This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'
'The post Want to See How Detroit Is Coming Back? appeared first on John Battelle's Search Blog. Tonight I checked into my hotel room in Chicago as part of my regular cadence of visiting FM’s offices around the country. I flipped on the TV and the local news featured a dismal report about Detroit’s suburbs. The copy of Time magazine I had in my bag, same thing: Detroit Goes Bust.
'Knowledge management (KM) is all about the people, right. Actually, its a little more complicated than that. Last year, Nancy Dixon presented what I think is one of the best overviews of the state of knowledge management today, where she explains the 3 eras of knowledge management : She describes the 3rd era of knowledge management as being focused on using collective knowledge to: Address complex issues.
In my DB2 for z/OS-related work over the past 25 years, I've done a lot in the way of performance analysis, looking at individual queries and at DB2-accessing application programs (both transactional and batch in nature). Time and time again, sometimes in reviewing trend data and sometimes in examining DB2 monitor output to gauge the impact of performance tuning actions, I've seen that the CPU time consumed in SQL statement execution rises or falls with the associated level of GETPAGE activity (
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
As reported by Bloomberg BNA , the South African Parliament passed the Protection of Personal Information Bill on August 22, 2013. The bill, which was sent to President Jacob Zuma to be signed into law, represents South Africa’s first comprehensive data protection legislation. The Protection of Personal Information Bill sets forth several measures to protect personal data, including: Establishing an Information Protection Regulator with investigatory and enforcement powers.
Dismiss business benefits at your peril: An IT strategy war story. ravi.kumarv@cgi.com. Fri, 08/16/2013 - 08:00. A friend of mine once led an IT strategy consulting engagement for a UK company. She spent time tailoring the method appropriately, took care to get the right messages in the proposal, built a team, and began work. At first the focus was on understanding the business strategy.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Dismiss business benefits at your peril: An IT strategy war story. ravi.kumarv@cgi.com. Fri, 08/16/2013 - 08:00. A friend of mine once led an IT strategy consulting engagement for a UK company. She spent time tailoring the method appropriately, took care to get the right messages in the proposal, built a team, and began work. At first the focus was on understanding the business strategy.
'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'
'The post Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win appeared first on John Battelle's Search Blog. I spent today at the first-ever Boing Boing Ingenuity , a two-day hackathon cum “vaudeville show” – truly Boing Boing brought to life. It made me so proud to see the essence of conversational marketing at work – a major brand adding deep value to a community, an independent publisher realizing its dream of celebrating its voice and community through a uniq
'I''m going to be in Melbourne for a few days next week and thought it would be good to organise a coffee morning. We''ll be talking about everything from social intranets and knowledge management to government 2.0 and social innovation. Come along to chat and catch up. When : Tuesday 6th August, 8am to 9.30am. Where : Jasper Kitchen at the Jasper Hotel , 489 Elizabeth St, Melbourne VIC 3000.
The DB2 for z/OS Distributed Data Facility (DDF), the component of DB2 that provides data services for network-attached client applications, is not a new kid on the block -- it's been around for more than two decades. In recent years, however, DDF has gained in importance for many organizations as client-server activity has grown as a percentage of the overall DB2 workload (in a blog entry posted a couple of years ago, I wrote about a way in which a DB2 monitor accounting report can be used to d
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On August 29, 2013, the FTC announced that it had filed a complaint against LabMD, Inc. (“LabMD”) for failing to protect consumers’ personal data. According to the complaint, LabMD, which performs various laboratory tests for consumers, exposed the personal information of more than 9,000 consumers on a peer-to-peer (“P2P”) file-sharing network. Specifically, a LabMD spreadsheet that was found on the P2P network contained names, Social Security numbers, dates of birth, health insurance informatio
'The post Is US Culture Veering Toward The Dark and Deadpan? appeared first on John Battelle's Search Blog. ( image ) According to Wikipedia , “deadpan” is a uniquely American neologism less than a century old. The term arose from the slang term “pan,” for face: “Keep a dead pan,” a gangster told an associate in 1934′s The Gay Bride.
'The post Four Minutes on the Future of Marketing appeared first on John Battelle's Search Blog. Earlier this year I sat down with a videographer at the Bazaarvoice Summit in Austin. He asked me about the future of marketing, in particular as it related to data and consumer behavior. Given what I announced earlier this morning, I thought you might find this short video worth a view.
'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures.
'The post The debut of “else”: Surveillance Everywhere and the Technological Wild West appeared first on John Battelle's Search Blog. As we’re working on the book , Sara and I are planning on sharing some of the news items and blog posts that catch our attention each week. We’ll also plan on talking through some of the things we’re reading and working on in this space.
'The post else 8.26: Getting a Little Too Comfortable with Technology appeared first on John Battelle's Search Blog. This week in the else round up we explore the responsibilities of technology builders and designers, what it will take for 3D printers and autonomous vehicles to go mainstream, and how humans will always find ways to misuse technology.
'The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog. Today on the Federated site , I’ve posted a preview of something we’re working on for a Fall release. I’m cross posting a portion of it here, as I know many of you are interested in media and data-driven marketing. It’s no secret that Federated Media has deep roots in content marketing: We re-imagined CM for the modern web eight years ago, and since then have exec
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog. I had a chance to stop by Bloomberg TV yesterday to talk about “ content reachtargeting ” and the larger secular trends driving digital marketing today. Here’s the video: The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog.
'Its no surprise that a story about Activity Based Working (ABW) appeared in Fairfax newspaper''s IT section - after all, ABW is underpinned by the right information technology. In this instance, the Australian federal Department of Human Services (DHS) will trial ABW with 110 staff in a Canberra office. A range of supporting technologies will be deployed that include a practical mix of wireless networking, follow-me printing and voice-over internet protocol (VoIP).
'What do you get when you combined Microsoft Kinect for Windows, Windows 8 and a data projector? Ubi Interactive ''s software allows you to turn just about any surface into a multi-touch display: From the Ubi Interactive site: "Can I use any surface? Yes, you can- as long as the surface is visible to the depth sensor camera in the Kinect. You may want to make sure that the surface is neither too absorptive (such as some of the Plasma screens) nor reflective (such as some glass material).
On August 26, 2013, the U.S. District Court for the Northern District of California approved a settlement with Facebook, Inc., related to the company’s alleged misappropriation of certain Facebook members’ personal information, such as names and profile pictures, that was then used in ads to promote products and services via Facebook’s “Sponsored Stories” program.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On August 28, 2013, on the UK Information Commissioner’s Office’s (“ICO’s”) blog, Simon Rice, Technology Group Manager for the ICO, discussed the importance of encryption as a data security measure. He stated that storing any personal information is “inherently risky” but encryption can be a “simple and effective means” to safeguard personal information and reduce the risk of security breaches.
As always, the privacy team at Hunton & Williams continues to closely monitor the latest global developments in data protection, privacy and cybersecurity, including progress on the proposed EU General Data Protection Regulation. To keep you informed, we will be hosting regular, 30-minute webcasts to provide brief updates on the most pressing issues.
On August 22, 2013, Hunton & Williams partner Paul M. Tiao was featured on CNBC’s Fast Money discussing NASDAQ’s recent crash. In the feature, “Are markets ready for cyber threats?”, Tiao talked about the steps the financial services industry has taken to protect against significant cybersecurity incidents, including “putting in best-of-breed information security policies” and “working across the industry to share information in a way that many other industries are not.”.
This week a new breach notification regulation takes effect across the EU. The Regulation on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC (the “Regulation”) specifies the technical measures of how Internet service providers, telecommunications providers and other public electronic communications service (“ECS”) providers must notify of data breaches.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On August 1, 2013, the United States District Court for the District of Minnesota denied a criminal defendant’s motion to suppress, holding that the defendant had no reasonable expectation of privacy in computer files he shared on a peer-to-peer network. In U.S. v. Hoffman , police used a software program to monitor multiple peer-to-peer networks for IP addresses that investigators had previously identified as possibly associated with child pornography.
On August 15, 2013 the Federal Trade Commission announced a settlement with Certegy Check Services, Inc. (“Certegy”) stemming from allegations that Certegy violated various provisions of the Fair Credit Reporting Act (“FCRA”). The settlement agreement includes a $3.5 million civil penalty for “knowing violations … that constituted a pattern or practice of violations.”.
'"The phrase ‘digital disruption’ is quite a misnomer because no technology truly disrupts unless it disrupts what we do and how we do it, not just what we do it with. This then begs the question: Is technology disrupting us or are we disrupting with technology?". Cross-posted from the DISRUPT.SYDNEY and Ripple Effect Group blogs.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content