This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
On the eve of the main Boston Enterprise 2.0 Conference, it’s worth taking a look at the state of the enterprise. Despite being up to my eyeballs in collaboration strategy behind the firewall inside large companies this year I strive to stay objective and to avoid failing to see the wood for the trees. It’s all [.
As I wrote last month , I'm working with a team of folks to redesign the Web 2 Points of Control map along the lines of this year's theme: " The Data Frame." In the past few weeks I've been talking to scores of interesting people, including CEOs of data-driven start ups (TrialPay and Corda, for example), academics in the public dataspace, policy folks, and VCs.
I am pleased to announce that I have accepted a position with a consulting firm near Washington, D.C., as a SharePoint Architect. I will be interfacing directly with a federal government agency, helping them create a new robust SharePoint 2010 environment and migrating content from thousands of SharePoint 2007/2003 sites to this new environment. I'm very excited!
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Recently, a DB2 for z/OS professional asked me about something he'd occasionally seen in a DB2 monitor display: a non-zero value for CONDITIONAL GETPAGE FAILURES for a buffer pool. Now, his DB2 subsystem appeared to be running just fine, but we are rather conditioned (so to speak) to associate the word FAILURE with the meaning NOT GOOD, and he wanted to know if these FAILURES indicated something with which he should be concerned.
On June 28, 2011, the Federal Communications Commission and the Federal Trade Commission convened a public education forum entitled “ Helping Consumers Harness the Potential of Location-Based Services.” Representatives of telecommunications carriers, technology companies and consumer advocacy organizations discussed technological developments and how best to realize the benefits of location-based services without compromising privacy.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
On June 28, 2011, the Federal Communications Commission and the Federal Trade Commission convened a public education forum entitled “ Helping Consumers Harness the Potential of Location-Based Services.” Representatives of telecommunications carriers, technology companies and consumer advocacy organizations discussed technological developments and how best to realize the benefits of location-based services without compromising privacy.
The Enterprise 2.0 Conference moved venue this year to the huge Hynes Conference Center in the heart of Boston, as befits the central role the movement’s thinking and technologies is now playing in the enterprise world, particularly in marketing messaging. From a technology vendor perspective improving user interface look and feel and incorporating 2.0 web components [.
(Image: Samuel Morse, source Wikipedia). Sometime today the following blurb was sent to the book publishing trade press: Author of The Search , co-founder of Wired , founder of Federated Media, Inc., and Executive Producer of the Web 2.0 Summit, John Battelle’s WHAT WE HATH WROUGHT will give us a forecast of the interconnected world in 2040, then work backwards to explain how the personal, economic, political, and technological strands of this human narrative have evolved from the pivotal moment
I just took the AIIM SharePoint Master exam, which combines the exams for SharePoint Practitioner and SharePoint Specialist. After passing the exam, I was awarded the designation "AIIM SharePoint Specialist.". To move from SharePoint Specialist to SharePoint Master, I need to complete my Master project and submit it for review. When that has been approved, I will be an AIIM SharePoint Master!
Predicting the future – now. ravi.kumarv@cgi.com. Thu, 06/23/2011 - 08:00. Online shopping already recommends items based upon your previous purchases, but imagine if the recommendations were based upon Facebook and Twitter conversations you are having with your friends. Spooky? Well maybe not. It’s the coming together of predictive analytics and social media.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Back in the 1980s, when DB2 was relatively new, you had, of course, a lot of application developers who were learning how to program using SQL (IBM invented the relational database and Structured Query Language). Though SQL is pretty intuitive, mastery takes time and so it was understandable that some programmers early on did in their code things that would more effectively be done by DB2.
On June 28-30, 2011, the Council of Europe’s Bureau of the Consultative Committee of the Convention for the Protection of Individuals with regard to the Automatic Processing of Personal Data (known as the “T-PD-Bureau”) met in Strasbourg, France, to discuss, among other things, amending the Council of Europe’s Convention 108. Convention 108, which underlies the European Union’s legal framework for data protection, is the only legally-binding international convention that addresses data protecti
Earlier today I moderated a panel at an energetic and well-attended event called the " Newfront ," produced by Digitas, an innovative agency which counts American Express, Kraft, P&G, and GM as clients. I say energetic because it was highly produced and very considered (and this from a guy who carefully produces live events for a living, among other things).
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
This week, details came out about how identity thieves captured information for around 200,000 Citigroup customers' information. According to the New York Times article and many articles that reference it, "The case illustrates the threat posed by the rising demand for private financial information from the world of foreign hackers.". Wrong. This case illustrates the threat posed by total negligence and/or ignorance of your Web Apps and Security teams and flaws in your internal quality assurance
Last month, I traveled to Chicago for Cohasset Associates' 19th Managing Electronic Records conference: MER. It focused on getting rid of "Stuff", especially the legal implications thereof. "Stuff" represented the unneeded, outdated, and useless information that many organizations keep to their detriment. While most people use MER as an acronym, the organizers prefer to regard the letters as initials, spelling it out.
Several years ago, Google's top executives clearly realized they needed to create growth engines beyond search. As they looked for new opportunities, two stood out: first, the shift from the PC web to mobile, and second, the rise of "intelligent display" - advertising that works at the brand level, and not just lead-generation and demand fulfillment, which is where search has always ruled.
This past week I attended the Cannes Lions , one of the advertising industry's most prestigious and well attended events. The premise of the event is to celebrate excellence in advertising, marketing and communications, but given it attracts more than 10,000 folks in a business which celebrates Don Draper as an icon, I think it's fair to say that the Lions are as much about drinking and networking as they are about awards.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Yahoo! It's our industry's favorite puzzle. On the one hand, it's one of the largest sites on the web, on the same size and scale as Google, Facebook, and Microsoft. On the other hand, it's not growing very quickly, revenues are flat, and investors have been calling for CEO Carol Bartz's head with increasing regularity. The company has failed to find a "hit" that redefines its value proposition in a world driven by hits like Twitter, Foursquare, and Flipboard.
When Facebook announced it had convinced Carolyn Everson to leave Microsoft to head sales at the pre-IPO social networking giant, a few eyebrows lifted: Everson had only been at Microsoft for nine months, and was recruited there by CEO Steve Ballmer after he watched her work to integrate an important deal between Microsoft and MTV, where she previously worked.
If you Google "Antonio Lucio CMO Visa", as I did in preparation for my conversation with him next week at CM Summit, the first several links which show up are headlined : " Google Hater - Visa CMO Antonio Lucio Slams Giant.". The headline isn't really reflective of Lucio's views on Google, but there you have it. For most casual observers, Lucio is a firebrand calling out the largest force in digital marketing today.
Next week will mark the third time in one year that I've interviewed Black Eyed Peas frontman will.i.am on stage, and each time it's gotten better. If you're coming to CM Summit , you're in for a treat. Will is in New York for a benefit concert in Central Park , and he's stopping by to chat with us along the way. I've found will.i.am to be a rare bird - a massively successful commercial artist who embraces brands and marketing as part of his work, instead of a distraction from his work.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Over at the Federated Media site, I've posted an appreciation of the company I started in a garage six years ago this week. FM came about because of my work on my first book - it was through the study of search's impact on media and markets that I came up with the idea in the first place. Which means, in a pretty direct way, it was attributable in part to the musings here on Searchblog, and to your responses to those musings.
On June 29, 2011, the Senate Committee on Commerce, Science and Transportation convened a hearing entitled “Privacy and Data Security: Protecting Consumers in the Online World.” In opening remarks , Committee Chair Senator Jay Rockefeller (D-WV) highlighted that the hearing would consider both privacy and data security and discussed three bills focused on these issues.
Recent developments involving the use of facial recognition technology have raised privacy concerns in the United States, Europe and Canada. As we reported earlier this month , the Electronic Privacy Information Center (“EPIC”) and several other consumer privacy advocacy groups filed a complaint with the Federal Trade Commission against Facebook for its use of facial recognition technology.
On June 24, 2011, the U.S. Department of Commerce’s International Trade Administration released a PowerPoint presentation on Mexico’s new private sector data protection law that was shared at a meeting of the OECD Working Party on Information Security and Privacy by Mexico’s Ministry of Economy and Federal Institute for Access to Information and Data Protection (“IFAI”).
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On June 23, 2011, in a 6-3 decision, the United States Supreme Court ruled in IMS Health Inc. v. Sorrell that a Vermont law prohibiting the sale of prescriber-identifiable data to drug companies was an unconstitutional violation of the First Amendment right to free speech. Thomas Julin, a partner at Hunton & Williams LLP, represented IMS Health in this case.
On June 14, 2011, the PCI Security Standards Council’s Virtualization Special Interest Group published its “ Information Supplement: PCI DSS Virtualization Guidelines ”(the “Guidelines”) to Version 2.0 of the PCI Data Security Standard (“PCI DSS”). The Guidelines provide context for the application of the PCI DSS to cloud and other virtual environments, and offer at least three critical reminders: the PCI DSS applies to cloud environments without excepti
On June 20, 2011, Malaysia’s Bernama News Agency reported that the Malaysian Ministry of Information, Communication and Culture will establish a government department to facilitate the implementation of Malaysia’s new Personal Data Protection Act. Malaysia passed the Personal Data Protection Act in 2010, but the law has yet to go into effect. According to the report, enforcement of the Act is scheduled for early next year.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content