August, 2008

article thumbnail

Two flavors of software as a service: Intuit QuickBase and Etelos | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Marketing 160
article thumbnail

Design for Emotion and Flow

ChiefTech

We create software and websites to display and represent information to people. That information could be anything; a company’s product list, pictures of your vacation, or an instant message from a friend. At this moment, there’s more information available to you than at any other time in history. All this information has a lot of positive effects, but it also creates challenges. “What information consumes is rather obvious; it consumes the attention of its recipients … a

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TalkBizNow - will it fly?

Information Matters

I Read in the FT yesterday about this new British social networking site for the business community. Initial comments and reviews from the FT and others are mixed with a feeling that they may be a bit late to the party and that LinkedIn and Xing are going to be hard to beat. Gaining critical mass of the right types of people is key. According to the FT, the company will be targetting the top 200 “super networkers&# from other sites who have more than 500 contacts and trying to entice th

IT 40
article thumbnail

Cross-domain leaks of site logins

Scary Beasts Security

Browsers suck. We're building our fortified web apps on foundations of sand. A little while back, I was talking with Jeremiah about an interesting attack he had to determine whether a user is logged into a given site or not. The attack relies on the target site hosting an image at a known URL for authenticated users only. It proceeds by abusing a generic browser cross-domain leak of whether an image exists or not -- via the onload vs. onerror javascript events.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Jive Clearspace 2.5: increasingly sophisticated social productivity tools | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 150

More Trending

article thumbnail

The Perils of Showboating | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 105
article thumbnail

The Future of the Web | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 105
article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 105
article thumbnail

'Is enterprise collaboration an oxymoron?' Be the Voice Podcast with David Spark. | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 100
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Office 2.0: Eating our own dogfood. | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

Paper 100
article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

ZDNet All of ZDNet Reviews Whitepapers Downloads Home News & Blogs Reviews Downloads White Papers Log Out | Manage | Log In | Join | Site Assistance | Follow via Twitter Facebook Email US Edition ZDNet is available in the following editions: Australia Asia China France Germany United Kingdom Companies Hardware Software Mobile Security Research Special Coverage Amazon Apple AT&T Cisco Dell EMC Google Hewlett-Packard IBM Intel Microsoft Oracle Research in Motion SAP Verizon Data center Green T

article thumbnail

People Finder: Searching Without Logic?

ChiefTech

One of the most frequent tasks on many intranets is finding people within the company. Providing an effective way to search people is thus a key goal in designing intranets. This goal becomes even more important for an organization like Emirates, a leading international airline, which has over 35,000 employees with over 140 nationalities and where more people are likely to use this feature more frequently.

article thumbnail

Applying Turing's Ideas to Search

ChiefTech

Here’s how the game works: You’re on your computer, instant messaging away. One IM session is with a real person and the other is with an artificial intelligence (AI) program that’s designed to pose as a human being by using a casual conversational tone. The AI is able to respond in complete sentences with realistic syntax to mask its identity, even throwing in slang, canned humor, or typos.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Your New Excuse to Get an Xbox

ChiefTech

Games are fun, addictive, beautiful, and immersive. Websites, for the most part, are not. Take a moment and think about what video games look like, what they sound like, the way you can move on the screen, what “you&# can be. Think of how you feel when you play and who you play with. Consider the launch of Halo 3 on Xbox 360, with unprecedented graphics, sound, and interactivity that Time.com called “refined to the point where it delivers only pure unadulterated gaming bliss.&# Peopl

IT 60
article thumbnail

IDEA 2008: An Interview with Andrew Hinton

ChiefTech

As IDEA 2008 draws closer, the IA Institute is conducting a series of interviews with the speakers for the conference. As Event Coordinator for IDEA , I fill a variety of roles, including the Interviewer of IDEA Presenters (which I proudly share with Liz Danzico). This is the second interview in the series, and this time I pulled the name of Andrew Hinton, Lead Information Architect at Vanguard, from the virtual hat.

article thumbnail

IDEA 2008: An Interview with Bill DeRouchey

ChiefTech

As IDEA 2008 draws closer, the IA Institute is conducting a series of interviews with the speakers for the conference. As Event Coordinator for IDEA , I fill a variety of roles, including the Interviewer of IDEA Presenters (which I proudly share with Liz Danzico). For this interview, I was fortunate to draw Bill DeRouchey’s name. If his name is not familiar to you, some of his work should be.

IT 45
article thumbnail

Web 2.0 Executive Bootcamp - 23 September 2008, Sydney

ChiefTech

Stephen Collins is co-delivering (with Hinchcliffe and Company’s, Jeff Kelly) the first ever Web 2.0 Executive Bootcamp in the Southern Hemisphere at Web Directions South : " Web 2.0 Bootcamp leads you through a deep exploration of the latest ideas, business models, trends, and techniques behind Web 2.0 with a special emphasis on proven, actionable methods for creating new online products and services – or transforming existing ones – using a Web 2.0 model.

40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

SNA study of Wikipatterns.com

ChiefTech

Laurie Lock Lee from Optimice has published the results of a social network analysis (SNA) study of the Wikipatterns community (pdf). Laurie used SNA to examine the value of participation, health and value of new relationships of this particular community, using a combination of a survey and " wiki mining " to gather data. A couple of interesting results in relation to the value a wiki brings: " Looking at the percentage differentials, we can see that those that took on the more a

Mining 40
article thumbnail

The value of social networking, now just business as usual

ChiefTech

Metro Station are a hot band of the moment, but that's not why I mentioned them here. I like this little story from an interview with them about how they formed: So how did all of you guys meet? TC: Uh, me and Mason originally first met because, I knew his little brother, and I just kept hearing, ‘man, I gotta meet Mason,’ and then we got together and hung out, and a few days later, I went to his house and we recorded our first song like that night.

IT 40
article thumbnail

My Blogging Manifesto

ChiefTech

Twittering with James Robertson and Alex Manchester , the other day we found ourselves talking about how we define blogging and the differences between plain old content management and blogging. here are some more thoughts on that issue: This is something I've talked about in the past, describing it as the grey area issue between social computing and other traditional information management tools.

article thumbnail

Frog in a SharePoint - is the water boiling yet?

ChiefTech

The other day I posted a link to the summary of a conference presentation, titled " SharePoint can lead to huge chaos " Looking at my stats this morning, I noticed an above average response to this post in terms of hits. Clearly, this issue grabbed the attention of some people and in fact this is the very reason why I posted the link, because I know its an emerging problem.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ICT is the 5th most important factor in attracting and retaining staff

ChiefTech

During the last year or so I had been working on a number of projects that linked ICT to staff recruitment and retention, so its always good to see other evidence supporting the argument for investing in the information workplace. I noticed that Colliers International's 2008 Office Tenant Survey reports that cutting-edge ICT is the 5th most important factor in attracting and retaining staff.

IT 40
article thumbnail

"SharePoint can lead to huge chaos"

ChiefTech

Blogging from NZ's BrightStar Intranet conference, Michael provides a summary of Chandima Kulathilake 's presentation on SharePoint governance. Kulathilake is a Microsoft SharePoint specialist and explains how " SharePoint can lead to huge chaos ": Site proliferation. no plans Server proliferation. people and groups doing their own thing Technology proliferation. many different tools, where do you put things?

article thumbnail

Information security myopia

ChiefTech

My article in the current edition of IDM magazine used examples of traditional information security failures to provide some balance against concerns about Web 2.0 security. In the latest example from the UK a contractor lost an unencrypted memory containing " details about 10,000 prolific offenders as well as names, dates of births and some release date of all 84,000 prisoners in England and Wales - and 33,000 records from the police national computer.

article thumbnail

The Lean Information Workplace

ChiefTech

You get the impression that many organisations think that good information management is a nice to have, rather than something that can help the bottom line. However, reading The Complete Lean Enterprise again I'm reminded (and encouraged) that information management really is a critical area for improvement. In the introduction, the authors say that organisations are only focused on achieving a 35%-40% productivity gain in their production areas , when in reality they should be aiming for a 400

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Error! This Enterprise upgrade requires Change Management 2.0 is installed

ChiefTech

Kate has shared her slides from the Enterprise 2.0 for Information Professionals conference and also commented a little on the point about innovation that I also mentioned in my reflection post : " The entire process of adopting enterprise 2.0 is an innovation activity. It is about driving new ways of interacting between people and with new technology.

IT 40
article thumbnail

The new kid on the vendor-neutral CMS consulting block

ChiefTech

James Robertson from Step Two blogged recently that: " As far as we are aware, we are the only truly vendor-neutral CMS consultants in Australia " Just a reminder (and in the interest of some friendly competition), there is actually a new kid on the block (although we have a heap of experience). IPP Consulting. I've actually recently added a new Information & Knowledge Management page on the IPP Website to explain the areas we work in.

CMS 40
article thumbnail

Reflecting on Enterprise 2.0 for Information Professionals

ChiefTech

Last week I attended the second day of Key Forum's Enterprise 2.0 for Information Professionals conference and I blogged some short summaries of each presentation. I thought might add some more reflective thoughts on the whole of that day: Neither open source or proprietary tools won out. People are picking the tools that make sense within the context of their strategy, available skill set, functionality and budget - what's right for one is not necessarily right for another.

Privacy 40