This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The post Get Out of Your Office, And Into The Modern Working City: OpenCo SF Is Live! appeared first on John Battelle's Search Blog. I’m bustin’ with pride to announce that after great festivals in London , New York , and Detroit , OpenCo is returning next month to its home base of San Francisco, and the lineup is 135 companies strong *.
As reported in the Hunton Employment & Labor Perspectives Blog : The U.S. District Court for the District of New Jersey recently ruled that non-public Facebook wall posts are protected under the Federal Stored Communications Act (the “SCA”) in Ehling v. Monmouth-Ocean Hospital Service Corp. , No. 2:11-CV-3305 (WMJ) (D.N.J. Aug. 20, 2013). The plaintiff was a registered nurse and paramedic at Monmouth-Ocean Hospital Service Corp.
This is some professional perspective and analysis regarding a recent campaign to raise donation capital through crowdsourced funding tools available on KickStarter. At the end of the day, the campaign was not funded, and didn't reach its goals (From $100K to $1M). Not that it didn't have a chance, and wasn't backed by some very savvy and knowledgeable product designers/developers - the failure was all about Marketing 101.
Lots and lots of mainframe DB2 people know about the native SQL procedure technology delivered with DB2 9 for z/OS. That was, in my opinion, the most important enhancement of this aspect of DB2 functionality since stored procedures were introduced in the mid-1990s with DB2 for z/OS Version 4 (I've blogged multiple times about native SQL procedures, starting with an entry I posted a few years ago to the blog I maintained while working as an independent DB2 consultant).
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Nearly everyone loves mobile apps that can perform local searches, get directions, or find the nearest decent restaurant. But what’s not so obvious is that these local apps can have hidden bandwidth costs — meaning that, in some cases, they can run up your phone bill in ways you might not expect.
'This month, I''ve been invited to talk about user adoption at the NSW KM Forum : Why is user adoption of new workplace information technologies - such as SharePoint - so difficult, yet people appear to have no difficulty learning how to use Facebook or Candy Crush? I''ll be talking about: What is user adoption? And should we even be talking about "users" and "adoption"?
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
'This month, I''ve been invited to talk about user adoption at the NSW KM Forum : Why is user adoption of new workplace information technologies - such as SharePoint - so difficult, yet people appear to have no difficulty learning how to use Facebook or Candy Crush? I''ll be talking about: What is user adoption? And should we even be talking about "users" and "adoption"?
'The post The Best Platform for Incubation Is the Web appeared first on John Battelle's Search Blog. ( image ) Yesterday in the course of my seemingly endless attempt to stay current in this industry, I came across this article on VentureBeat: Searching for the next Zuckerberg: A day in the life of a Lightspeed Fellow. It chronicles the experiences of the chosen few who have made it into a VC-backed incubator, focusing on two Stanford students who are trying to create a new sensor for lap
On September 24, 2013, the Singapore Personal Data Protection Commission (the “Commission”) published guidelines to facilitate implementation of the Singapore Personal Data Protection Act (the “PDPA”). The Advisory Guidelines on Key Concepts in the Personal Data Protection Act and the Advisory Guidelines on the Personal Data Protection Act for Selected Topics provide explanations of concepts underlying the data protection principles in the PDPA, and offer guidance on how the Commission may inter
In light of this week's LexisNexis Data Breach report, it's worthwhile to explore the true value and usefulness of this kind of data that might be stolen from you. Sensitive, personal data (PII, or "Personally Identifiable Data") is usually protected, but no protection is guaranteed if outside your complete control in any way – most people should assume their most-used data reflecting their personal identity (like SSNs, tel #s, DOB) is already public , if not already being used illegimately.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
A lot of DB2 for z/OS people know about the hash mode of organizing data in a table -- something introduced with DB2 10 (I've blogged about this topic multiple times, most recently in an entry I posted a few months ago ). The basics of hash-organization of data (this as opposed to traditional cluster-based data organization) are pretty straightforward: you select for a table a hash key (which could be comprised of a single column or a concatenation of multiple columns, as long as each key value
'In this new post on the Ripple Effect Group blog , I decided to take a retrospective look at Gartner''s Magic Quadrant for Social Software in the Workplace since 2007. One of my observations is that over the last 4 years over half the vendors have remained fairly constant in the quadrant. This means there are some mature offerings out there in the market, but there is still room for plenty of competition in this space.
'The post Search and Immortality appeared first on John Battelle's Search Blog. Funny thing, there I was two days ago, at Google’s annual conference , watching Larry Page get asked questions so pliant in nature they couldn’t be called softballs. They were more like tee balls – little round interrogatives gingerly placed on a plastic column for Page to swat out into the crowd.
On September 27, 2013, California Governor Jerry Brown signed into law a bill amending the California Online Privacy Protection Act (“CalOPPA”) to require website privacy notices to disclose how the site responds to “Do Not Track” signals, and whether third parties may collect personal information when a consumer uses the site. Although the changes to the law do not prohibit online behavioral advertising, this is the first law in the United States to impose disclosure requirements on website ope
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
'The post else 9.23: From “Pulp to Prototype” and Other Good Reads appeared first on John Battelle's Search Blog. This week we’ve been thinking a lot about driverless cars and related data-driven innovations in transportation. (We even saw one up close this week at Google Zeitgeist.) We looked at Google’s newest effort to extend life with data in its new company, Calico.
'The post else 9.9: We Got Yer Star Trek Right Here appeared first on John Battelle's Search Blog. This week in our round up we look at near-future advances in body scanners, self-driving sensors, and robots. We also read about what happens next as the internet’s fundamental trust architecture is on shaky grounds with the latest NSA revelations.
'The post else 9.30: The “Monkeys with Typewriter” Algorithm appeared first on John Battelle's Search Blog. This week, the blind see with data, algorithms are uncovered, networks are analyzed, and data remains siloed. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis the best way is to subscribe to the “else” feed either as an email newsletter or through RSS.
'The post At Google Zeitgest 2013: A Conversation with Mark Kelly, featuring Gabby Giffords appeared first on John Battelle's Search Blog. For the past four years I’ve been honored to help moderate portions of Google’s annual Zeitgeist conference , which assembles a powerful lineup of speakers each year in the Arizona desert. I hosted the last segment of the day, and sat down with astronaut Mark Kelly, who is known for his career as a fighter pilot and Space Shuttle commander, a
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The post else 9.3: Staring at the Tiny Screens appeared first on John Battelle's Search Blog. This week: Gartner’s latest hype cycle addresses the relationship between humans and machines, moral panics about our attention and time resurface, UPS optimizes drop offs around the happiness of drivers, Bitcoin’s regulatory environment gets messy, and data brokers take steps towards improved consumer transparency.
'The post else 9.16: Start Making Sense appeared first on John Battelle's Search Blog. This week, we’re excited about what the new M7 sensors mean for iPhone activity tracking, we’re thinking about how to rebuild trust in the internet and tech companies post-Snowden, and we’re listening to some music that plays with the boundaries between analog and digital.
On September 25, 2013, Senator Jay Rockefeller (D-WV), Chair of the Senate Committee on Commerce, Science and Transportation, expanded his investigation of the data broker industry by asking twelve popular health and personal finance websites to answer questions about their data collection and sharing practices. In letters to the companies , Senator Rockefeller requested detailed information about the websites’ privacy practices, including: whether the company collects health, family, financial
On September 23 and 24, 2013, a declaration and eight resolutions were adopted by the closed session of the 35th International Conference of Data Protection and Privacy Commissioners and have been published on the conference website. This blog post provides an overview of the declaration and the most significant resolutions. Warsaw Declaration on the “Appification of Society”.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On September 26, 2013, the UK Information Commissioner’s Office (“ICO”) published new breach notification guidance (the “Guidance”), applicable to telecom operators, Internet service providers (“ISPs”) and other public electronic communications service (“ECS”) providers. The UK Privacy and Electronic Communications (EC Directive) Regulations 2003 (“PECR”) implement the revised e-Privacy Directive 2009/136/EC, and contain wide-ranging rules on marketing and advertising by telephone, fax, email an
Recent months have seen a significant increase in highly-publicized cyber attacks and cybersecurity incidents, including an August 2013 attack on The New York Times’ website that shut down the site twice in two weeks. Unsurprisingly, there also has been an upswing in the demand for, and underwriting of, cyber insurance. In a recent Law360 article, Takeaways from Recent Cyberattack on New York Times, Hunton & Williams Insurance Litigation & Counseling partner Lon Berk considers whether a
On September 23, 2013, California Governor Jerry Brown signed a bill that adds “Privacy Rights for California Minors in the Digital World” to the California Online Privacy Protection Act (“CalOPPA”). The new CalOPPA provisions prohibit online marketing or advertising certain products to anyone under age 18, and require website operators to honor requests made by minors who are registered users to remove content the minor posted on the site.
Today, September 23, 2013, marks the deadline for compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Omnibus Rule that was issued in January 2013. Covered entities, business associates and subcontractors that access, use or disclose protected health information (“PHI”) will need to take the following actions: For Covered Entities : Review and modify HIPAA privacy policies and procedures to address the new definition of “marketing” in the HIPAA Privacy Rule
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Hunton & Williams LLP is pleased to announce that several privacy lawyers were named to the New York Metro Super Lawyers list for 2013. For the eighth consecutive year, Lisa J. Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was selected as a New York Super Lawyer. She also was featured in the latest edition of New York Super Lawyers Magazine in an article entitled “ The Queen of Breach: Privacy Expert Lisa Sotto Goes Public.
On September 6, 2013, Vice-President of the European Commission and Commissioner for Justice, Fundamental Rights and Citizenship Viviane Reding traveled to Berlin where she commented on the status of the negotiations on the proposed EU General Data Protection Regulation (the “Proposed Regulation”). Commissioner Reding indicated that she was looking for Germany to become involved in the discussions about the Proposed Regulation at the highest level, and she argued in favor of stricter regulations
This week, the Department of Health and Human Services’ Office for Civil Rights (“OCR”), in conjunction with the Office of the National Coordinator for Health Information Technology, released model Notices of Privacy Practices. The notices, which have been developed for use by health care providers and health plans, come in different formats: an 8-page booklet; a 5-page layered notice that summarizes key details on the first page and includes the full content of the booklet on the remaining four
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content