January, 2014

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

'The post Predictions 2014: A Difficult Year To See appeared first on John Battelle's Search Blog. This post marks the 10th edition of my annual predictions – it’s quite possibly the only thing I’ve consistently done for a decade in my life (besides this site, of course, which is going into its 12th year). But gazing into 2014 has been the hardest of the bunch – and not because the industry is getting so complicated.

IT 111
article thumbnail

7 habits of highly overrated people - managing over communicators and self promoters

Collaboration 2.0

'Stopping smart self promoters from dominating collaborative processes is far more important than most realize - overcommunicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phone screen size: bigger isn't always better

Elie

Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.

article thumbnail

DB2 10 (and beyond) for z/OS: Being Smart About More RELEASE(DEALLOCATE)

Robert's Db2

By now, a lot of you probably know that a really important action to take, once your DB2 subsystem is at the Version 10 (conversion mode) level, is to rebind your plans and packages. Taking this action delivers several benefits: It tends to improve the CPU efficiency of package execution. Obviously, you could see performance gains related to positive access path changes, as the optimizer gets smarter with each new release of DB2; however, even if access paths associated with a package don't chan

Access 48
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

Following the initial planning and construction phases, the presence and benefits of operating Data Centers in Northern Virginia seem currently limited, or perhaps simply not well-known, in terms of local, positive community visibility and impact (beyond direct revenue via commercial taxes and the indirect boost to community bond ratings and real estate values).

More Trending

article thumbnail

A Big Day For Federated, and the Birth of Sovrn Holdings

John Battelle's Searchblog

'The post A Big Day For Federated, and the Birth of Sovrn Holdings appeared first on John Battelle's Search Blog. Today marks a big milestone for Federated Media , the company we launched way back in 2005. As you can read here, LIN Media is acquiring Federated Media’s brand and content marketing business , and a new company, sovrn Holdings, Inc.

Marketing 111
article thumbnail

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope'

107
107
article thumbnail

Obama’s European Privacy Headache

Privacy and Cybersecurity Law

Since the revelations of Edward Snowden, there has been a wave of data privacy repercussions in Europe. Snowden, the former […].

Privacy 40
article thumbnail

DB2 for z/OS: Answering Some Questions About Adding and Dropping Table Columns

Robert's Db2

From the very beginning, you've been able to add a column to an existing DB2 for z/OS table by way of the SQL statement ALTER TABLE with the ADD COLUMN option. In fact, relative ease of logical database design modification had a lot to do with DB2 becoming a very widely used DBMS. Of course, there are times when what you want to do is remove a column from an existing table.

IT 48
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A Day in the Life of an SEO'd Blog Article, from the Local Washington DC SEO Provider's Perspective

Interactive Information Management

Hmmm.I think Blogs are good for SEO. A. The SEO customer SAYS: "I'll write a Blog article, you SEO it, and we'll post it as part of our online marketing!" B. The SEO customer THINKS: "I'll quickly write a fun, helpful blog entry (or get a Guest Blogger!), and my SEO person will highlight it and tag it with some keywords – and the SEO will be done! This sounds pretty quick and easy, actually, so maybe I'll just get an Intern or check out "SEO 101" for next time….

article thumbnail

NSA Appoints Chief Privacy Officer

Hunton Privacy

On January 29, 2014, the National Security Agency (“NSA”) announced that Rebecca Richards has been appointed to serve as the NSA’s new Civil Liberties and Privacy Officer. Ms. Richards, who previously worked as the Senior Director for Privacy Compliance at the Department of Homeland Security, will advise the NSA Director on civil liberties and privacy issues and implement reforms in those areas.

Privacy 40
article thumbnail

Google Buys Nest

John Battelle's Searchblog

'The post Google Buys Nest appeared first on John Battelle's Search Blog. Today comes the news that Google is buying Nest , a move that, upon reflection, should have been obvious (the price tag of more than $3 billion, not so obvious!). If the company is truly executing its mission of helping us organize the world’s information and make it available, it makes sense to have a major play in the Internet of Things, in particular, those things that consumers view as extremely valuable.

Marketing 108
article thumbnail

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope'

107
107
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Data privacy: a look ahead at 2014

Privacy and Cybersecurity Law

So as the latest Snowdon revelations (oh … and the New Year Holiday fun has subsided) how about we look […].

article thumbnail

Listen to Your Customers

CGI

Listen to Your Customers. shobana.lv@cgi.com. Thu, 01/09/2014 - 06:38. Why "Social Listening"? A few years ago, when the chief executive of a medium-sized consumer business mentioned to me in exasperation, “There are 130,000 fans for our brand in a Facebook group that we didn’t create. What do I do about them?” it provided a compelling justification for this question, "Why do Social Listening?".

article thumbnail

Northern Virginia Enterprise Architects - NVTC.org B&EA Committee - EA and Startups in Northern Virginia & Loudoun County

Interactive Information Management

(Reposted from the NVTC B&EA LinkedIn Group for Members) Thanks so much to the attendees of the recent NVTC.org Business and Enterprise Architecture Committee meeting, with guest star Filippo Morelli (of the 9Starts Loudoun Tech Startup group, plus Chris, Ted and Tom from the Loudoun County Startup Community ) discussing the intersection of Enterprise Architecture and the Northern Virginia startup community.

article thumbnail

Federal German Court Rules on Credit Scoring and Data Subject Access Rights

Hunton Privacy

On January 28, 2014, the Federal Court of Justice of Germany clarified the scope of a data subject’s right of access to personal data in the context of credit scoring. Germany’s Federal Data Protection Act contains detailed and expansive provisions on the right of access where personal data are processed and shared to determine a data subject’s future behavior.

Access 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

'The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. CES is a huge event, one that almost everybody in our industry has been to at least once, if not multiple times. I’ve been going for the better part of 25 years, so I’ve seen a lot of change. And after my first day here, the biggest takeaway I’m getting is a sense of deja vu.

article thumbnail

7 habits of highly overrated people: Managing self-promoters

Collaboration 2.0

'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail. Enterprise 2.

article thumbnail

How Canada’s Anti-Spam Enforcers will Cooperate, Coordinate, Share Information

Privacy and Cybersecurity Law

Canada’s Anti-Spam Legislation (CASL) brings with it new legal violations and penalties, some of which become effective as of July 1, 2014. […].

IT 40
article thumbnail

else 1.20: “The future is much simpler than you think.”

John Battelle's Searchblog

'The post else 1.20: “The future is much simpler than you think.” appeared first on John Battelle's Search Blog. This week we thought about the data in our homes, connecting the Internet of Things, and what’s next for the openness of the internet. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

else 1.6: “Ghosts in the machine”

John Battelle's Searchblog

'The post else 1.6: “Ghosts in the machine” appeared first on John Battelle's Search Blog. Back from the holiday break, we look at data’s influence on culture; glass, both as a material for transmitting bits, and as a wearable interface; and the (im)permanence of data. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

else 1.13: “Keep the instrument in its place”

John Battelle's Searchblog

'The post else 1.13: “Keep the instrument in its place” appeared first on John Battelle's Search Blog. This week, we look at more applications machine learning, new wearables from CES, and some visions for the coming year. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 74
article thumbnail

7 habits of highly overrated people: Managing self-promoters

Collaboration 2.0

'Stopping smart self promoters from dominating collaborative processes is far more important than most realize; over-communicators can wreck workflows and digital commons, causing them to fail.

article thumbnail

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope.

45
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Commissioner Reding Calls for New European Data Protection Compact

Hunton Privacy

On January 28, 2014, Data Protection Day, Vice-President of the European Commission and Commissioner for Justice Fundamental Rights and Citizenship Viviane Reding gave a speech in Brussels proposing a new data protection compact for Europe. She focused on three key themes: (1) the need to rebuild trust in data processing, (2) the current state of data protection in the EU, and (3) a new data protection compact for Europe.

article thumbnail

SKA: collaboration to map a billion galaxies to the edge of our Universe

Collaboration 2.0

'Einstein''s Theory of Relativity, Newton''s Laws of Motion and other fundamental assumptions may be revised through colossal data analysis exploration flowing from the ''Square Kilometre Array'' Radio Telescope.

40
article thumbnail

PCLOB Report Concludes NSA’s Bulk Collection of Customer Phone Records Is Unlawful

Hunton Privacy

On January 23, 2014, the Privacy and Civil Liberties Oversight Board (“PCLOB”) released a report (the “Report”) concluding that the National Security Agency (“NSA”) does not have a valid legal basis for its bulk telephone records collection program. The NSA’s bulk collection of consumer telephone records has been under increased scrutiny since Edward Snowden leaked information about the program in June 2013, and recently has faced legal challenges.

Privacy 40