This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
John Hagel believes exploiting process exceptions is the way to find value in social initiatives; the challenge is often finding a common language with the business world.
The post Am I An Outlier, Or Are Apple Products No Longer Easy To Use? appeared first on John Battelle's Search Blog. I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 30 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back.
The history of the Internet, the World Wide Web and corporate intranets share a common heritage. Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. Before we look at what this means for intranets, I want to spend some time considering their history. In this post: Where did intranets comes from?
First, some explanation as to what I mean by "trimming and upgrading" indexes. My use of "trimming" refers to reducing the number of indexes defined on tables, through elimination of indexes that aren't providing value. Having fewer indexes on a table is good for cost efficiency, as every index increases the CPU cost of every insert and delete operation targeting the table (and every update of an indexed column), increases the cost of execution of several DB2 utilities (including LOAD, REORG, an
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
The Digital Services Governance Recommendations were recently released, supporting the US Federal Government's Digital Government Strategy Milestone Action #4.2 to establish agency-wide governance structures for developing and delivering digital services. Figure 1 - From: "Digital Services Governance Recommendations" While extremely important from a policy and procedure perspective within an Agency's information management and communications enterprise, these recommendations only very lightly re
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
The post The Facebook Ad Network Is Here appeared first on John Battelle's Search Blog. It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network.
Another year has passed and Step Two have released their annual intranet award winners. Its always interesting to poke around the list of companies. An Elgg-based solution wins again. Mitre won an award from Step Two in 2010 for its Elgg-based employee network. This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award.
In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. Back around 2003, when I was on the user side of the DB2 community, I was part of a team charged with developing a plan for the simplification and streamlining of my company's IT infrastructure. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running pr
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
On September 25, 2012, the Federal Trade Commission announced that it had settled a case involving allegations of spying by software company DesignerWare, LLC (“DesignerWare”) and several rent-to-own companies that rent computers to consumers, such as Aaron’s, Inc., ColorTyme, Inc., and Premier Rental Purchase. The FTC collaborated with Illinois Attorney General Lisa Madigan in its investigation.
The post Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough appeared first on John Battelle's Search Blog. I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Listening to the european-driven agenda on the " digital workplace ", the core focus is on enabling people to work remotely (aka telework or telecommunting). Mark Morrell defines it as : "Work is what you do, not where you go to.". An academic panel of experts thinks: Forget whether it's practical to bring your own technology devices to work - in the future, you may not even have an office. ….
Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation methods. Spray techniques Probably the most significant security effect of multi-process models is the effect on spraying. Spraying, of course, is a technique where parts of a processes' heap or address space are filled with data helpful for exploitation.
On September 27, 2012, the European Commission presented its new strategy on cloud computing, entitled “ Unleashing the Potential of Cloud Computing in Europe.” The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The newly-released strategy follows the Commission’s consultation on cloud computing and the Article 29 Working Party’s Opinion on cloud computing.
In keeping with her stance on overly-invasive employee background checks, British Columbia’s Information and Privacy Commissioner, Elizabeth Denham, has issued […].
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The post Tweets Belong To The User… And Words Are Complicated appeared first on John Battelle's Search Blog. ( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted b
One of the things I often remind clients is that if you want to be social on the outside, you need to be social on the inside too (that's sort of a short definition of "social business" too). I'm lucky to work not just within the isolated internal collaboration domain, but across the spectrum of internal to external and back again. So, interesting to see Hootsuite release a new internal " conversations " feature: They aren't the only vendor that supports features like this of course.
The post Every Great Business Is An Argument (from 2008) appeared first on John Battelle's Search Blog. Completely through happenstance, I came upon this post I wrote for American Express more than four years ago. I think it still stands up today. I never posted it on Searchblog, and I’d like my writing to be collected here. So call this a lightly edited blast from the archives… — Every Great Business Is An Argument.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across four or so social networks.
It’s not easy being number two. As a marketer, you have limited choices – you can pretend you’re not defined by the market leader, or, you can embrace your position and go directly after your nemesis. For years, Bing executives have privately complained about how hard it is to “break the Google habit,” even as they refused to market directly against Google.
I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 20 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back. Till now. I’m not saying I’m switching, but I sure am open to a better solution. Because the past year or so has been dominated by the kind of computing nightmares that used to be the defining experience of my Windows-PC-wielding fr
It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network. And this isn’t just an on-domain network (where you can buy ads across Facebook’s domain), but rather, it’s a true cross-domain network – just like AdMob on mobile, or
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted by an Occupy Wall St. protestor.
I’m at least three books behind in my reviews, so I figured I’d bang out a fun one today: The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers by Tom Standage. This 1998 book is now a classic – written as the Web was exploding on the scene, it reminded us that this movie has run before, 150 years in the past, with the rise of the telegraph.
The constant challenge for social software is to boil down the ongoing process of technology change happening around us into bite sized concepts that people can hang on to. Its the tyranny of reductionist thinking, because the moment we do that we often lose sight of what is actually happening. To that point, one of the most contentious issues that falls into this trap is the idea of activity streams versus email.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content