June, 2012

article thumbnail

Microsoft's scattered strategic vision

Collaboration 2.0

Enterprise customers continue to be frustrated by a lack of clarity or momentum in key areas around business productivity ‘front office’ strategy from Microsoft; partners are picking up the slack but some big questions are being asked this summer

102
102
article thumbnail

Apple To Kill Ping, Add Facebook

John Battelle's Searchblog

( image ) I know you all know that Apple has cut a deal to integrate Facebook , because of the relentless coverage of Apple’s developer conference this week. However, I just saw this story from ATD: Apple’s Ping to End With a Thud in Next Release of iTunes And thought to myself – “Hey, didn’t I predict that a while back?

IT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why is IBM System z Essential to Your Business?

Robert's Db2

Earlier this year, some of my colleagues and I who work with IBM information management software for the System z platform were invited to write essays addressing the question, "Why is IBM System z essential to business?" I decided to act on this invitation, and to get my creative juices flowing I imagined an impromptu conversation with a skeptical CEO on the business value of System z.

Retail 69
article thumbnail

The social life of email at Enron - a new study

ChiefTech

Probaby one of the few positive things to come out of the Enron scandle was that it gifted social scientists a data set of real corporate email that could be analysed for research purposes. A recent study [PDF] used this data to look at 'gossip'. Now hang on for a second before you jump to conclusions, lets define what we mean here. Anthropologists define gossip as: "the absence of a third party from the conversation [and it] is fundamental to healthy societies—from small groups to large,

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NLRB on a Mission to Curb Anti-Social Media Policies in the Workplace

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : In recent years, the National Labor Relations Board (“NLRB”) and unions have placed a growing emphasis on extending the application of labor law into the social media arena. As part of this initiative, the NLRB has adopted a strong stance against social media policies that it believes pose a threat to employees’ right to engage in protected activities under Section 7 of the National Labor Relations Act (“NLRA&

IT 40

More Trending

article thumbnail

Microsoft to marry Yammer

Collaboration 2.0

The old guard are marrying off upstart competitors into their product portfolios. B is he battle for supremacy among Microsoft, IBM, SAP and Oracle still relevant — and has it scarred long-term relationships with customers?

IT 100
article thumbnail

When You’re Stuck, Go Out And Talk To People

John Battelle's Searchblog

Yay! It's a nameless hotel ballroom! But the people who fill it are what matter. I had one of those kind of days yesterday that reaffirm my belief in our industry, in its people, and in the work I do. It’s not easy to sit here and write, much less write a book, and I’ll admit lately my faith (and my productivity) has flagged – there’s so much work left to do, so little time in which to do it, and so many other things – Federated Media, conferences, board positio

article thumbnail

The ONE Key Aspect of DB2 for z/OS Table-Controlled Partitioning that People Seem Most Likely to Forget

Robert's Db2

Sometimes, an important DB2 for z/OS feature can be out there for years, and yet not be fully appreciated by lots of people in the DB2 user community. Table-controlled partitioning is such a feature. In this blog entry I want to generally set the record straight about table-controlled partitioning, and in particular I want to make sure that mainframe DB2 folks understand a key aspect of this physical database design option that for some reason eludes many users to this day.

Mining 48
article thumbnail

Lessons from designing mobile digital public services

ChiefTech

Designing a mobile application that lets mental health service users register their mood and activity daily proved a long and challenging road. Adil Abrar shares five important lessons. via guardian.co.uk. Five lessons from the experience of designing the "Buddy" app are: Find the right part of the health system to work with; Focus on creating a minimum viable product; Embrace 'agile' development fully to get the most out of bringing designers, developers and strategist to create the solution; E

62
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

UK Ministry of Justice Outlines Negotiating Position on European Commission’s Proposed Regulation

Hunton Privacy

On June 28, 2012, the UK Ministry of Justice outlined its negotiating position on the proposed EU Data Protection Regulation (the “Proposed Regulation”) in its published “ Summary of Responses – Call for Evidence on Proposed EU Data Protection Legislative Framework ” (the “Summary”). The Call for Evidence sought to gain perspective and solicit feedback on how the Proposed Regulation would impact organizations and individuals in the UK.

article thumbnail

Cookie Consent Exemptions – The Article 29 Working Party’s View

Privacy and Cybersecurity Law

There have been further developments this week on the new ‘cookies rule’ with the Article 29 Working Party issuing its […].

IT 40
article thumbnail

ION Air Pro simplify wearable HD cameras

Collaboration 2.0

ION Air add cloud native capabilities to their new ‘Point-of-view action-sport camcorder’ range, along with easy to use on/off recording

Cloud 99
article thumbnail

Google’s Transparency Report: A Good And Troubling Thing

John Battelle's Searchblog

A couple of days ago Google released its latest “ Transparency Report ,” part of the company’s ongoing commitment to disclose requests by individuals, corporations, and governments to change what users see in search results and other Google properties such as YouTube. The press coverage of Google’s report was copious – far more than the prior two years, and for good reason.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How can we keep big video content safe?

Preservica

Good to see that format obsolescence not just media obsolescence is covered here [link]. I think it is one of the most overlooked challenges. Managed Migration of information to more modern formats is a key defence to preserve information. Key issues for managed migration can be found at [link].

IT 40
article thumbnail

Observations from the Enterprise 2.0 Conference

ChiefTech

A few of the reports from the Enterprise 2.0 Conference this week included some interesting observations. From NetworkWorld : Past Enterprise 2.0 conferences have suffered from a lack of end-user case studies, but that didn't seem to be the case this year. Many presentations were akin to business management seminars rather than technology discussions, with the technical nuts and bolts of the software selection and implementation process kept in the background or not mentioned at all.

IT 58
article thumbnail

Connecticut Amends State Breach Law Amid Introduction of Federal Breach Notification Legislation

Hunton Privacy

In recent weeks, both state and federal regulators have considered security breach notification legislation. On June 15, 2012, Connecticut Governor Dannel Malloy signed a budget bill that, among other things, amends the state’s security breach notification law. The changes, which will take effect on October 1, 2012, most notably require businesses to notify the state Attorney General no later than the time when notice of a security breach is provided to state residents.

article thumbnail

Article 29 Working Party adopts document on BCRs for processors

Privacy and Cybersecurity Law

Following our recent blog post, the Article 29 Working Party has adopted a document (WP195) on Binding Corporate Rules (“BCRs”) for processors […].

40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Generation connected looks for clues

Collaboration 2.0

For ‘Generation Connected’, talk about what is possible and trends are dime a dozen, but everyone is looking for evidence of practical, experiential business successes

87
article thumbnail

Do Not Track Is An Opportunity, Not a Threat

John Battelle's Searchblog

This past week’s industry tempest centered around Microsoft’s decision to implement “Do Not Track” (known as “DNT”) as a default on Internet Explorer 10, a browser update timed to roll out with the company’s long-anticipated Windows 8 release. Microsoft’s decision caught much of the marketing and media industry by surprise – after all, Microsoft itself is a major player in the advertising business , and in that role has been a strong proponen

article thumbnail

Updating the Site URL Property of Your SharePoint Development Project

JKevinParker

I admit my Visual Studio 2010 and SharePoint development skills are a little rusty. After all, I have spent the last year or so engaged solely in SharePoint and information architecture planning. But that doesn't take away from the fact that SharePoint and Visual Studio development can be more than a little kludgy. When attempting to deploy one of my new projects to my SharePoint server, I received this error message: Error occurred in deployment step 'Recycle IIS Application Pool': Cannot conne

article thumbnail

You do need a strategy for your enterprise social network, says Yammer

ChiefTech

via blog.yammer.com. A great post from Stephen Danelutti at Yammer explaining why even if you use viral adoption as a catalyst to get started, you still need a strategy: "The ease of use and virality of a platform like Yammer can be deceivingly simple and lead people to think that a deliberate strategy is not necessary. That’s a mistake, because without direction and an end goal in mind, the network will simply meander and fail to deliver business value.".

56
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

HHS Settles First HIPAA Enforcement Action Against a State Agency

Hunton Privacy

On June 26, 2012, the Department of Health and Human Services (“HHS”) announced a resolution agreement and $1.7 million settlement with the Alaska Department of Health and Social Services (“DHSS”) for violations of the HIPAA Security Rule. This is the first HIPAA enforcement action taken by HHS against a state agency. In connection with the announcement, the HHS Office for Civil Rights (“OCR”) Director Leon Rodriguez stated that OCR “expect[s] organizations to comply with their obligations under

article thumbnail

Upcoming seminars on the draft Data Protection Regulation

Privacy and Cybersecurity Law

As you may already know, we’re hosting two seminars next week on the draft Data Protection Regulation. On Tuesday, 19 […].

40
article thumbnail

Google’s “Mute” Button: Why Didn’t I Think Of That? Oh, Wait…

John Battelle's Searchblog

One of my pet peeves about our industry is how slowly we change – I understand it takes a long time to gather consensus (it took three years to get AdChoices rolled out, for example) – but man, why don’t the big players, like Google, innovate a bit more when it comes to display advertising? Well, yesterday Google did just that, announcing a “mute this ad” feature that it will roll out across its network over the next few months.

article thumbnail

Four Letter Words

John Battelle's Searchblog

If you’ve been following this site for a while, you’ll remember my experiment earlier this year with posting pictures of wine, bike rides, and other “life” things. Many of you liked those posts, others, not so much. (Here’s one example.) My reason for posting these photos was pretty simple – I prefer to have my content emanate from my own site, rather than be bound to Facebook, Pinterest, Instagram or some other third-party walled garden.

IT 68
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

It’s Hard to Lay Fallow

John Battelle's Searchblog

I’ll admit it, I’m one of those people who has a Google News alert set for my own name. Back in the day, it meant a lot more than it does now – the search results used to pick up blog mentions as well as “regular” news mentions, and before FacebookLand took over our world (and eschewed Google’s), a news alert was a pretty reliable way to find out what folks might be saying about you or your writing on any given day.

Sales 65
article thumbnail

How Not To Post A Comment

John Battelle's Searchblog

Recently my site has been hit with a ton of “manual spam” – folks who are paid to post short comments in the hope they’ll appear and drive pagerank back to various sites (or perhaps just increase their or their clients’ visibility.) It’s not hard to kill these comments, though it’s a bit of an irritant when they pile up.

IT 65
article thumbnail

Tony Byrne: Enterprise social software is not all the same

ChiefTech

When evaluating [enterprise social software], it's best not to create "checkbox RFPs" that allow vendors check off all the features they provide, Byrne said. Rather, ask how they address those requirements, seeking to tease out details on the differences between platforms. Focusing too much on software features is a mistake, when you really should be trying to identify a match for the specific types of collaboration you want to facilitate.

IT 54