September, 2012

article thumbnail

Connecting with traditional business language and conventions

Collaboration 2.0

John Hagel believes exploiting process exceptions is the way to find value in social initiatives; the challenge is often finding a common language with the business world.

238
238
article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

The post Am I An Outlier, Or Are Apple Products No Longer Easy To Use? appeared first on John Battelle's Search Blog. I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 30 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back.

IT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

The history of the Internet, the World Wide Web and corporate intranets share a common heritage. Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. Before we look at what this means for intranets, I want to spend some time considering their history. In this post: Where did intranets comes from?

Cloud 89
article thumbnail

DB2 10 for z/OS: New Options for Trimming and Upgrading Indexes

Robert's Db2

First, some explanation as to what I mean by "trimming and upgrading" indexes. My use of "trimming" refers to reducing the number of indexes defined on tables, through elimination of indexes that aren't providing value. Having fewer indexes on a table is good for cost efficiency, as every index increases the CPU cost of every insert and delete operation targeting the table (and every update of an indexed column), increases the cost of execution of several DB2 utilities (including LOAD, REORG, an

Access 54
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Create a Social Community of Trust Along With Your Digital Services Governance Framework

Interactive Information Management

The Digital Services Governance Recommendations were recently released, supporting the US Federal Government's Digital Government Strategy Milestone Action #4.2 to establish agency-wide governance structures for developing and delivering digital services. Figure 1 - From: "Digital Services Governance Recommendations" While extremely important from a policy and procedure perspective within an Agency's information management and communications enterprise, these recommendations only very lightly re

More Trending

article thumbnail

Cloud naivety and electric car dreams

Collaboration 2.0

Harnessing the power of cloud computing requires that you understand underlying concepts: loose understanding can cause more harm than good.

Cloud 235
article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

The post The Facebook Ad Network Is Here appeared first on John Battelle's Search Blog. It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network.

Education 110
article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

Another year has passed and Step Two have released their annual intranet award winners. Its always interesting to poke around the list of companies. An Elgg-based solution wins again. Mitre won an award from Step Two in 2010 for its Elgg-based employee network. This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award.

article thumbnail

Linux on System z: a Better Place for Your DB2 for z/OS Client-Server Applications

Robert's Db2

In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. Back around 2003, when I was on the user side of the DB2 community, I was part of a team charged with developing a plan for the simplification and streamlining of my company's IT infrastructure. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running pr

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

FTC Settles Spying Case

Hunton Privacy

On September 25, 2012, the Federal Trade Commission announced that it had settled a case involving allegations of spying by software company DesignerWare, LLC (“DesignerWare”) and several rent-to-own companies that rent computers to consumers, such as Aaron’s, Inc., ColorTyme, Inc., and Premier Rental Purchase. The FTC collaborated with Illinois Attorney General Lisa Madigan in its investigation.

article thumbnail

Pension Schemes Failing on Data Privacy

Privacy and Cybersecurity Law

We are all familiar with the ongoing saga of data breach, notifications to the Information Commissioner’s Office and the risk […].

article thumbnail

Experiential over intellectual - the enterprise parties on.

Collaboration 2.0

Musical entertainment, motivational speakers entice enterprise conference attendees, but the gap between understanding and doing remains large.

233
233
article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

The post Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough appeared first on John Battelle's Search Blog. I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across

IT 108
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The digital workplace - virtual work or digitally augmented work communities?

ChiefTech

Listening to the european-driven agenda on the " digital workplace ", the core focus is on enabling people to work remotely (aka telework or telecommunting). Mark Morrell defines it as : "Work is what you do, not where you go to.". An academic panel of experts thinks: Forget whether it's practical to bring your own technology devices to work - in the future, you may not even have an office. ….

IT 69
article thumbnail

The joys and hazards of multi-process browser security

Scary Beasts Security

Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation methods. Spray techniques Probably the most significant security effect of multi-process models is the effect on spraying. Spraying, of course, is a technique where parts of a processes' heap or address space are filled with data helpful for exploitation.

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

On September 27, 2012, the European Commission presented its new strategy on cloud computing, entitled “ Unleashing the Potential of Cloud Computing in Europe.” The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The newly-released strategy follows the Commission’s consultation on cloud computing and the Article 29 Working Party’s Opinion on cloud computing.

Cloud 40
article thumbnail

Wither ‘Big Brother’? B.C. Privacy Commissioner Reins-in Government of British Columbia Criminal Record Checks

Privacy and Cybersecurity Law

In keeping with her stance on overly-invasive employee background checks, British Columbia’s Information and Privacy Commissioner, Elizabeth Denham, has issued […].

Privacy 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Salesforce demonstrating great momentum

Collaboration 2.0

Branson & Benioff demonstrate world class salesman human qualities, SalesForce selling ever more connected and intelligent businesses

229
229
article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

The post Tweets Belong To The User… And Words Are Complicated appeared first on John Battelle's Search Blog. ( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted b

Mining 99
article thumbnail

Mind the gap: Social on the inside, to support social on the outside

ChiefTech

One of the things I often remind clients is that if you want to be social on the outside, you need to be social on the inside too (that's sort of a short definition of "social business" too). I'm lucky to work not just within the isolated internal collaboration domain, but across the spectrum of internal to external and back again. So, interesting to see Hootsuite release a new internal " conversations " feature: They aren't the only vendor that supports features like this of course.

article thumbnail

Every Great Business Is An Argument (from 2008)

John Battelle's Searchblog

The post Every Great Business Is An Argument (from 2008) appeared first on John Battelle's Search Blog. Completely through happenstance, I came upon this post I wrote for American Express more than four years ago. I think it still stands up today. I never posted it on Searchblog, and I’d like my writing to be collected here. So call this a lightly edited blast from the archives… — Every Great Business Is An Argument.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across four or so social networks.

IT 83
article thumbnail

Bing Tries Harder, But For Me, It’s A Draw

John Battelle's Searchblog

It’s not easy being number two. As a marketer, you have limited choices – you can pretend you’re not defined by the market leader, or, you can embrace your position and go directly after your nemesis. For years, Bing executives have privately complained about how hard it is to “break the Google habit,” even as they refused to market directly against Google.

article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 20 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back. Till now. I’m not saying I’m switching, but I sure am open to a better solution. Because the past year or so has been dominated by the kind of computing nightmares that used to be the defining experience of my Windows-PC-wielding fr

IT 76
article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network. And this isn’t just an on-domain network (where you can buy ads across Facebook’s domain), but rather, it’s a true cross-domain network – just like AdMob on mobile, or

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted by an Occupy Wall St. protestor.

Mining 64
article thumbnail

The Victorian Internet – The Technology That Started It All

John Battelle's Searchblog

I’m at least three books behind in my reviews, so I figured I’d bang out a fun one today: The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers by Tom Standage. This 1998 book is now a classic – written as the Web was exploding on the scene, it reminded us that this movie has run before, 150 years in the past, with the rise of the telegraph.

IT 63
article thumbnail

Activity streams shouldn't wag the dog

ChiefTech

The constant challenge for social software is to boil down the ongoing process of technology change happening around us into bite sized concepts that people can hang on to. Its the tyranny of reductionist thinking, because the moment we do that we often lose sight of what is actually happening. To that point, one of the most contentious issues that falls into this trap is the idea of activity streams versus email.