September, 2012

article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

The post Am I An Outlier, Or Are Apple Products No Longer Easy To Use? appeared first on John Battelle's Search Blog. I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 30 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back.

IT 112
article thumbnail

Connecting with traditional business language and conventions

Collaboration 2.0

John Hagel believes exploiting process exceptions is the way to find value in social initiatives; the challenge is often finding a common language with the business world.

95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

The history of the Internet, the World Wide Web and corporate intranets share a common heritage. Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. Before we look at what this means for intranets, I want to spend some time considering their history. In this post: Where did intranets comes from?

Cloud 89
article thumbnail

DB2 10 for z/OS: New Options for Trimming and Upgrading Indexes

Robert's Db2

First, some explanation as to what I mean by "trimming and upgrading" indexes. My use of "trimming" refers to reducing the number of indexes defined on tables, through elimination of indexes that aren't providing value. Having fewer indexes on a table is good for cost efficiency, as every index increases the CPU cost of every insert and delete operation targeting the table (and every update of an indexed column), increases the cost of execution of several DB2 utilities (including LOAD, REORG, an

Access 54
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Create a Social Community of Trust Along With Your Digital Services Governance Framework

Interactive Information Management

The Digital Services Governance Recommendations were recently released, supporting the US Federal Government's Digital Government Strategy Milestone Action #4.2 to establish agency-wide governance structures for developing and delivering digital services. Figure 1 - From: "Digital Services Governance Recommendations" While extremely important from a policy and procedure perspective within an Agency's information management and communications enterprise, these recommendations only very lightly re

More Trending

article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

The post The Facebook Ad Network Is Here appeared first on John Battelle's Search Blog. It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network.

Education 110
article thumbnail

Cloud naivety and electric car dreams

Collaboration 2.0

Harnessing the power of cloud computing requires that you understand underlying concepts: loose understanding can cause more harm than good.

Cloud 94
article thumbnail

Notes and observations about the 2012 intranet innovation award winners

ChiefTech

Another year has passed and Step Two have released their annual intranet award winners. Its always interesting to poke around the list of companies. An Elgg-based solution wins again. Mitre won an award from Step Two in 2010 for its Elgg-based employee network. This year, Pleio, a customised version of Elgg developed by the Dutch government , also won an award.

article thumbnail

Linux on System z: a Better Place for Your DB2 for z/OS Client-Server Applications

Robert's Db2

In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. Back around 2003, when I was on the user side of the DB2 community, I was part of a team charged with developing a plan for the simplification and streamlining of my company's IT infrastructure. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running pr

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Pension Schemes Failing on Data Privacy

Privacy and Cybersecurity Law

We are all familiar with the ongoing saga of data breach, notifications to the Information Commissioner’s Office and the risk […].

article thumbnail

European Commission Issues New Cloud Computing Strategy

Hunton Privacy

On September 27, 2012, the European Commission presented its new strategy on cloud computing, entitled “ Unleashing the Potential of Cloud Computing in Europe.” The Commission’s strategy is outlined on a new webpage that includes a communication document and a more detailed staff working paper. The newly-released strategy follows the Commission’s consultation on cloud computing and the Article 29 Working Party’s Opinion on cloud computing.

Cloud 40
article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

The post Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough appeared first on John Battelle's Search Blog. I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across

IT 108
article thumbnail

Experiential over intellectual - the enterprise parties on.

Collaboration 2.0

Musical entertainment, motivational speakers entice enterprise conference attendees, but the gap between understanding and doing remains large.

93
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The digital workplace - virtual work or digitally augmented work communities?

ChiefTech

Listening to the european-driven agenda on the " digital workplace ", the core focus is on enabling people to work remotely (aka telework or telecommunting). Mark Morrell defines it as : "Work is what you do, not where you go to.". An academic panel of experts thinks: Forget whether it's practical to bring your own technology devices to work - in the future, you may not even have an office. ….

IT 69
article thumbnail

The joys and hazards of multi-process browser security

Scary Beasts Security

Web browsers with some form of multi-process model are becoming increasingly common. Depending on the exact setup, there can be significant consequences for security posture and exploitation methods. Spray techniques Probably the most significant security effect of multi-process models is the effect on spraying. Spraying, of course, is a technique where parts of a processes' heap or address space are filled with data helpful for exploitation.

article thumbnail

Wither ‘Big Brother’? B.C. Privacy Commissioner Reins-in Government of British Columbia Criminal Record Checks

Privacy and Cybersecurity Law

In keeping with her stance on overly-invasive employee background checks, British Columbia’s Information and Privacy Commissioner, Elizabeth Denham, has issued […].

Privacy 40
article thumbnail

UK ICO Publishes Cloud Computing Guidance

Hunton Privacy

On September 27, 2012, the UK Information Commissioner’s Office (“ICO”) published guidance on complying with the requirements of the UK Data Protection Act 1998 (“DPA”) in the context of cloud computing services (the “Guidance”). In its Guidance, the ICO reminds data controllers that transferring personal data to the cloud does not absolve them of their compliance obligations under the DPA.

Cloud 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

The post Tweets Belong To The User… And Words Are Complicated appeared first on John Battelle's Search Blog. ( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted b

Mining 99
article thumbnail

Salesforce demonstrating great momentum

Collaboration 2.0

Branson & Benioff demonstrate world class salesman human qualities, SalesForce selling ever more connected and intelligent businesses

91
article thumbnail

Mind the gap: Social on the inside, to support social on the outside

ChiefTech

One of the things I often remind clients is that if you want to be social on the outside, you need to be social on the inside too (that's sort of a short definition of "social business" too). I'm lucky to work not just within the isolated internal collaboration domain, but across the spectrum of internal to external and back again. So, interesting to see Hootsuite release a new internal " conversations " feature: They aren't the only vendor that supports features like this of course.

article thumbnail

Every Great Business Is An Argument (from 2008)

John Battelle's Searchblog

The post Every Great Business Is An Argument (from 2008) appeared first on John Battelle's Search Blog. Completely through happenstance, I came upon this post I wrote for American Express more than four years ago. I think it still stands up today. I never posted it on Searchblog, and I’d like my writing to be collected here. So call this a lightly edited blast from the archives… — Every Great Business Is An Argument.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Post Apple Rant, What Have We Learned? A Visit With A “Genius” Ain’t Enough

John Battelle's Searchblog

I think I’ve said it before, if you want to attract attention, write about Apple. A rant which had been boiling inside me for some months finally erupted into words last Thursday, and since that post, more than 60,000 people have come to this site, leaving more that 300 comments and sharing the story’s link nearly 3000 times across four or so social networks.

IT 83
article thumbnail

Bing Tries Harder, But For Me, It’s A Draw

John Battelle's Searchblog

It’s not easy being number two. As a marketer, you have limited choices – you can pretend you’re not defined by the market leader, or, you can embrace your position and go directly after your nemesis. For years, Bing executives have privately complained about how hard it is to “break the Google habit,” even as they refused to market directly against Google.

article thumbnail

Am I An Outlier, Or Are Apple Products No Longer Easy To Use?

John Battelle's Searchblog

I’ve been a Mac guy for almost my entire adult life. I wrote my first college papers on a typewriter, but by the end of my freshman year – almost 20 years ago – I was on an IBM PC. Then, in 1984, I found the Mac, and I never looked back. Till now. I’m not saying I’m switching, but I sure am open to a better solution. Because the past year or so has been dominated by the kind of computing nightmares that used to be the defining experience of my Windows-PC-wielding fr

IT 76
article thumbnail

The Facebook Ad Network Is Here

John Battelle's Searchblog

It’s been a pretty good year for my annual predictions , I must say. A few months ago I did my “ how’ve I done so far this year ” post, and found myself batting about.500. Yesterday Facebook pushed up my average with the announcement that it’s begun testing a mobile ad network. And this isn’t just an on-domain network (where you can buy ads across Facebook’s domain), but rather, it’s a true cross-domain network – just like AdMob on mobile, or

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Tweets Belong To The User….And Words Are Complicated

John Battelle's Searchblog

( image GigaOm ) Like many of you, I’ve been fascinated by the ongoing drama around Twitter over the past few months (and I’ve commented on part of it here , if you missed it). But to me, one of the most interesting aspects of Twitter’s evolution has gone mostly unnoticed: its ongoing legal battle with a Manhattan court over the legal status of tweets posted by an Occupy Wall St. protestor.

Mining 64
article thumbnail

The Victorian Internet – The Technology That Started It All

John Battelle's Searchblog

I’m at least three books behind in my reviews, so I figured I’d bang out a fun one today: The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century’s On-line Pioneers by Tom Standage. This 1998 book is now a classic – written as the Web was exploding on the scene, it reminded us that this movie has run before, 150 years in the past, with the rise of the telegraph.

IT 63
article thumbnail

Activity streams shouldn't wag the dog

ChiefTech

The constant challenge for social software is to boil down the ongoing process of technology change happening around us into bite sized concepts that people can hang on to. Its the tyranny of reductionist thinking, because the moment we do that we often lose sight of what is actually happening. To that point, one of the most contentious issues that falls into this trap is the idea of activity streams versus email.