August, 2013

article thumbnail

Want to See How Detroit Is Coming Back?

John Battelle's Searchblog

'The post Want to See How Detroit Is Coming Back? appeared first on John Battelle's Search Blog. Tonight I checked into my hotel room in Chicago as part of my regular cadence of visiting FM’s offices around the country. I flipped on the TV and the local news featured a dismal report about Detroit’s suburbs. The copy of Time magazine I had in my bag, same thing: Detroit Goes Bust.

Marketing 111
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nancy Dixon Explains 3rd Era Knowledge Management

ChiefTech

'Knowledge management (KM) is all about the people, right. Actually, its a little more complicated than that. Last year, Nancy Dixon presented what I think is one of the best overviews of the state of knowledge management today, where she explains the 3 eras of knowledge management : She describes the 3rd era of knowledge management as being focused on using collective knowledge to: Address complex issues.

IT 62
article thumbnail

DB2 for z/OS: GETPAGEs are not ALWAYS the Key Determinant of SQL Statement CPU Time

Robert's Db2

In my DB2 for z/OS-related work over the past 25 years, I've done a lot in the way of performance analysis, looking at individual queries and at DB2-accessing application programs (both transactional and batch in nature). Time and time again, sometimes in reviewing trend data and sometimes in examining DB2 monitor output to gauge the impact of performance tuning actions, I've seen that the CPU time consumed in SQL statement execution rises or falls with the associated level of GETPAGE activity (

Access 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

South Africa Passes Comprehensive Personal Data Protection Legislation

Hunton Privacy

As reported by Bloomberg BNA , the South African Parliament passed the Protection of Personal Information Bill on August 22, 2013. The bill, which was sent to President Jacob Zuma to be signed into law, represents South Africa’s first comprehensive data protection legislation. The Protection of Personal Information Bill sets forth several measures to protect personal data, including: Establishing an Information Protection Regulator with investigatory and enforcement powers.

More Trending

article thumbnail

Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win

John Battelle's Searchblog

'The post Thoughts on Ford’s OpenXC: In The Future, Brands With Open Data Will Win appeared first on John Battelle's Search Blog. I spent today at the first-ever Boing Boing Ingenuity , a two-day hackathon cum “vaudeville show” – truly Boing Boing brought to life. It made me so proud to see the essence of conversational marketing at work – a major brand adding deep value to a community, an independent publisher realizing its dream of celebrating its voice and community through a uniq

Marketing 109
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

89
article thumbnail

Coffee morning in Melbourne on Tue 6th August

ChiefTech

'I''m going to be in Melbourne for a few days next week and thought it would be good to organise a coffee morning. We''ll be talking about everything from social intranets and knowledge management to government 2.0 and social innovation. Come along to chat and catch up. When : Tuesday 6th August, 8am to 9.30am. Where : Jasper Kitchen at the Jasper Hotel , 489 Elizabeth St, Melbourne VIC 3000.

article thumbnail

DB2 for z/OS: Get Your DDF-Related Dispatching Priorities Right

Robert's Db2

The DB2 for z/OS Distributed Data Facility (DDF), the component of DB2 that provides data services for network-attached client applications, is not a new kid on the block -- it's been around for more than two decades. In recent years, however, DDF has gained in importance for many organizations as client-server activity has grown as a percentage of the overall DB2 workload (in a blog entry posted a couple of years ago, I wrote about a way in which a DB2 monitor accounting report can be used to d

IT 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FTC Files Complaint Against Medical Testing Lab for Exposing Consumers’ Personal Data

Hunton Privacy

On August 29, 2013, the FTC announced that it had filed a complaint against LabMD, Inc. (“LabMD”) for failing to protect consumers’ personal data. According to the complaint, LabMD, which performs various laboratory tests for consumers, exposed the personal information of more than 9,000 consumers on a peer-to-peer (“P2P”) file-sharing network. Specifically, a LabMD spreadsheet that was found on the P2P network contained names, Social Security numbers, dates of birth, health insurance informatio

article thumbnail

Is US Culture Veering Toward The Dark and Deadpan?

John Battelle's Searchblog

'The post Is US Culture Veering Toward The Dark and Deadpan? appeared first on John Battelle's Search Blog. ( image ) According to Wikipedia , “deadpan” is a uniquely American neologism less than a century old. The term arose from the slang term “pan,” for face: “Keep a dead pan,” a gangster told an associate in 1934′s The Gay Bride.

article thumbnail

Four Minutes on the Future of Marketing

John Battelle's Searchblog

'The post Four Minutes on the Future of Marketing appeared first on John Battelle's Search Blog. Earlier this year I sat down with a videographer at the Bazaarvoice Summit in Austin. He asked me about the future of marketing, in particular as it related to data and consumer behavior. Given what I announced earlier this morning, I thought you might find this short video worth a view.

Marketing 104
article thumbnail

The debut of “else”: Surveillance Everywhere and the Technological Wild West

John Battelle's Searchblog

'The post The debut of “else”: Surveillance Everywhere and the Technological Wild West appeared first on John Battelle's Search Blog. As we’re working on the book , Sara and I are planning on sharing some of the news items and blog posts that catch our attention each week. We’ll also plan on talking through some of the things we’re reading and working on in this space.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

else 8.26: Getting a Little Too Comfortable with Technology

John Battelle's Searchblog

'The post else 8.26: Getting a Little Too Comfortable with Technology appeared first on John Battelle's Search Blog. This week in the else round up we explore the responsibilities of technology builders and designers, what it will take for 3D printers and autonomous vehicles to go mainstream, and how humans will always find ways to misuse technology.

Privacy 92
article thumbnail

Great Content, Meet Great Targeting (And Reach)

John Battelle's Searchblog

'The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog. Today on the Federated site , I’ve posted a preview of something we’re working on for a Fall release. I’m cross posting a portion of it here, as I know many of you are interested in media and data-driven marketing. It’s no secret that Federated Media has deep roots in content marketing: We re-imagined CM for the modern web eight years ago, and since then have exec

article thumbnail

“Peanut Butter Cup Marketing” In A Few Minutes

John Battelle's Searchblog

'The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog. I had a chance to stop by Bloomberg TV yesterday to talk about “ content reachtargeting ” and the larger secular trends driving digital marketing today. Here’s the video: The post “Peanut Butter Cup Marketing” In A Few Minutes appeared first on John Battelle's Search Blog.

article thumbnail

ABW requires more than wireless computing

ChiefTech

'Its no surprise that a story about Activity Based Working (ABW) appeared in Fairfax newspaper''s IT section - after all, ABW is underpinned by the right information technology. In this instance, the Australian federal Department of Human Services (DHS) will trial ABW with 110 staff in a Canberra office. A range of supporting technologies will be deployed that include a practical mix of wireless networking, follow-me printing and voice-over internet protocol (VoIP).

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Create interactive surfaces using Kinect and a data projector

ChiefTech

'What do you get when you combined Microsoft Kinect for Windows, Windows 8 and a data projector? Ubi Interactive ''s software allows you to turn just about any surface into a multi-touch display: From the Ubi Interactive site: "Can I use any surface? Yes, you can- as long as the surface is visible to the depth sensor camera in the Kinect. You may want to make sure that the surface is neither too absorptive (such as some of the Plasma screens) nor reflective (such as some glass material).

IT 43
article thumbnail

Court Approves 20 Million Dollar Facebook Settlement

Hunton Privacy

On August 26, 2013, the U.S. District Court for the Northern District of California approved a settlement with Facebook, Inc., related to the company’s alleged misappropriation of certain Facebook members’ personal information, such as names and profile pictures, that was then used in ads to promote products and services via Facebook’s “Sponsored Stories” program.

article thumbnail

Obama Administration Releases Draft Preliminary Cybersecurity Framework

Hunton Privacy

On August 28, 2013, the Obama Administration issued several documents relating to the Cybersecurity Framework that the President called for in Executive Order 13636: Improving Critical Infrastructure Cybersecurity. The documents include: Preliminary Cybersecurity Framework (Discussion Draft) ; Preliminary Cybersecurity Framework: Illustrative Examples (Discussion Draft) ; Message to Senior Executives on the Cybersecurity Framework (Discussion Draft) ; and.

article thumbnail

ICO Stresses Importance of Encryption for Data Security

Hunton Privacy

On August 28, 2013, on the UK Information Commissioner’s Office’s (“ICO’s”) blog, Simon Rice, Technology Group Manager for the ICO, discussed the importance of encryption as a data security measure. He stated that storing any personal information is “inherently risky” but encryption can be a “simple and effective means” to safeguard personal information and reduce the risk of security breaches.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Hunton Launches Global Privacy Update Webcast Series

Hunton Privacy

As always, the privacy team at Hunton & Williams continues to closely monitor the latest global developments in data protection, privacy and cybersecurity, including progress on the proposed EU General Data Protection Regulation. To keep you informed, we will be hosting regular, 30-minute webcasts to provide brief updates on the most pressing issues.

Privacy 40
article thumbnail

Tiao Discusses Cyber Threats on CNBC

Hunton Privacy

On August 22, 2013, Hunton & Williams partner Paul M. Tiao was featured on CNBC’s Fast Money discussing NASDAQ’s recent crash. In the feature, “Are markets ready for cyber threats?”, Tiao talked about the steps the financial services industry has taken to protect against significant cybersecurity incidents, including “putting in best-of-breed information security policies” and “working across the industry to share information in a way that many other industries are not.”.

article thumbnail

New EU Breach Regulation in Force

Hunton Privacy

This week a new breach notification regulation takes effect across the EU. The Regulation on the measures applicable to the notification of personal data breaches under Directive 2002/58/EC (the “Regulation”) specifies the technical measures of how Internet service providers, telecommunications providers and other public electronic communications service (“ECS”) providers must notify of data breaches.

article thumbnail

Federal Court Finds No Reasonable Expectation of Privacy in Computer Files Shared on a Public Network

Hunton Privacy

On August 1, 2013, the United States District Court for the District of Minnesota denied a criminal defendant’s motion to suppress, holding that the defendant had no reasonable expectation of privacy in computer files he shared on a peer-to-peer network. In U.S. v. Hoffman , police used a software program to monitor multiple peer-to-peer networks for IP addresses that investigators had previously identified as possibly associated with child pornography.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

FTC Announces 3.5 Million Dollar Settlement in FCRA Case

Hunton Privacy

On August 15, 2013 the Federal Trade Commission announced a settlement with Certegy Check Services, Inc. (“Certegy”) stemming from allegations that Certegy violated various provisions of the Fair Credit Reporting Act (“FCRA”). The settlement agreement includes a $3.5 million civil penalty for “knowing violations … that constituted a pattern or practice of violations.”.

article thumbnail

Digital disruption - is technology disrupting us or are we disrupting with technology?

ChiefTech

'"The phrase ‘digital disruption’ is quite a misnomer because no technology truly disrupts unless it disrupts what we do and how we do it, not just what we do it with. This then begs the question: Is technology disrupting us or are we disrupting with technology?". Cross-posted from the DISRUPT.SYDNEY and Ripple Effect Group blogs.

IT 40
article thumbnail

FTC Seeks Input on Proposed COPPA Parental Consent Mechanism

Hunton Privacy

On August 15, 2013, the Federal Trade Commission announced that it is seeking public comment regarding a proposed mechanism to obtain verifiable parental consent in accordance with the new Children’s Online Privacy Protection Rule (the “COPPA Rule”) that came into effect July 1, 2013. The COPPA Rule requires operators of certain websites and online services to obtain a parent’s consent before collecting personal information online from a child under 13.

Privacy 40