February, 2013

article thumbnail

On Coming Back to FMP

John Battelle's Searchblog

The post On Coming Back to FMP appeared first on John Battelle's Search Blog. Starting a business is a journey, as any founder will tell you. When I started Federated Media Publishing almost eight years ago, I did my best to collect all the lessons learned from Wired, The Industry Standard, and Web 2 Summit, and apply them to my new venture. One of those lessons was that it’s [.

IT 111
article thumbnail

Yahoo: back to the future office

Collaboration 2.0

Yahoo's command and control move of all employees back onsite may be a pyrrhic victory: bricks and mortar economics don't add up now that the epicenter of modern firms is the screen you're reading this on.

101
101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Comparing the usability of page creation: SharePoint 2013 versus other social intranets

ChiefTech

Yesterday I did a deep dive into the user experience of three different intranet and collaboration platforms: SharePoint 2013, Jive and Confluence. I looked specifically at how these particular products support tables in their rich text editors , because getting this right is quite tricky in a Web browser. While each product performs well overall, each also addresses the user experience quite differently.

article thumbnail

Choosing an Internet, Digital Interactive Marketing Services Partner - Interviews and RFP/RFIs

Interactive Information Management

How to evaluate your digital, interactive marketing partner, for local and regional businesses - particularly in the Washington DC and Northern Virginia marketing and advertising area. We'll put it out there – as you evaluate prospective partners like KME Internet Marketing to help with web marketing initiatives, gaining exposure for your business and driving new sales from the Internet, this is exactly what you should seek.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS: What Might "Template" DDL for CREATE TABLESPACE and CREATE INDEX Look Like?

Robert's Db2

Recently, a DB2 for z/OS DBA sent me a question about a particular clause of the SQL DDL (data definition language) statements CREATE TABLESPACE and CREATE INDEX. In his note containing the question he also sent what you might call his "template" CREATE TABLESPACE and CREATE INDEX statements -- the statements that serve as a pattern that he uses when creating these objects in his DB2 environment.

Access 48

More Trending

article thumbnail

The 2013 Summit Arrives: Bridging Data And Humanity

John Battelle's Searchblog

The post The 2013 Summit Arrives: Bridging Data And Humanity appeared first on John Battelle's Search Blog. Some of the more than 25 speakers already joining us at the 2013 CM Summit. Over on the brand spanking new CM Summit website, we’ve announced our initial speaker lineup and progam theme for the 2013 event – Parting the Clouds: Bridging Data and Humanity.

Marketing 108
article thumbnail

Maintenance is the battleground, innovation the prize

Collaboration 2.0

'Rimini Street''s 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.

93
article thumbnail

SharePoint 2013: Is utility more important than usability?

ChiefTech

Is utility more important than usability? When evaluating SharePoint 2013 specifically as a collaboration platform, this question is often top of mind. The Metro user interface in SharePoint 2013 is a refreshing update to this mature platform, but usability goes deeper than just the front-end theme. A good user experience is both subjective in relation to the user's own experience and situated in the context of use.

IT 54
article thumbnail

The EU Data Protection Regulation: timing

Privacy and Cybersecurity Law

As we’re all aware the new Data Protection Regulation (the Regulation) was announced to much bombast a little over a […].

40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS: Boosting UNLOAD and LOAD Performance with Pipes and FORMAT INTERNAL

Robert's Db2

My colleague Jorn Thyssen, who is based in Denmark, recently let me know of some nice work that he had done in setting up a high-performance process that gets data from one DB2 for z/OS table into another via the UNLOAD and LOAD utilities. What Jorn shared with me I'll share with you in this blog post. Here's how this got started: Jorn, an IBM System z Information Management Technical Specialist, had delivered presentations on the DB2 Analytics Accelerator for z/OS to a number of organizations.

article thumbnail

Singapore Personal Data Protection Commission Issues Advisory Guidelines

Hunton Privacy

Following up on its February 5, 2013 consultation paper , Singapore’s Personal Data Protection Commission has issued two additional public consultation papers concerning the guidelines the Commission is empowered to issue under the new data protection law. The first proposed set of advisory guidelines examines key concepts in the Personal Data Protection Act (“PDPA”), with thorough discussions of definitions as well as data protection obligations set forth in the PDPA.

article thumbnail

That Guilty Pile of Outdated Technology

John Battelle's Searchblog

The post That Guilty Pile of Outdated Technology appeared first on John Battelle's Search Blog. ( image Wired ) Way back in the day when I was making magazines, I was buried in print. I subscribed to at least twenty periodicals, easily twice that many came my way without my asking. It made for a huge pile of printed material on the end of my desk (stuff I really should read), and it creeped into the horizontal spaces behind me (stuff I think I should read, in case I get the time), or on my

Sales 107
article thumbnail

Maintenance is the battleground, innovation the prize

Collaboration 2.0

Rimini Street's 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.

93
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

VXConnect: Virgin America's Chatter-based intranet goes live

ChiefTech

I'm pretty sure there were some that said this sort of thing couldn't be done - run an intranet on an enterprise microblogging, cloud-based platform like Salesforce Chatter. But a few weeks ago - the concept we heard about last year - went live at Virgin America : The encouraging thing here is that, Appirio , the site's developer: "helped guide Virgin America away from making merely cosmetic tweaks to the existing Chatter experience and towards the development of a new application built on the C

Cloud 52
article thumbnail

Consciously Consider Early Adoption

CGI

Consciously Consider Early Adoption. ravi.kumarv@cgi.com. Wed, 02/20/2013 - 07:00. At Logica, now part of CGI, my job is to advise CIOs on how they can realise the greatest net value from the adoption of disruptive technology trends. We’re happy with our methods for most of the talked-about trends (analytics, social media, mobility, cloud…). But we need to keep horizon-scanning too, so the question naturally arises: How soon should we adopt the next major trend into our method?

article thumbnail

How pre-answered caller authentication helps prevent telephone bank fraud

Dark Reading

Prevention vs. clean up. It’s a security question all financial institutions should ask themselves. When it comes to providing a trusted customer environment, banks are typically better at resolving problems stemming from non-predictive authentication and fraud than preventing them. That’s because they continue to allow criminals to get their foot in the door.

article thumbnail

FTC Settles Charges in First Case Against Mobile Device Manufacturer

Hunton Privacy

On February 22, 2013, the Federal Trade Commission announced that it had settled charges against HTC America, Inc. (“HTC”) alleging that the mobile device manufacturer “failed to take reasonable steps to secure the software it developed for its smartphones and tablet computers, introducing security flaws that placed sensitive information about millions of consumers at risk.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

An Apology To My RSS Readers – But I Had To Do It.

John Battelle's Searchblog

The post An Apology To My RSS Readers – But I Had To Do It. appeared first on John Battelle's Search Blog. If you’re a fan of this site, you’re also probably a fan of RSS. (For the full story please click over to my site. Fraudsters have been ripping off my full text feed, so I had to do this. So sorry).

IT 106
article thumbnail

Reaction overload.

Collaboration 2.0

'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'

92
article thumbnail

The Highly anticipated 'Mailbox' app

ChiefTech

Mailbox is another attempt to reinvent the email interface , alto. Designed for mobile (currently iPhone + gmail only) and built loosely around the inbox zero concept, Mailbox have: "redesigned the inbox to make email light, fast, and mobile-friendly. Quickly swipe messages to your archive or trash. Scan an entire conversation at once with chat-like organization.

article thumbnail

Looking for a needle in a haystack couldn’t be easier!

CGI

Looking for a needle in a haystack couldn’t be easier! ravi.kumarv@cgi.com. Mon, 02/11/2013 - 07:00. Big data is a massive opportunity. It also presents some significant challenges that traditional systems find hard to handle. We’ve all seen the big data statistics: every minute 1,820 TB of data is created, 204m emails and 11 million instant messages are sent, 700,000 Google searches are made and businesses receive 35,000 Facebook likes.

Mining 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

New EU rules on security

Privacy and Cybersecurity Law

If you Google “EU law on security”, you’ll find the EU Data Protection Directive near the top of the search […].

article thumbnail

NIST Issues RFI for Framework for Reducing Cyber Risks

Hunton Privacy

On February 26, 2013, the National Institute of Standards and Technology (“NIST”) issued a Request for Information (“RFI”) to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported , the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the “Executive Order”), released on February 12, 2013, directs NIST to coordinate development of this framework.

Risk 40
article thumbnail

Reporters Need to Understand Advertising. But Should They Be Making It?

John Battelle's Searchblog

The post Reporters Need to Understand Advertising. But Should They Be Making It? appeared first on John Battelle's Search Blog. ( image ) I know that when I do write here, I tend to go on, and on – and those of you who read me seem to be OK with that. But sometimes the best posts are short and clear. That was my thought when I read Journalists Need Advertising 101 by Brian Morrissey, writing in Digiday last week.

IT 105
article thumbnail

Reaction overload.

Collaboration 2.0

The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges

92
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Is Google's fixation on the office a weakness?

ChiefTech

It shouldn't really come as any surprise that Google doesn't actively encourage working from home (aka 'telecommuting' or the 'digital workplace'): Google believes working at home, or "teleworking", is not the best environment for ideas to flourish, according to its chief financial officer Patrick Pichette…. …'How many people telecommute at Google?' ” Mr Pichette said at a talk in Sydney on Monday.

IT 49
article thumbnail

CIOs must back technology innovation

CGI

CIOs must back technology innovation. ravi.kumarv@cgi.com. Thu, 02/07/2013 - 07:00. It can be damaging to talk about business innovation in technology terms. Unless you’re a company like Apple, which designs or manufactures technology products, your colleagues outside the IT department are likely to question your motivation. They’ll rightly assert that innovation is only legitimate when it supports the business goals.

article thumbnail

Cookies: the UK ICO perspective

Privacy and Cybersecurity Law

We’re now well past the UK grace period for cookie compliance. But what are companies actually doing about this? Are […].