This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Investing in long lasting, good quality ergonomic work furniture costs about the same as a new computer, but isn’t as seductive as a new Apple laptop despite many great design attributes. (…I bought an expensive new office chair and am justifying it to myself!
Last week I spent an afternoon down at Facebook, as I mentioned here. While at Facebook I met with Blake Ross , Direct of Product (and well known in web circles as one of the creators of Firefox). Talk naturally turned to the implications of Google’s controversial integration of Google+ into its search results – a move that must both terrify (OMG, Google is gunning for us!
Last week, a DBA asked me a few questions about LOBs (large objects) in a DB2 for z/OS context. Most of you probably know that a LOB is a DB2 data type. There are actually two LOB data types: BLOB (binary large object -- a string of bits) and CLOB (character large object -- a string of characters). One key difference between LOB and non-LOB data types is capacity with respect to the size of individual data values: a table column defined with the VARBINARY or VARCHAR attribute (these being the hi
On January 19, 2012, Minnesota Attorney General Lori Swanson announced a lawsuit against Accretive Health, Inc., (“Accretive”) for violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and its implementing regulations, the Minnesota Health Records Act, Minnesota’s debt collection statutes and Minnesota’s consumer protection laws.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Personal Data Stores – Get ready for a step change. ravi.kumarv@cgi.com. Fri, 01/06/2012 - 08:00. What if Facebook, Google, Amazon etc all started paying you for the personal data you create whilst browsing their sites? Well, this may be a reality sooner than you think. With many organisations making millions from selling targeted advertising using user generated profiles and given that Forrester say that more than $2 billion is spent each year on ‘third party data about individuals’ is clear th
Here's a curiousity that's developing in modern browser security: The security of a given browser is dominated by how much effort it puts into other peoples' problems. This may sound absurd at first but we're heading towards a world where the main browsers will have (with a few notable exceptions): Rapid autoupdate to fix security issues. Some form of sandboxing.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Here's a curiousity that's developing in modern browser security: The security of a given browser is dominated by how much effort it puts into other peoples' problems. This may sound absurd at first but we're heading towards a world where the main browsers will have (with a few notable exceptions): Rapid autoupdate to fix security issues. Some form of sandboxing.
I’m going to add another Saturday morning sketch to this site, and offer a caveat to you all: I’ve not bounced this idea off many folks, and the seed of it comes from a source who is unreservedly biased about all this. But I thought this worth airing out, so here you have it. Given that Google+ results are dominating so many SERPs these days, Google is clearly leveraging its power in search to build up Google+.
In my previous entry , I provided information pertaining to the amount of data that can be stored in a LOB column of a mainframe DB2 table (LOBs being DB2 data values that can exceed 32 KB in length). I made brief references in that entry to significant enhancements in LOB data management capabilities delivered via DB2 10 for z/OS. I'll describe those enhancements -- the most significant since LOB support was introduced with DB2 Version 6 -- in a multi-part entry, of which this is part 1.
On January 25, 2012, the European Commission released a data protection law reform package , including its proposed General Data Protection Regulation (the “Proposed Regulation”). The UK Information Commissioner’s Office (“ICO”) has reacted positively to the Proposed Regulation, in particular commending efforts to strengthen the rights of individuals, the recognition of important privacy concepts such as privacy by design and privacy impact assessments, and new accountability requirements to ens
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
A startlingly unhelpful TV commercial manages to both undermine Blackberry’s enterprise credibility while apparently encouraging personal activities on company time
Perusing my feeds today, I saw this post from Google’s blog: Search, plus Your World. In the post, Google extols the virtues of incorporating results such as “your personal content or things shared with you by people you care about. These wonderful people and this rich personal content is currently missing from your search experience. Search is still limited to a universe of webpages created publicly, mostly by people you’ve never met.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
( image ) In today’s business climate, it’s not normal for corporations to cooperate with each other when it comes to sharing core assets. In fact, it’s rather unusual. Even when businesses do share, it’s usually for some ulterior motive, a laying of groundwork for future chess moves which insure eventual domination over the competition.
( image ) Dialing in from the department of Pure Speculation… As we all attempt to digest the implications of last week’s Google+ integration, I’ve also be thinking about Facebook’s next moves. There’s been plenty of speculation in the past that Facebook might compete with Google directly – by creating a full web search engine.
One of only two photos to emerge from last night's Wilco concert, image Eric Henegen. Last night my wife and I did something quite rare – we went to a concert on a Sunday night, in San Francisco, with three other couples (Wilco, playing at The Warfield). If you don’t have kids and don’t live in the suburbs, you probably think we’re pretty lame, and I suppose compared to city dwellers, we most certainly are.
As I have written in previous predictions, I’ve been focusing on the Internet Big Five lately, and expect that to continue this year, as the group, collectively, are something of a “character” in my upcoming book (as is Twitter, the “free radical”). Other characters include “The Government” and “Corporations,” so expect predictions about those players in the next few days.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
( image ) I’ve just been sent an official response from Google to the updated version of my story posted yesterday ( Compete To Death, or Cooperate to Compete? ). In that story, I reported about 2009 negotiations over incorporation of Facebook data into Google search. I quoted a source familiar with the negotiations on the Facebook side, who told me “Senior executives at Google insisted that for technical reasons all information would need to be public and available to all,” and “The only
( image ) This article - Early Facebook App Causes Is Being Reborn As A Polished Web Site For Good – caught my eye as I was nodding off last night (thanks so much for moving the web into my bedroom, Flipboard. No really.). Now, it didn’t catch my eye because of its subject – Causes – but because of what its subject was doing: refocusing its business back out on the Independent Web , from its original home in the zoological garden that is the Facebook platform.
As in, who gets the best deal, why didn’t that deal go down, how do I get a deal, what should the deal terms be? This is of course in the air given the whole Google+ fracas, but it’s part of a larger framework I’m thinking through and hope to write about. On the issue of “deals,” however, a little sketching out loud seems worthwhile.
Just saw this hilarious Hitler video. If you know the genre and have been reading about Google+, then you know everything you need to know to enjoy this. (By the way, someone told me about this, so I searched for it on Google. And all I got was Google+ results, not the actual video, even though I searched for it by name. Therein lies the problem, Google).
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
After pushing my way through a number of difficult but important reads, it was a pleasure to rip through Steven Johnson’s Where Good Ideas Come From: A Natural History of Innovation. I consider Steven a friend and colleague, and that will color my review of his most recent work (it came out in paperback last Fall). In short, I really liked the book.
( image is a shot of my copy of the first Wired magazine, signed by our founding team ). I just read this NYT piece on the United States’ approach to unmanned warfare: Do Drones Undermine Democracy? From it: There is not a single new manned combat aircraft under research and development at any major Western aerospace company, and the Air Force is training more operators of unmanned aerial systems than fighter and bomber pilots combined.
Amidst all the chaos, tragedy, and tumult that was 2011, I noticed one very clear theme: Most of us are struggling with the role corporations play in our society. The 14th Amendment (yes, the one that banished slavery) established corporations, in the US, as “persons” in the legal sense. In 2010, Citizens v. United sanctified corporations as equivalent to you and I in terms of political speech; in 2011, we began to see the impact of that decision on our political process here in the
About 14 months ago, I responded to myriad “RSS is Dead” stories by asking you, my RSS readers , if you were really reading. At that point, Google’s Feedburner service was telling me I had more than 200,000 subscribers, but it didn’t feel like the lights were on – I mean, that’s a lot of people, but my pageviews were low, and with RSS, it’s really hard to know if folks are reading you, because the engagement happens on the reader, not here on the site.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Google didn’t have a great earnings call today – the company missed Wall St. estimates and the stock is getting hammered in after hours trading - it’s down 9 percent, which is serious whiplash for a major stock in one day. But while there’s probably much to say about the earnings call – in particular whether Google’s core CPC business is starting to erode (might that be due to Facebook, Wall St. wonders?
2012 is going to be a year of contrasts – of consolidation of power for the Internet Big Five , and fragmentation and disruption of that power due to both startups as well as government and consumer action. I’ve spent the past few weeks jotting down thoughts for 2012, and hope to do the Year That Is About To Be justice in the following set of posts.
For my third prediction of the year, I’m going with one just a tad bit less obvious than “Facebook will go public.” There seems to be no doubt about that event occurring this year, though I’ve certainly heard intelligent folks argue that Facebook can and should figure out how to stay private. I’ve argued that Facebook ought to be a public company , if only to be held (somewhat) accountable given all the data it has on our lives.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content