nation's veterans and their transition from military service to gainful employment and business opportunities.

article thumbnail

In Retrospect: The First Executive Conference on Information Governance

Positively RIM

Last year, when leaders of ARMA International and The Sedona Conference discovered they were each planning conferences on Information Governance for this April, it was obvious they should combine their efforts, not compete. The result was the first Executive Conference on Information Governance, held April 14-15 at Amelia Island, Florida. Congratulations to ARMA and Sedona on a highly successful conference!

article thumbnail

Europe under Review : Part 2 of 8 – Data Collection

Privacy and Cybersecurity Law

As the next in our series of “back to privacy basics”, we look the rules regarding collection and processing of […].

article thumbnail

U.S. Court Rules Microsoft Must Release User Data Stored Overseas

Hunton Privacy

On April 25, 2014, a judge in the U.S. District Court for the Southern District of New York ruled that Microsoft must release user data to U.S. law enforcement when issued a search warrant, even if the data is stored outside of the U.S. The case stems from a search warrant seeking the contents of all emails, records and other information regarding one of Microsoft’s email users.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Else 4.28.14: F*ck Policy, Except When I Care About The Outcome

John Battelle's Searchblog

'The post Else 4.28.14: F*ck Policy, Except When I Care About The Outcome appeared first on John Battelle's Search Blog. ( image ) This past week saw a significant increase in society’s willingness to have a deeper conversation about what it means to Become Data. The Supreme Court heard arguments in a case that may well supplant the Betamax case in import.

Mining 94
article thumbnail

Introducing #Climate

John Battelle's Searchblog

'The post Introducing #Climate appeared first on John Battelle's Search Blog. As many of you know, each year I write a set of predictions about the industry – this year, however, I had a bit of a hard time getting going. The reason? A persistent sense of “existential anxiety” around climate change. In Predictions 2014: A Difficult Year To See , I wrote: I’ve been mulling these predictions for months, yet one overwhelming storm cloud has been obscuring my otherwise consist

Cloud 92
article thumbnail

Else 4.7.14: So Much Information, Precious Little Insight

John Battelle's Searchblog

'The post Else 4.7.14: So Much Information, Precious Little Insight appeared first on John Battelle's Search Blog. Reading over my picks from the past week, I noticed a strong theme – we’re using more and more apps, creating more and more data, but we’re not setting the true value we might from connecting all the dots. Sure, the NSA is – and Facebook, Google, and other large platforms are as well.

article thumbnail

Else 4.21.14: It’s (Almost) All Google

John Battelle's Searchblog

'The post Else 4.21.14: It’s (Almost) All Google appeared first on John Battelle's Search Blog. Welcome back to Else – I took a week off for Spring break, so this covers two weeks of the best stories related to the work I’m doing on the book. Reflecting an increased focus on Google, this edition of Else is flush with Google news, from its purchase of Titan Aerospace to its unusual willingness to show us a peek behind the curtain of Google X.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

French Data Protection Authority Discloses Its 2014 Inspection Program

Hunton Privacy

On April 29, 2014, the French Data Protection Authority (“CNIL”) disclosed its annual inspections program, providing an overview of its inspections in 2013 and a list of the inspections it plans to conduct in 2014. Under French data protection law, the CNIL is authorized to collect any useful information in connection with its investigations and access data controllers’ electronic data and data processing programs.

IT 40
article thumbnail

HHS Settles Potential HIPAA Violations with Concentra Health Services and QCA Health Plan Inc.

Hunton Privacy

On April 23, 2014, the Department of Health and Human Services (“HHS”) announced settlements with two health care companies stemming from allegations of inadequate information security practices in the wake of investigations involving stolen laptop computers. Concentra Health Services (“Concentra”) and QCA Health Plan Inc. (“QCA”) will collectively pay nearly $2 million to settle the claims.

article thumbnail

Tiao Discusses Utilities’ Concerns in Sharing Information with the Government

Hunton Privacy

On April 20, 2014, Hunton & Williams partner Paul M. Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. In the feature, “U.S. Utilities Wary of Sharing Grid Risks,” Tiao talked about the recent leak to The Wall Street Journal of a sensitive internal memo at the Federal Energy Regulatory Commission that revealed potential vulnerabilities in the electricity grid.

article thumbnail

Article 29 Working Party Issues Statement on One-Stop-Shop Within Proposed EU General Data Protection Regulation

Hunton Privacy

On April 16, 2014, the Article 29 Working Party (the “Working Party”) sent a letter (the “Letter”) to Lilian Mitrou, Chair of the Working Group on Information Exchange and Data Protection (the “DAPIX”) of the Council of the European Union, to support a compromise position on the one-stop-shop mechanism within the proposed EU General Data Protection Regulation (the “Proposed Regulation”).

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Brazilian President Signs Internet Bill

Hunton Privacy

On April 23, 2014, Brazilian President Dilma Rousseff enacted the Marco Civil da Internet (“Marco Civil”), Brazil’s first set of Internet regulations. The Marco Civil was approved by the Brazilian Senate on April 22, 2014. President Rousseff signed the law at the NETMundial Internet Governance conference in São Paulo, a global multistakeholder event on the future of Internet governance.

article thumbnail

Article 29 Working Party Issues Guidance on the “Legitimate Interests” Ground in the EU Data Protection Directive

Hunton Privacy

On April 9, 2014, the Article 29 Working Party (the “Working Party”) issued an Opinion on using the “legitimate interests” ground listed in Article 7 of the EU Data Protection Directive 95/46/EC as the basis for lawful processing of personal data. Citing “legitimate interests” as a ground for data processing requires a balancing test, and it may be relied on only if (1) the data processing is necessary for the legitimate interests of the controller (or third parties), and (2) such interests are

article thumbnail

Kentucky Enacts Data Breach Notification Law

Hunton Privacy

On April 10, 2014, Kentucky Governor Steve Beshear signed into law a data breach notification statute requiring persons and entities conducting business in Kentucky to notify individuals whose personally identifiable information was compromised in certain circumstances. The law will take effect on July 14, 2014. Kentucky’s data breach notification law covers “personally identifiable information,” which is defined as an individual’s first name or first initial and last name in combination with an