February, 2014

article thumbnail

To Be Clear: Do Not Build Your Brand House On Land You Don’t Own

John Battelle's Searchblog

'The post To Be Clear: Do Not Build Your Brand House On Land You Don’t Own appeared first on John Battelle's Search Blog. ( image ) I took a rigorous walk early this morning, a new habit I’m trying to adopt – today was Day Two. Long walks force a certain meditative awareness. You’re not moving so fast that you miss the world’s details passing by - in fact, you can stop to inspect something that might catch your eye.

Marketing 111
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'Creating Information Systems for Competitive Advantage: ''every business must become digital;'' say Software AG CEO Karl-Heinz Streibich & Vinnie Mirchandani in their book. In my experience strategic planning for transformation is critical to lower costs while increasing innovation and agility.

105
105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 11 for z/OS Bind Concurrency - Even Better Than You Think*

Robert's Db2

For the asterisk at the end of the this blog entry's title, you could substitute, "If what you think is based on what you've likely read or heard about this feature up till now." In the space below, I'll provide some background information on DB2 11's bind concurrency enhancement, and then I'll give you the bonus insight that you might see as the "cherry on top" -- the important scenario that is addressed by DB2 11 bind concurrency but which has received little (if any) coverage in documents and

IT 54
article thumbnail

Monetizing Wellness, to Drive Value-Driven, Outcomes-Based #Healthcare Transformation in the U.S. #NVTC #NVTCBEA

Interactive Information Management

Thanks very much go to John Teeter - Managing Director, Federal Advisory at KPMG, Global Center of Excellence for Health and former HHS CIO - for his presentation and discussion leadership at today's #nvtc joint committee meeting (Health Technology and Business & Enterprise Architecture #nvtcbea ). The dialogue revolved around a principle challenge and opportunity in the Global and particularly the US healthcare transformation debate - bending the cost curve of US healthcare through better h

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Chairman of French Data Protection Authority Elected Chair of Article 29 Working Party

Hunton Privacy

On February 27, 2014, Chairwoman of the French Data Protection Authority (the “CNIL”) Isabelle Falque-Pierrotin was elected Chairwoman of the Article 29 Working Party effective immediately. Ms. Falque-Pierrotin succeeds Jacob Kohnstamm, Chairman of the Dutch Data Protection Authority, who chaired the Article 29 Working Party for four years. The Working Party also elected two new Vice-Chairs: Wojciech Rafal Wiewiórowski of the Polish Data Protection Authority, and Gérard Lommel of the Luxembourg

More Trending

article thumbnail

We Are Not Google, Therefore, We Are

John Battelle's Searchblog

'The post We Are Not Google, Therefore, We Are appeared first on John Battelle's Search Blog. If you read me regularly, you know I am a fan of programmatic adtech. In fact, I think it’s one of the most important developments of the 21st century. And over the past few quarters, adtech has gotten quite hot, thanks to the recent successes of Rocket Fuel (up to 50 and holding from its open at 29), Criteo (trading above its already inflated opening price of 31), and, by extension, Facebook

Marketing 106
article thumbnail

Developing a clear blueprint for becoming a “cloud-enabled” enterprise

CGI

Developing a clear blueprint for becoming a “cloud-enabled” enterprise. ravi.kumarv@cgi.com. Wed, 02/12/2014 - 08:00. As cloud computing continues to increase, more and more organizations are adopting a “cloud-first” approach to IT service delivery and embarking on becoming “cloud-enabled” enterprises. Cloud-first advocates believe that this approach will eventually become the default approach for enterprises of all types.

Cloud 40
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

45
article thumbnail

DC, Northern Virginia Enterprise Architects, Health Technology Professionals - an #NVTC Joint Committee Meeting with Former HHS CIO John Teeter - 2/18/2014

Interactive Information Management

Northern Virginia Enterprise Architects, Health Technology Professionals , in the Washington DC metro region - if you are members, stakeholders or guests of the Northern Virginia Technology Council ( #NVTC ), please join us this next Tuesday Feb 8 th , 2014, from 7:30-9AM, for a Health Technology, Business and Enterprise Architecture Joint Committee Meeting.

CMS 45
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

SSL Bugs Likely to Have Insurance Coverage Implications

Hunton Privacy

Hunton & Williams Insurance Litigation & Counseling partner Lon Berk reports: The recently publicized Secure Sockets Layer (“SSL”) bug affecting Apple Inc. products raises a question regarding insurance coverage that is likely to become increasingly relevant as “The Internet of Things” expands. Specifically, on certain devices, the code used to set SSL connections contains an extra line that causes the program to skip a critical verification step.

article thumbnail

Using a Regular Expression to Seach for HTML Nodes

JKevinParker

I am a lazy coder and data analyzer. I use text editing tools to search and replace and manipulate so I can then use a spreadsheet tool to break text into columns and rows. Then I can extract data or write code that follows patterns without a lot of manual work. If I am working on code, I can copy and paste it back into my text editor, remove the tabs, and then I have clean code.

IT 40
article thumbnail

Linked In Is Now A Publishing Platform. Cool. But First Get Your Own Site.

John Battelle's Searchblog

'The post Linked In Is Now A Publishing Platform. Cool. But First Get Your Own Site. appeared first on John Battelle's Search Blog. I’ve been a LinkedIn “Influencer” for a year or so, and while the honorific is flattering, I’m afraid I’ve fallen down in my duties to post there. The platform has proven it has significant reach, and for folks like me, who thrive on attention for words written, it’s certainly an attractive place to write.

IT 105
article thumbnail

IT Governance for Techies

CGI

IT Governance for Techies. Anonymous. Thu, 02/06/2014 - 09:35. Despite the increasing number of CIOs without an IT background, it's still fair to say that most were once techies. Historically, their expertise was in requirements analysis or SQL, service reporting or C++. They gradually moved up the ranks, either with a natural aptitude for management or picking-up management skills en route.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

California Court Interprets E-Mail Addresses under the Song-Beverly Act

Privacy and Cybersecurity Law

One of the most interesting and important developments in retail privacy cases is a recent unpublished decision, Capp v. Nordstrom. […].

Retail 40
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

40
article thumbnail

Puerto Rico Health Insurer Reports Record Fine Following PHI Breach Incident

Hunton Privacy

Triple-S Management Corporation reported in the 8-K it recently filed with the U.S. Securities and Exchange Commission that its health insurance subsidiary, Triple-S Salud, Inc. (“Triple S”), which is Puerto Rico’s largest health insurer, will be fined $6.8 million for a data breach that occurred in September 2013. The civil monetary penalty, which is being levied by the Puerto Rico Health Insurance Administration, will be the largest fine ever imposed following a breach of protected health info

article thumbnail

Remove External Users from SharePoint Online (Office 365 Enterprise)

JKevinParker

I had a problem where one of my teammates showed up twice in SharePoint people pickers and people search. I actually invited the wrong one to be part of a new site. It was the same person, but not from SharePoint's perspective. We had used this teammate's personal email account to test External User sharing, and that was the second account that showed up.

IT 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Buh-Bye, CableCo

John Battelle's Searchblog

'The post Buh-Bye, CableCo appeared first on John Battelle's Search Blog. When it comes to television business models and the endless debate about “ cutting the cord ,” I consider myself in the “fast follower” camp – I’m not willing to endure the headaches and technical backflips required to get rid of cable entirely, but I sure am open to alternatives should they present themselves.

Marketing 102
article thumbnail

Internet Bug Bounty issues its first $10,000 reward

Scary Beasts Security

One of my side projects is as an adviser and panelist for the non-profit Internet Bug Bounty (IBB). We recently added Adobe Flash Player as in scope for rewards. Earlier today, David Rude collected $10,000 for a vulnerability recently fixed in APSB13-28. My thoughts on this are too long to fit into a tweet, so I summarize them here: This shows that the IBB is serious about rewarding research which makes us all safer. $10,000 is a respectable reward by modern bug bounty program standards.

IT 36
article thumbnail

FTC steps up enforcement action

Privacy and Cybersecurity Law

Last week, the FTC announced that it had settled with a gaming company that falsely claimed to be certified under […].

IT 40
article thumbnail

Making Real Money for Bands in the Age of Social Media - Democratization of the Royalties Model, by Gideen.com

Interactive Information Management

Welcome to M usic Business 3.0 - it's not about the $1 song anymore. Most artists these days are gifting songs away just for email addresses, the occasional "like". The 3.0 music business model is about creating tracks and collecting many different revenue types internationally for each track/song. It's a new content marketing model and platform for music, for the entire music industry.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Greek Presidency Issues Notes on Proposed EU Data Protection Regulation

Hunton Privacy

On January 31, 2014, the Greek Presidency of the Council of the European Union issued four notes regarding the proposed EU Data Protection Regulation. These notes, discussed below, address the following topics: (1) one-stop-shop mechanism; (2) data portability; (3) data protection impact assessments and prior checks; and (4) rules applicable to data processors.

article thumbnail

SharePoint 2013 Content Types and Columns

JKevinParker

All of the available out-of-the-box content types and their related columns in SharePoint Server 2013 are listed below (let me know if I missed any). I retrieved this information using PowerShell, as I describe in an earlier post. The parent content types were discovered by analyzing the content type IDs (which continues to work as it did in previous versions of SharePoint ).

article thumbnail

Bill Gates Active Again At Microsoft? Bad Idea.

John Battelle's Searchblog

'The post Bill Gates Active Again At Microsoft? Bad Idea. appeared first on John Battelle's Search Blog. ( image ) This story reporting that Gates will return to Microsoft “one day a week” to focus on “product” has been lighting up the news this week. But while the idea of a founder returning to the mothership resonates widely in our industry (Jobs at Apple, Dorsey at Twitter), in Gates’ case I don’t think it makes much sense.

Marketing 102
article thumbnail

What Would You Ask Sundar Pichai, SVP Android & Chrome at Google?

John Battelle's Searchblog

'The post What Would You Ask Sundar Pichai, SVP Android & Chrome at Google? appeared first on John Battelle's Search Blog. A week from this coming Sunday at SXSW , I’ll be interviewing Sundar Pichai , Google’s Senior Vice President, Android, Chrome & Apps. Pichai has a huge job at Google, overseeing the company’s mobile ecosystem, from hardware (the Nexus platform) to the burgeoning Play store (oh, and that little browser/OS called Chrome, to boot).

Marketing 101
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

How Facebook Changed Us, and How We Might Change Again

John Battelle's Searchblog

'The post How Facebook Changed Us, and How We Might Change Again appeared first on John Battelle's Search Blog. ( image ) If you weren’t under a rock yesterday, you know Facebook turned ten years old this week (that’s a link to a Zuckerberg interview on the Today Show , so yep, hard to miss). My favorite post on the matter (besides Sara’s musings here and here – she was at Harvard with Zuck when the service launched) is from former Facebook employee Blake Ross, who

Risk 100
article thumbnail

Step One: Turn The World To Data. Step Two?

John Battelle's Searchblog

'The post Step One: Turn The World To Data. Step Two? appeared first on John Battelle's Search Blog. Is the public ready to accept the infinite glance of our own technology? That question springs up nearly everywhere I look these days, from the land rush in “deep learning” and AI companies ( here , here , here ) to the cultural stir that accompanied Spike Jonze’ Her.

article thumbnail

else 2.17: “Drag the future here and see if we want it”

John Battelle's Searchblog

'The post else 2.17: “Drag the future here and see if we want it” appeared first on John Battelle's Search Blog. This week looked at convergence in wearables, how we live with technology today and in the near future, and the possibility that reality is just a mathematical model. As always if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 94