June, 2010

article thumbnail

It's Official - Apple Kicking Google Out of iWorld

John Battelle's Searchblog

I' ve written extensively about iAds here and here , and one question I raised has to do with Apple's policies with regard to third party data and ad networks, in particular AdMob. As All Things Digital notes today , Apple this week "clarified" its policy with regard to third party networks, and it's hard to read it as anything other than a direct declaration of war with Google.

IT 110
article thumbnail

Demilitarizing Collaboration: Designing Rules of Engagement

Collaboration 2.0

The reality of working with companies to help unlock the value of collaboration is that you are typically working behind their firewalls, unable to connect with the outside world. I’ve just spent a great deal of time last week working in Europe in the locked down environments of global companies, talking to various constituents exploring [.

85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Presence & Peace

Daradiction

Dale Okuno is one of our investors at CitySourced. He’s also one of my mentors and close friends. To give some context, Dale is very level headed and recently sold his company to Ebix, a Nasdaq traded company. He built it from scratch up to nearly 400 employees. Dale and I recently took a road trip up to Mammoth a few weeks ago and in the car on the ride up he started telling me about this book called “The Power of Now&# by Eckart Tolle and how it was one the most profound books he&#

Access 49
article thumbnail

Australian Government Publishes Draft Legislation to Reform Privacy Act

Hunton Privacy

The Australian government recently released an exposure draft of legislation that would fundamentally reform the Australian Privacy Act and would unify public and private sector privacy principles. The exposure draft includes thirteen principles intended to protect individuals from the risks associated with the sharing of personal information. Of particular interest to the international business community, Principle 8 addresses the cross-border disclosure of personal information.

Privacy 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Limericks of GARP -- Availability

Positively RIM

The lack of files' availability Can lead to a loss of civility: "I wait such a while For every damn file, I want to shout, 'It's all futility!

IT 40

More Trending

article thumbnail

Steve Jobs at D: A Master.

John Battelle's Searchblog

and I mean that. Watching Jobs work his way through nearly 90 minutes of interview and audience questions , I really felt, for the first time, a sense of how strongly the guy feels for his work and his products. Then again, I found myself angry, several times. Angry when he championed the press as crucial to democracy, and implied the iPad would save our country from "descending into a nation of bloggers" (my view: we started as a nation of bloggers - pamphleteers like Thomas Paine).

Marketing 106
article thumbnail

How to Accelerate Business Performance with 2.0 Technologies

Collaboration 2.0

With the big US Enterprise 2.0 conference a week away, some more thoughts on accelerating business performance with the effective deployment of these modern technologies.As previously discussed here, modern technology has greatly accelerated the rate at which we can create letters, documents, notes and voice communication, but these outdated workflow paradigms are inefficient and choking [.

article thumbnail

Open redirectors: some sanity

Scary Beasts Security

Open redirectors are a contentious issue. Old-school hackers think anyone who thinks they are serious is on drugs. New-school hackers are more evenly divided. I haven't yet seen a public, balanced list of reasons why you should be worrying about other problems. Here it is. For now, I'll concentrate on the central idea that open redirectors permit domain obfuscation and therefore facilitate phishing etc.

article thumbnail

French Data Protection Authority Investigates Google Street View

Hunton Privacy

On June 17, 2010, the French data protection authority (the “CNIL”) reported that it had conducted an on-site investigation at Google on May 19 to examine activities by Google’s Street View cars. This investigation followed Google’s May 14 announcement that it had inadvertently captured Wi-Fi signals emitted in locations where its vehicles were taking photos.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Association of Canadian Archivists

Preservica

I'm really looking forward to presenting at the Association of Canadian Archivists Pre conference next week. The theme is Digital Preservation in the Canadian Landscape, and I'm going to be speaking about international collaboratives including Planets and KEEP. They have a packed agenda with some very interesting topics and an opportunity for an open discussion on what the audience has learned during the event, and how people think organizations in Canada might progress.

article thumbnail

Proof of Delivery Scanning Delivers Outstanding Value

Shoreline Records Management

There are so many specific business applications for Document Scanning and. Document Management that it's a challenge to share all of them, but one application - Proof Of Delivery - continually stands out as an outstanding value for clients. Not all Scanning Applications make fiscal sense or improve Customer Service, but Proof of Delivery is different.

Access 22
article thumbnail

@CMSummit - Mary Meeker's Internet Trends Presentation

John Battelle's Searchblog

The most tweeted Slideshare of the show so far is Mary's presentation. Here it is for your reading pleasure! Internet Trends 2010 by Morgan Stanley Research View more presentations from CM Summit: Marketing in Real Time.

article thumbnail

Getting to Enterprise Scale 2.0

Collaboration 2.0

The Boston US Enterprise 2.0 conference, which I’m heavily involved in organizing as an advisory board member, has concluded for another year. This edition had a more mature business feel to it on multiple levels but aside from the keynote stage presentations and expo floor it’s still primarily a practitioner conference. There’s a slightly bipolar aspect [.

IT 60
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Is Apple's iWorld "The Web"?

John Battelle's Searchblog

I spent a fair portion of today at the O'Reilly Foo Camp , as eclectic an assortment of smart folks as you're likely to find anywhere. I wrote perhaps the first ever piece on Foo back in late 2003 , and I've been trying to make it every year since. It's quite a confab. Today I asked a number of the folks I ran into the same question: "Is Apple a part of the Web?

article thumbnail

Of Course Apple Is Going to Do Search.

John Battelle's Searchblog

you just have to rethink what "search" really means. Last night Jobs said he had no interest in search. I am quite certain what he meant is he has no interest in HTML, "traditional" search. But think about what search really is, and I am certain, Apple will be in the search business. Why? Well, as I said in the last post on the iPad (and rather hurriedly, and entirely my fault, poorly communicated to many of those who left comments), it's all about the link.

article thumbnail

Will Google Compete With Facebook? Er.It Already Is, Folks.

John Battelle's Searchblog

Last weekend the news was conjecture about Facebook doing web search, today, the news is conjecture about Google doing social networks. All of this has been sparked by two well known Valley guys opining on samesaid.Kevin Rose, CEO of Digg, tweeted that Google was working on a "Google Me" social network (he since was "asked to take down his tweet" by someone.) and then a former Facebook employee answered a related question on his own Q&A service, Quora.

IT 88
article thumbnail

Short Thoughts, At D, On Apple Search

John Battelle's Searchblog

Thanks to Andy at Beet for asking. My post earlier here goes into far more detail.

88
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

@CMSummit - My Presentation

John Battelle's Searchblog

Here's the deck I used to open the CM Summit yesterday. Enjoy! Opening Slides by John Battelle, Monday June 7 View more presentations from CM Summit: Marketing in Real Time. PS - all the presentations are available on our CM Summit channel here.

article thumbnail

Google Has to Fix The App Store

John Battelle's Searchblog

I'm not an Android user, yet (working on that), but if this piece is even halfway true, Google needs to respond, quickly, with a plan to fix the Android app store. I've heard over and over that Android's user experience, when it comes to apps, is terrible, and it's a major reason why folks love Apple. Signal over noise. Noise and dirt are essential to the web, but there's no reason why they have to overrun it.

IT 73
article thumbnail

CM Summit: Help Me Interview Amex CMO John Hayes

John Battelle's Searchblog

The CM Summit kicks off next week on Monday morning with an interview of John Hayes , CMO for American Express. I've come to know John through my work at Federated, and I am certain this session will be lively and full of insights. American Express is one of the world's premiere brands, consistently ranked in the top 25 by marketing and business publications.

article thumbnail

Last Few Signals.

John Battelle's Searchblog

for those of you reading Searchblog in RSS and not watching ze Tweets.here are the Signals that I do over at FM's site. Weds. Signal: It’s a Good Day to Read The News. Tuesday Signal: Location, Location, Location. Monday Signal: Welcome to Summer, Now Get to Work. You can sign up to get the Signal email, a daily roundup of what I'm reading and why, on the main page of Signal here (box in the right hand corner).

61
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

A Slow Week Or So

John Battelle's Searchblog

I'll be traveling this next ten or so days, both for work and vacation, and not posting much here. However, I want readers to know I've read all the comments on my last Apple post , and plan a pretty detailed response once I come back. Thanks for reading and I'll see you in these pages soon.

61
article thumbnail

Google Takes One More Step Away From China

John Battelle's Searchblog

Google today announced another step in its protracted divorce from China - to satisfy regulatory and license requirements, it's no longer directly serving results from its Hong Kong based (and uncensored) engine onto its Google.cn site. Instead, it's directing users to the Hong Kong site, in essence, creating one more click for users to go through before accessing its service.

Access 60
article thumbnail

Of Course Apple Is Going to Do Search.

John Battelle's Searchblog

you just have to rethink what "search" really means. Last night Jobs said he had no interest in search. I am quite certain what he meant is he has no interest in HTML, "traditional" search. But think about what search really is, and I am certain, Apple will be in the search business. Why? Well, as I said in the last post on the iPad (and rather hurriedly, and entirely my fault, poorly communicated to many of those who left comments), it's all about the link.

article thumbnail

Twitter Settles FTC Data Security Charges

Hunton Privacy

Twitter has agreed to settle Federal Trade Commission charges that it deceived consumers and put their privacy at risk by failing to safeguard their personal information. The charges stem from alleged lapses in the company’s data security that permitted hackers to access tweets that users had designated as private and to issue phony tweets from the accounts of some users, including then-President-elect Barack Obama.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Article 29 Working Party Issues Opinion on Online Behavioral Advertising

Hunton Privacy

On June 24, 2010, the Article 29 Working Party adopted Opinion 2/2010 (the “Opinion”) providing further clarification on online behavioral advertising. The Working Party also issued a press release on this topic. Although the scope of the Opinion is limited to online profiling, its interpretation of Article 5(3) of the amended e-Privacy Directive provides some useful clarifications regarding the legal framework applicable to online behavioral advertising and the use of cookies.

Privacy 40
article thumbnail

French Data Protection Authority Unveils 2009 Annual Activity Report

Hunton Privacy

On June 17, 2010, the French data protection authority (the “CNIL”) published its Annual Activity Report for 2009 (the “Report”) in which it outlines some of its priorities for the upcoming year. In February 2009, the CNIL published a report on online targeted advertising. Among other things, the CNIL voiced its concern regarding online behavioral and advertising activities and analyzed the risks of increasing user profiling.

article thumbnail

Connecticut Attorney General to Lead Multistate Investigation into Google

Hunton Privacy

Connecticut Attorney General Richard Blumenthal recently announced that his office will lead a multistate investigation into the “deeply disturbing” unauthorized collection of personal data from wireless computer networks by Google’s Street View cars. Attorney General Blumenthal noted that Google “must provide a complete and comprehensive explanation of how this unauthorized data collection happened, why the information was kept if collection was inadvertent and what action will prevent a recur