This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post Google+ Won (Or Why Google Never Needed A Social Network) appeared first on John Battelle's Search Blog. Since the news that Google+ chief Vic Gundotra has abruptly left the company , the common wisdom holds that Google’s oft-derided Facebook clone will not be long for this world. But whether or not Google+ continues as a standalone product isn’t the question.
I well remember a phone conversation, from about six or seven years ago, during which a friend of mine and I discussed an application project at his site which involved use of DB2 for z/OS stored procedures. Me: "In what language will the stored procedure programs be written?" My friend (sounding like someone whose favorite sports team had just lost the championship game): "Java.
Next Monday and Tuesday, over 100 executives, attorneys, technologists, information governance professionals, and other luminaries will convene at Amelia Island (FL) for the first Executive Conference on Information Governance, co-sponsored by ARMA International and The Sedona Conference. This phenomenon means Information Governance is becoming operational, that is: IG is moving from trendy-buzzword to best practices offering significant benefits.
I was working on some training material and wanted to show how complex ad hoc connections between systems can be. I needed to calculate the number of potential connections between a number of systems, so I had to relearn a formula. Between 2 systems there is only 1 possible connection. One way to calculate this for more than 2 objects is to add up all the whole numbers between 1 and (n-1) where n is the number of objects.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
In March 2014, the State Postal Bureau of the People’s Republic of China (the “SPBC”) formally issued three rules (the “Rules”) establishing significant requirements regarding the protection of personal information: (1) Provisions on the Management of the Security of Personal Information of Postal and Delivery Service Users (the “Security Provisions”); (2) Provisions on the Reporting and Handling of Security Information in the Postal Sector (the “Reporting and Handling Provisions”); and (3) Prov
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
In March 2014, the State Postal Bureau of the People’s Republic of China (the “SPBC”) formally issued three rules (the “Rules”) establishing significant requirements regarding the protection of personal information: (1) Provisions on the Management of the Security of Personal Information of Postal and Delivery Service Users (the “Security Provisions”); (2) Provisions on the Reporting and Handling of Security Information in the Postal Sector (the “Reporting and Handling Provisions”); and (3) Prov
'The post What Is Google? appeared first on John Battelle's Search Blog. Every so often it’s fun to see what Google says about itself via its autocomplete function. For your enjoyment, a few choice images: The post What Is Google? appeared first on John Battelle's Search Blog.
Just within the past couple of weeks, I've received questions of a similar nature from two different DB2 for z/OS people. In each message, a DBA described a change that he had made in a production DB2 environment (in one case a size increase for several buffer pools, and in the other a change from an external stored procedure to a native SQL procedure).
The Agency Deputy CIO (DCIO), Enterprise Architect (EA), IT System/Security Manager (ITSM) and the Open Data Community Evangelist (ODCE) – Over Cafeteria Coffee The DCIO & ITSM at a table, talking about the annual IT budget status. The ODCE drifts over, recognizes the ITSM from a recent agency newsletter. ODCE – "Can I sit here? I wanted to talk to you about opening up data, freeing it, from your system to my Github group.
Gentle Reader: A statement in my last post, the wrapup to the Executive Conference on Information Governance, deserves clarification. When I reported that, " ARMA scraped to send five people to Amelia Island," I was referring to ARMA staff members. The greater ARMA community was well-represented, with some 80 percent of attendees registering through ARMA's efforts.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On April 30, 2014, the Asia-Pacific Economic Cooperation (“APEC”) released the Findings Report of the Joint Oversight Panel of the APEC Cross-Border Privacy Rules (“CPBR”) system, confirming that Japan has met the conditions for participation in the CBPRs. Accordingly, Japan has now joined the U.S. and Mexico as a participant in the APEC CBPRs. Canada recently expressed its intent to join the system soon, and other APEC economies are in the process determining how and when they may join.
'The post The Next Vegas Will Be A City That Lets You Truly Disappear – If Only For A While appeared first on John Battelle's Search Blog. ( image ) My daily reading took me to two places today – to Compton, California , well-known for its crime to anyone who grew up in LA (as I did), and to this NYT piece , which muses that the city, once the place we went to disappear, is likely to be the first place where anonymity is no longer guaranteed.
I created a Wordle word cloud of AIIM's eBook “Information Chaos V. Information Opportunity: THE information challenge for the next decade” Download this word cloud as a hi-res PDF These are the top 100 words in the paper. I replaced “IT” with “informationtechnology”, or else it would have been filtered out as a common word.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Northern Virginia Business Center (NVABC) Hire a Vet Kickoff Date: Wed 30 April 2014 Time: 10:00 AM - 2:00 PM (Networking Coffee 9-10am) Location: Northern Virginia Business Center (NVABC), 3421 Commission Ct., Suite 100, Lake Ridge, VA 22192 Registration is required, at this registration link. NVABC, in conjunction with a long list of sponsors, is proud to support our nation's veterans and their transition from military service to gainful employment and business opportunities.
Last year, when leaders of ARMA International and The Sedona Conference discovered they were each planning conferences on Information Governance for this April, it was obvious they should combine their efforts, not compete. The result was the first Executive Conference on Information Governance, held April 14-15 at Amelia Island, Florida. Congratulations to ARMA and Sedona on a highly successful conference!
On April 25, 2014, a judge in the U.S. District Court for the Southern District of New York ruled that Microsoft must release user data to U.S. law enforcement when issued a search warrant, even if the data is stored outside of the U.S. The case stems from a search warrant seeking the contents of all emails, records and other information regarding one of Microsoft’s email users.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The post Else 4.28.14: F*ck Policy, Except When I Care About The Outcome appeared first on John Battelle's Search Blog. ( image ) This past week saw a significant increase in society’s willingness to have a deeper conversation about what it means to Become Data. The Supreme Court heard arguments in a case that may well supplant the Betamax case in import.
'The post Introducing #Climate appeared first on John Battelle's Search Blog. As many of you know, each year I write a set of predictions about the industry – this year, however, I had a bit of a hard time getting going. The reason? A persistent sense of “existential anxiety” around climate change. In Predictions 2014: A Difficult Year To See , I wrote: I’ve been mulling these predictions for months, yet one overwhelming storm cloud has been obscuring my otherwise consist
'The post Else 4.7.14: So Much Information, Precious Little Insight appeared first on John Battelle's Search Blog. Reading over my picks from the past week, I noticed a strong theme – we’re using more and more apps, creating more and more data, but we’re not setting the true value we might from connecting all the dots. Sure, the NSA is – and Facebook, Google, and other large platforms are as well.
'The post Else 4.21.14: It’s (Almost) All Google appeared first on John Battelle's Search Blog. Welcome back to Else – I took a week off for Spring break, so this covers two weeks of the best stories related to the work I’m doing on the book. Reflecting an increased focus on Google, this edition of Else is flush with Google news, from its purchase of Titan Aerospace to its unusual willingness to show us a peek behind the curtain of Google X.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On April 29, 2014, the French Data Protection Authority (“CNIL”) disclosed its annual inspections program, providing an overview of its inspections in 2013 and a list of the inspections it plans to conduct in 2014. Under French data protection law, the CNIL is authorized to collect any useful information in connection with its investigations and access data controllers’ electronic data and data processing programs.
On April 23, 2014, the Department of Health and Human Services (“HHS”) announced settlements with two health care companies stemming from allegations of inadequate information security practices in the wake of investigations involving stolen laptop computers. Concentra Health Services (“Concentra”) and QCA Health Plan Inc. (“QCA”) will collectively pay nearly $2 million to settle the claims.
On April 20, 2014, Hunton & Williams partner Paul M. Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. In the feature, “U.S. Utilities Wary of Sharing Grid Risks,” Tiao talked about the recent leak to The Wall Street Journal of a sensitive internal memo at the Federal Energy Regulatory Commission that revealed potential vulnerabilities in the electricity grid.
On April 16, 2014, the Article 29 Working Party (the “Working Party”) sent a letter (the “Letter”) to Lilian Mitrou, Chair of the Working Group on Information Exchange and Data Protection (the “DAPIX”) of the Council of the European Union, to support a compromise position on the one-stop-shop mechanism within the proposed EU General Data Protection Regulation (the “Proposed Regulation”).
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On April 23, 2014, Brazilian President Dilma Rousseff enacted the Marco Civil da Internet (“Marco Civil”), Brazil’s first set of Internet regulations. The Marco Civil was approved by the Brazilian Senate on April 22, 2014. President Rousseff signed the law at the NETMundial Internet Governance conference in São Paulo, a global multistakeholder event on the future of Internet governance.
On April 9, 2014, the Article 29 Working Party (the “Working Party”) issued an Opinion on using the “legitimate interests” ground listed in Article 7 of the EU Data Protection Directive 95/46/EC as the basis for lawful processing of personal data. Citing “legitimate interests” as a ground for data processing requires a balancing test, and it may be relied on only if (1) the data processing is necessary for the legitimate interests of the controller (or third parties), and (2) such interests are
On April 10, 2014, Kentucky Governor Steve Beshear signed into law a data breach notification statute requiring persons and entities conducting business in Kentucky to notify individuals whose personally identifiable information was compromised in certain circumstances. The law will take effect on July 14, 2014. Kentucky’s data breach notification law covers “personally identifiable information,” which is defined as an individual’s first name or first initial and last name in combination with an
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content