This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'Stopping smart self promoters from dominating collaborative processes is far more important than most realize - overcommunicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.
'The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. This post marks the 10th edition of my annual predictions – it’s quite possibly the only thing I’ve consistently done for a decade in my life (besides this site, of course, which is going into its 12th year). But gazing into 2014 has been the hardest of the bunch – and not because the industry is getting so complicated.
Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.
By now, a lot of you probably know that a really important action to take, once your DB2 subsystem is at the Version 10 (conversion mode) level, is to rebind your plans and packages. Taking this action delivers several benefits: It tends to improve the CPU efficiency of package execution. Obviously, you could see performance gains related to positive access path changes, as the optimizer gets smarter with each new release of DB2; however, even if access paths associated with a package don't chan
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Following the initial planning and construction phases, the presence and benefits of operating Data Centers in Northern Virginia seem currently limited, or perhaps simply not well-known, in terms of local, positive community visibility and impact (beyond direct revenue via commercial taxes and the indirect boost to community bond ratings and real estate values).
Recent media attention focused on the security breach that affected millions of Target customers has increased interest in cyber insurance to cover the financial losses associated with these types of events. As insurers aggressively market insurance products to protect against cyber risks, it’s important to note differences in the language carriers have chosen to include in their policy forms.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Recent media attention focused on the security breach that affected millions of Target customers has increased interest in cyber insurance to cover the financial losses associated with these types of events. As insurers aggressively market insurance products to protect against cyber risks, it’s important to note differences in the language carriers have chosen to include in their policy forms.
'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope'
'The post A Big Day For Federated, and the Birth of Sovrn Holdings appeared first on John Battelle's Search Blog. Today marks a big milestone for Federated Media , the company we launched way back in 2005. As you can read here, LIN Media is acquiring Federated Media’s brand and content marketing business , and a new company, sovrn Holdings, Inc.
From the very beginning, you've been able to add a column to an existing DB2 for z/OS table by way of the SQL statement ALTER TABLE with the ADD COLUMN option. In fact, relative ease of logical database design modification had a lot to do with DB2 becoming a very widely used DBMS. Of course, there are times when what you want to do is remove a column from an existing table.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Hmmm.I think Blogs are good for SEO. A. The SEO customer SAYS: "I'll write a Blog article, you SEO it, and we'll post it as part of our online marketing!" B. The SEO customer THINKS: "I'll quickly write a fun, helpful blog entry (or get a Guest Blogger!), and my SEO person will highlight it and tag it with some keywords – and the SEO will be done! This sounds pretty quick and easy, actually, so maybe I'll just get an Intern or check out "SEO 101" for next time….
On January 29, 2014, the National Security Agency (“NSA”) announced that Rebecca Richards has been appointed to serve as the NSA’s new Civil Liberties and Privacy Officer. Ms. Richards, who previously worked as the Senior Director for Privacy Compliance at the Department of Homeland Security, will advise the NSA Director on civil liberties and privacy issues and implement reforms in those areas.
'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope'
'The post Google Buys Nest appeared first on John Battelle's Search Blog. Today comes the news that Google is buying Nest , a move that, upon reflection, should have been obvious (the price tag of more than $3 billion, not so obvious!). If the company is truly executing its mission of helping us organize the world’s information and make it available, it makes sense to have a major play in the Internet of Things, in particular, those things that consumers view as extremely valuable.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Listen to Your Customers. shobana.lv@cgi.com. Thu, 01/09/2014 - 06:38. Why "Social Listening"? A few years ago, when the chief executive of a medium-sized consumer business mentioned to me in exasperation, “There are 130,000 fans for our brand in a Facebook group that we didn’t create. What do I do about them?” it provided a compelling justification for this question, "Why do Social Listening?".
(Reposted from the NVTC B&EA LinkedIn Group for Members) Thanks so much to the attendees of the recent NVTC.org Business and Enterprise Architecture Committee meeting, with guest star Filippo Morelli (of the 9Starts Loudoun Tech Startup group, plus Chris, Ted and Tom from the Loudoun County Startup Community ) discussing the intersection of Enterprise Architecture and the Northern Virginia startup community.
On January 28, 2014, the Federal Court of Justice of Germany clarified the scope of a data subject’s right of access to personal data in the context of credit scoring. Germany’s Federal Data Protection Act contains detailed and expansive provisions on the right of access where personal data are processed and shared to determine a data subject’s future behavior.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.
'The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. CES is a huge event, one that almost everybody in our industry has been to at least once, if not multiple times. I’ve been going for the better part of 25 years, so I’ve seen a lot of change. And after my first day here, the biggest takeaway I’m getting is a sense of deja vu.
'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope.
'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope.
'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail.
'The post else 1.20: “The future is much simpler than you think.” appeared first on John Battelle's Search Blog. This week we thought about the data in our homes, connecting the Internet of Things, and what’s next for the openness of the internet. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
'The post else 1.6: “Ghosts in the machine” appeared first on John Battelle's Search Blog. Back from the holiday break, we look at data’s influence on culture; glass, both as a material for transmitting bits, and as a wearable interface; and the (im)permanence of data. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
'The post else 1.13: “Keep the instrument in its place” appeared first on John Battelle's Search Blog. This week, we look at more applications machine learning, new wearables from CES, and some visions for the coming year. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
On January 28, 2014, Data Protection Day, Vice-President of the European Commission and Commissioner for Justice Fundamental Rights and Citizenship Viviane Reding gave a speech in Brussels proposing a new data protection compact for Europe. She focused on three key themes: (1) the need to rebuild trust in data processing, (2) the current state of data protection in the EU, and (3) a new data protection compact for Europe.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content