This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Who should own the digital keys to your private files and who can you trust as cloud file hosting struggles with archaic legal precedents and laws? Surprisingly Michael Chertoff & Kim Dotcom appear to agree: you should control encryption.
The post Facebook Is Now Making Its Own Weather appeared first on John Battelle's Search Blog. ( image ) The past month or so has seen the rise and fall of an interesting Internet tempest – the kind of story that gets widely picked up, then quickly amplified into storms of anger, then eventually dies down as the folks who care enough to dig into the facts figure out that the truth is somewhere outside the lines of the original headline-grabbing story.
Collaboration software, including the latest generation of enterprise social software, is often put forward as a more effective alternative to email-based communication. But people aren't always convinced - they want to know why they should use a new tool over email which has generally served them quite well, what Andrew McAfee called the 9X email problem.
A DB2 for z/OS DBA recently asked me about the pros and cons of hash-organized tables -- a physical database design option that is introduced with DB2 10 for z/OS running in new-function mode (NFM). Assuming that others in the mainframe DB2 community are also pondering this issue, I've decided to provide what I hope will be some useful information in this blog entry.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Background I have walked simultaneously in the worlds of Windows and Unix/Linux/Apple OS X for years. In *nix, I prefer BASH (GNU Bourne-Again SHell) for administration. However, until PowerShell, Windows had nothing that could really compare to Bash. Microsoft had shells: first the COMMAND.COM in MS-DOS/Windows 9x and cmd.exe in Windows NT, then Windows Script Host introduced with Windows 98.
On November 21, 2012, the UK Supreme Court handed down a judgment in The Rugby Football Union vs. Consolidated Information Services Limited (Formerly Viagogo Limited) , a case addressing the application of Article 8 of the EU Charter of Fundamental Rights (Protection of Personal Data) in the context of court orders seeking to disclose the identities of alleged wrongdoers.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
On November 21, 2012, the UK Supreme Court handed down a judgment in The Rugby Football Union vs. Consolidated Information Services Limited (Formerly Viagogo Limited) , a case addressing the application of Article 8 of the EU Charter of Fundamental Rights (Protection of Personal Data) in the context of court orders seeking to disclose the identities of alleged wrongdoers.
Next gen browsers are the high ground on the maturing cloud battlefield, whether at individual or collaboration scale. Permissions, groups & filters configurations could be centralized in future vendor specific proprietary formats.
The post On Open Platforms, Wifi, Home Automation, and Kitty Litter appeared first on John Battelle's Search Blog. At least this platform is open… (image Shutterstock ). The world needs more open platforms. The term is loaded, but it’s worth unpacking. To me, an open platform is a consistent opportunity space where anyone – without prior permission – can attempt to create value, and the market gets to vote on that attempt.
This is a list of speakers at Connected Enterprise 2012 who are on Twitter: Brent Lello. Brian Solis. Cory Banks. Cuneyt Uysal. Dev Mookerjee. Erin Grotts. Jacob Morgan. James Dellow <- me! Jeffrey Tobias. Lincoln De Kalb. Mike Handes. Paul Miller. Rob Livingstone. Ross Dawson. Ross Hill. Shawn Callahan. Steve Hopkins. Thierry de Baillon. BTW I'm not sure if we have a hash tag for the event, but I've suggested #cemelb12.
I was recently involved in an interesting DB2 for z/OS performance analysis effort. An organization had moved a DB2 data sharing group from one Parallel Sysplex mainframe cluster to another (if you aren't familiar with DB2 data sharing, you can check out an introductory blog entry that I posted a few years ago while working as an independent consultant).
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The Unspoken Threat of Software-as-a-Service. ravi.kumarv@cgi.com. Mon, 11/26/2012 - 07:00. I want to make this a balanced argument. I’ll start with the positives. Software-as-a-Service (SaaS) is a fairly recent innovation which has taken-off phenomenally well, and with good reason. SaaS offers huge economies of scale, because it can be shared by many organisations.
On November 22, 2012, the Brussels-based publication European Voice published an editorial by U.S. Department of Commerce General Counsel Cameron Kerry entitled Avoiding a Data Divide Between the US and the EU. The article notes the importance of continued collaboration between the European Union and the United States as both assess their respective privacy frameworks to ensure that any changes encourage enhanced trade and strong economic growth, but also contain robust protections for consumers
The changing face of what businesses need is challenging to incumbent suppliers.meanwhile a new generation of innovation is flowering around simplicity.
The post In a Nutshell, The Android Problem: Totally Forked appeared first on John Battelle's Search Blog. ( image ) I’m a fan of “open.” Anyone who knows me, knows this about me. But I’m also a fan of “easy.” And of “good design.” So, for the past couple of years, I’ve been an iPhone user, mainly because it was easy, and had better design than any alternative.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
The other day writing about email and enterprise social software , I concluded with the following: "Far from being a nemesis, email and enterprise social software are more likely to form a strong symbiotic relationship.". I want to explore a little further about what I mean by the possible future relationship between email and enterprise social software.
In my previous post, SharePoint 2010 Web Template Reference and Other Useful Stuff , I listed all of the OOTB Web Templates in SharePoint Server 2010 using a simple PowerShell command. For those who wonder what templates are available in the free SharePoint Foundation 2010, I ran the same command and got these results: SharePoint Foundation 2010 Web Templates.
On November 28, 2012, the UK Information Commissioner’s Office (“ICO”) issued monetary penalties totaling £440,000 to two owners of a marketing company that sent millions of unlawful spam SMS text messages over a period of three years. Following an 18 month investigation, Christopher Niebal and Gary McNeish, the owners of Tetrus Telecoms (“Tetrus”), have been ordered to pay £300,000 and £140,000, respectively.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The post Must All Grasshoppers Die? appeared first on John Battelle's Search Blog. I’ve been reading a lot lately – and the topics have been pretty diverse. Popular science fiction from ten years ago (Outerland), political commentary from last month (Future Perfect), seminal computing tracts from the 1990s (Mirror Worlds), and just published manifestos on synthetic biology (Regenesis).
An announcement about the Yammer roadmap, now part of the Microsoft family, was anticipated in the lead up to the SharePoint Conference 2012. Mark Fidelman proposed it would be " game changing ". The main points of the announcement are covered here: Microsoft Shines the Spotlight on the New SharePoint. Putting Social to Work. No surprises that Yammer and the SharePoint & Office suite will work together more closely - this is API-based, through the Yammer Open Graph.
As a SharePoint Architect, I have to know a lot of stuff. Well, actually, I have to know how to quickly find the answers for a lot of stuff. There is just too much to know for one brain to store it all. Particularly as an architect and principal management consultant, I must continue to be a Subject Matter Expert in several areas: Enterprise Architecture.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On November 22, 2012, the UK Ministry of Justice released a written ministerial statement (“Statement”) announcing the publication of its Government Impact Assessment on the European Commission’s legislative reform package on the EU data protection framework. The European Commission has claimed that a regulation implementing a single set of data protection rules across the European Union would save businesses around €2.3 billion a year.
The post Can The Future Be Perfect? It Can Certainly Be Better appeared first on John Battelle's Search Blog. As my 2011 review of his Where Good Ideas Come From: A Natural History of Innovation proves, I am a Steven Johnson fan. So it was with relish that I settled in to read his latest release: Future Perfect: The Case For Progress In A Networked Age.
The post Dave Pell on Facebook’s Gift to Itself appeared first on John Battelle's Search Blog. I enjoy NextDraft , an email newsletter penned by Dave Pell each day. I value point of view and voice in any medium, and Dave’s got it. I think Searchblog readers would appreciate this item, so I’ve reposted it here. Dave, I hope you don’t mind… The Gift of Data.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
The post Craig Mod on Subcompact Publishing. appeared first on John Battelle's Search Blog. The Verge pointed me to Craig Mod’s manifesto on “ Subcompact Publishing.” It’s a must read if you care about where digital publishing might go. It’s a wonderful, thoughtful piece. It’s why we have this web thing. Go read it.
Michael Idinopulos is General Manager and Chief Customer Officer at Socialtext, but this honestly isn't the typical 'vendor' presentation. Its well worth watching if you want to understand why many of us think enterprise social software can make so much difference in the workplace. Via the Socialtext blog.
In recent weeks I've had a number of conversations about both terminology and ownership of technology in organisations. The recent Connected Enterprise 2012 conference in particular highlighted the possible breadth of general information and communication technologies that people in organisations use to get work done - from social intranets to video conferencing.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content