This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Whether you are job hunting or working, the challenges of personal control of your online personality at work, societally and socially have never been more complex. A hundred years ago we had virtually no data associated with us beyond possibly owning a passport, a few pieces of legal paperwork and maybe some national security files about us we [.
In the current issue of the New Yorker, columnist James Surowiecki, who I generally admire, gets it exactly wrong when it comes to Groupon. He writes: " But it seems unlikely that it’s going to become a revolutionary company, along the lines of YouTube, Facebook, Twitter, and Google.Groupon, by contrast, is a much more old-school business. It doesn’t have any obvious technological advantage.
By now, you've probably seen and/or heard a good deal of information about DB2 10 for z/OS , which was announced and became generally available this past October. There is indeed a lot of big news associated with this latest release of IBM's mainframe relational database management system: reduced CPU costs, support for temporal data (tables with system and/or business time dimensions), a huge increase in the number of threads that can be concurrently active, a migration path to universal tables
The Centre for Information Policy Leadership at Hunton & Williams has issued the following statement about the U.S. Department of Commerce’s “Green Paper” released on December 16 : The Centre for Information Policy Leadership congratulates the Department of Commerce on the release of its Green Paper, entitled “Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework,” and commends the Department for the extensive outreach and research it conducted to inform
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Why Understanding Culture Is So Important in Collaborative Innovation. ravi.kumarv@cgi.com. Fri, 12/17/2010 - 07:00. Innovation is an over-used, misunderstood concept, despite being talked about by most companies in most markets. Today, it has often come to mean creativity or invention and is often strongly associated with technological developments or research.
Due to time constraints, I'm only going to list some interesting frameworks I'm researching and/or using here for my own reference. JavaScript. jQuery - My current favorite JS library. cujo - an MVC framework that runs in the browser. selectivizr - CSS3 selectors for IE. YUI - A fuller JS + CSS library. CSS. jQuery UI. oocss - Object Oriented CSS. 960 Grid System - provides commonly used dimensions, based on a width of 960 pixels.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Due to time constraints, I'm only going to list some interesting frameworks I'm researching and/or using here for my own reference. JavaScript. jQuery - My current favorite JS library. cujo - an MVC framework that runs in the browser. selectivizr - CSS3 selectors for IE. YUI - A fuller JS + CSS library. CSS. jQuery UI. oocss - Object Oriented CSS. 960 Grid System - provides commonly used dimensions, based on a width of 960 pixels.
The Salesforce platform is starting to fill out into a stack that is a credible threat to other enterprise players well beyond their core sales roots. The Dreamforce event has been very accessible online - I spent a couple of hours at San Francisco’s Moscone Center earlier this week and have been keeping an eye [.
This past week I spent a fair amount of time in New York, meeting with smart folks who collectively have been responsible for funding and/or starting companies as varied as DoubleClick, Twitter, Foursquare, Tumblr, Federated Media (my team), and scores of others. I also met with some very smart execs at American Express, a company that has a history of innovation, in particular as it relates to working with startups in the Internet space.
A DB2 DBA friend of mine recently told me of a problem he'd encountered in reorganizing a single partition of a partition-by-growth (PBG) tablespace: the online REORG job failed with an out-of-space condition pertaining to the partition's shadow data set. The topic of partition-level REORGs of PBG tablespaces is one that I find interesting; thus, this post, in which I'll explain why my friend hit that out-of-space situation and how he resolved it.
On December 18, 2010 , President Obama signed into law the “Red Flag Program Clarification Act of 2010” (S.3987), which amends the Fair Credit Reporting Act with respect to the applicability of identity theft guidelines to creditors. The law limits the scope of the Federal Trade Commission’s Identity Theft Red Flags Rule (“Red Flags Rule”), which requires “creditors” and “financial institutions” that have “covered accounts” to develop and implement written identity theft prevention programs to
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Some people may have seen that David Rosenthal from Stanford has posted on his blog ( [link] ) commenting on my previous post here. He makes a number of interesting points that I thought I should follow up on. Digital Preservation Architectures. First of all he states that his main argument is not that formats don't become obsolete but "basing the entire architecture of digital preservation systems on preparing for an event, format obsolescence, which is unlikely to happen to the vast majority o
Effective Ideas Don’t Need To Be Complicated. ravi.kumarv@cgi.com. Thu, 12/02/2010 - 07:00. Just reading an article in the Economist sent to me by a colleague at Logica about the use of text messaging in developing countries to verify the authenticity of medicine given to patients, which is helping combat the counterfeiters drugs trade. Often the simplest of ideas are the most effective because people just focus on the problem they are trying to solve, rather than start from a technology perspec
By 2014 internet traffic will triple in volume to 64 exabytes a month globally, according to Cisco’s (probably conservative) estimate, but your ability to filter the tsunamai of online information it is so easy for you to personally invoke is a much larger issue. My main email inbox is ground zero for the communications flowing in [.
I 'm usually the last guy to know, and the first to admit it, but is RSS really dead? I keep seeing posts claiming Twitter and Facebook have essentially replaced RSS as the way folks filter their news these days, but I for one am still addicted to my RSS client (it's Shrook , for anyone who still cares). Perhaps RSS isn't dead, but instead it's professionalizing.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Yesterday's post on Google having an algorithmic "opinion" about which reviews were negative or positive sparked a thoughtful response from Matt Cutts, Google's point person on search quality, and for me raised a larger question about Google's past, present, and future. In his initial comment (which is *his* opinion, not Google's, I am sure), Cutts remarked: ".the "opinion" in that sentence refers to the fact our web search results are protected speech in the First Amendment sense.
Wow, I've never seen this before. Check out Google's post , responding to the New York Times story about a bad actor who had figured out a way to make a living leveraging what he saw as holes in Google's approach to ranking. How Google ranks is the subject of increasing scrutiny, including and particularly in Europe. From Google's blog: Even though our initial analysis pointed to this being an edge case and not a widespread problem in our search results, we immediately convened a team that looke
Here's one for you, folks: A few folks "in the know" told me that a company is thinking about doing something with another company, but that second company has no idea about it, and in order for the whole thing to play out, a whole lot of things need to happen first, most of which are totally dependent on other things happening over which the sources have no control!
Related: Predictions 2010. 2009 Predictions. 2009 How I Did. 2008 Predictions. 2008 How I Did. 2007 Predictions. 2007 How I Did 2006 Predictions 2006 How I Did 2005 Predictions 2005 How I Did 2004 Predictions. 2004 How I Did. Well, it's that time of year again, time to see how well, or poorly, I did predicting events in the past year. This is my "keep myself honest" post, next week, I hope, I'll post my predictions for 2011.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Yesterday I posted what was pretty much an offhand question - Is RSS Dead ? I had been working on the FM Signal , a roundup of the day's news I post over at the FM Blog. A big part of editing that daily roundup is spent staring into my RSS reader, which culls about 100 or so feeds for me. I realized I've been staring into an RSS reader for the better part of a decade now, and I recalled the various posts I'd recently seen (yes, via my RSS reader) about the death of RSS.
When the Wikileaks story broke, I wrote a short piece chastising folks for blogging the assertion that one of the cables proves the Chinese government was behind the Google hacking which preceded Google's pulling out of the country. The cable is based on single sources, who are anonymous and second-hand, and that doesn't pass the journalistic sniff test.
I'm pleased to formally announce Federated Media's upcoming Signal Series - three full-day conferences in three great cities. Born from FM's annual Conversational Marketing Summit and my daily Signal newsletter , the Signal conference series focuses on one key topic in one city at a time. These three events will culminate in our annual CM Summit in New York next June during Internet Week.
This has become something of a tradition at Searchblog (well, OK, it's the second time in three years), in which I review the year in posts and note those of which I am particularly proud. For me it's a way to remember what I've been on about, and catalog some of my sketches for further work (perhaps as a book, ahem ). So in chronological order, here are the posts I liked from these past 12 months, with some commentary as well: January.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Almost immediately after the Web 2.0 Summit last month, Tim O'Reilly and I sat down at an FM event and debriefed each other on what we learned. Here's the video.
I'm pleased to announce that the preliminary agenda for our first ever Signal conference, Signal LA, is live and online. Signal is FM's conference series highlighting one major trend in digital media and marketing, in one city, on one day. First up is Los Angeles, Feb 8th, with a focus on Content Marketing. Check out the amazing lineup : Register today , I expect this to sell out.
Remember back in the halcyon days of the web, when bloggers shared a sense of community with each other, linking back and forth to each other as a matter of social grace and conversation, as opposed to calculated consideration? Well, if not, that's how it was back in 2003 or so, when I started blogging. Now, that signal (who linked to you recently) is gone, and honestly, not just for blogging.
It's been a while since I've updated you on my Signal newsletter, which I do each day. Here's the last week or so of them. If you want to read it in RSS, here's the feed: [link]. Tues. Signal: Does Your Media Have an Address? Monday Signal: Clearly, It’s Not About The Money. Friday Signal: Nazis From Space! Thurs. Signal: Go On, Opt Out. Just Don’t Come Cryin’ To Me ….
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
As previously reported , on December 16, 2010, the U.S. Department of Commerce released its Green Paper “aimed at promoting consumer privacy online while ensuring the Internet remains a platform that spurs innovation, job creation, and economic growth.”. During a press teleconference earlier that morning announcing the release of the Green Paper, Secretary Gary Locke commented on the Green Paper’s recommendation of adopting a baseline commercial data privacy framework, or a “privacy bill of righ
On November 25, 2010, the German data protection authorities responsible for the private sector (also known as the “Düsseldorfer Kreis”) issued a resolution on the minimum requirements for the qualifications and independence of company data protection officers (“DPOs”). This initiative follows inspections carried out within companies that revealed a generally insufficient level of expertise among DPOs given data processing complexities and the requirements set by the Federal Data Protection Act
On December 14, 2010, the United States Court of Appeals for the Sixth Circuit ruled in United States v. Warshak that a “subscriber enjoys a reasonable expectation of privacy in the content of emails” stored, sent or received through a commercial internet service provider (“ISP”). According to the court, the government must have a search warrant before it can compel a commercial ISP to turn over the contents of a subscriber’s emails.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content