February, 2011

article thumbnail

File Under: Metaservices, The Rise Of

John Battelle's Searchblog

I'm beta testing a new service called Memolane , which collects the breadcrumbs we drop around the web (from Foursquare, Twitter, Facebook, Flickr, RSS, etc) and visualizes them as a timeline. It's not fair for me to review the service at this point - I'll save that for later. Rather, I'm interested in what it augurs: The rise of metaservices. The problem/opportunity addressed by metaservices has been worked to death by folks far smarter than I - in particular by well-intentioned developers look

article thumbnail

Box.net Gets 48 million more to build enterprise platform

Collaboration 2.0

Box.net got forty eight million dollars bigger today thanks to a Series D funding round led by Meritech Capital Partners, with new investment firms Andreessen-Horowitz and Emergence Capital Partners joining previous investors Draper Fisher Jurvetson, Scale Venture Partners and US Ventures Partners to help with Boxâs growth as an enterprise cloud platform.

Cloud 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking for a roommate for my schweet pad Santa Monica

Daradiction

Hello! I moved within Santa Monica recently to a great place with a better layout for working at home and having people over. I’ve had a GREAT roommate for awhile, but he recently got engaged and they are getting married. It’s a 2BR / 2BA place, remodeled with hardwood floors and a great kitchen. Their share of the rent would be around $1100 but could be less/more on if they want the place furnished, office den, parking spot, etc.

IT 83
article thumbnail

DB2 for z/OS Roles: Trust Me on This One (Part 2)

Robert's Db2

So, in part 1 of this two-part entry, which I posted a couple of weeks ago, I referred to a question someone had sent to the DB2-L discussion forum. The person asking the question wanted to know if the roles and trusted contexts functionality introduced with DB2 9 for z/OS could be used to provide DBAs in certain geographies with the privileges needed to get their work done, but in a way that would deny them access to data in user (versus system) tables.

Access 54
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Some insights about password shapes

Elie

Today, I would like to share with you some insights that I discovered about password “shapes.” More specifically, I will discuss some of the interesting metrics I computed from the RockYou database, which is, as far as I know, the largest password database ever leaked, with 32 million passwords!

More Trending

article thumbnail

Google, Social, and Facebook: One Ring Does Not Rule Them All

John Battelle's Searchblog

When I read Google announcements like this one, An update to Google Social Search , I find myself wondering why Google doesn't just come out and say something like this: "We know social search is important, and we're working on it. However, we don't think the solution lies in working only with Facebook, because, to be honest, we think social media is bigger than one company, one platform, or one "social graph.

Mining 105
article thumbnail

Dead.ly url's and authoritarian social network tracking

Collaboration 2.0

The escalating unrest in North Africa and other parts of the world continues to make us wonder about the fundamental levers of control of the entire internet, and its uses for mass interactions and broadcasts. Bit.ly, the uniform resource locator (web site url address) shortener widely used by marketers and Twitter users relies on.ly, the [.

Marketing 104
article thumbnail

I got accidental code execution via glibc?!

Scary Beasts Security

The story of Chromium security bug 48733 , with guest Cris Neckar, part I It has been a long time now, but the story of Chromium security bug 48733 deserves to be told. It involves intrigue in glibc and even gcc; and notably I accidentally executed arbitrary code whilst playing with this bug! The bug was reported in July 2010, and there were instantly some WTF aspects.

article thumbnail

DB2 for z/OS Roles: Trust Me on This One (Part 1)

Robert's Db2

Although roles and trusted contexts have been on the mainframe DB2 scene for over three years (they were introduced with DB2 9 for z/OS), there is still some misunderstanding in the DB2 community regarding what these features are and how they can be used. That point was underscored by a question posted a few weeks ago to the DB2-L forum. The person asking the question had a need to provide DBAs in certain geographies with the privileges needed to get their work done, but in a way that would deny

Access 54
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Rise of Digital Plumage

John Battelle's Searchblog

Before we go out, my wife will often ask "how are people dressing tonight?" I'm never quite sure how to answer - at least for her. In essence, she's asking me to read the room we'll be in, and then translate the social nuance of that room to her choice of clothing. While I certainly pay attention to what I wear, I've come to the point in my life where choosing clothes for a social night out isn't that big a deal anymore.

Marketing 103
article thumbnail

This Is News? JC Penney and Link Farms

John Battelle's Searchblog

As I read this NYT story on JC Penney's black hat link farms , I felt like I was in a way back machine - I mean, five solid pages of copy about. old school low-rent link-spam sites? Really? I dunno, if this is news, the news is getting stale. The never-ending battle between Google and link-buying outfits is as old as search itself. The story told in the Times' piece sheds absolutely no new light on the tale, despite leading with lines like "the digital age’s most mundane act, the Google search,

IT 96
article thumbnail

Everybody in social!

Collaboration 2.0

The 1999 US Gap 30 second TV spot above - ‘everybody in vests!‘ - is now exquisitely unfashionable. Hi Tech is every bit as fashion driven as the clothing industry, but unlike the rag trade has an evangelical quality which can be quite amusing to those being propositioned within prospect businesses. Computer technology’s role in business [.

96
article thumbnail

will.i.am at Signal LA

John Battelle's Searchblog

I've interviewed will.i.am before, but this conversation at Signal LA earlier in the week was my favorite of the day. will.i.am is a remarkable thinker and as you can see from our conversation, he's much, much more than "just a musician.".

94
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Western bubblenomics & global business momentum

Collaboration 2.0

San Francisco & Silicon Valley are the epicenter of tech funding, with some VC’s saying they will only finance companies located in the area because of the dense, rich local ecosphere of continuous innovation. Like San Francisco’s meteorological micro climates, the various sectors seem to blow hot and cold with amazing frequency, but for now the [.

89
article thumbnail

The Lotus legacy & social fuzzy concepts

Collaboration 2.0

IBM ‘Flying Cars’ Commercial 2000 Web 2.0 technologies have been through a short, strange trip since they came to the fore in the middle of the last decade. The old 1.0 web of dot com boom destination websites and email have now been largely supplanted by the highly interactive, opinionated and tracked world enabled by 2.0 [.

89
article thumbnail

Enterprise iTunes: The challenges of mobile collaboration management

Collaboration 2.0

Ex Microsoftie Nokia CEO Stephen Elop of Nokia announced he was ‘diving forward’ off the burning platform he alerted his fellow Nokia employees about earlier this week. This dive, as expected, was a jump to a primary partnership with the Microsoft phone ecosystem, but the whole episode brings up a number of interesting issues around [.

86
article thumbnail

Apple Shows Its Colors?

John Battelle's Searchblog

Today news comes ( from the NYT ) that Apple has shifted its approach to content sales, no longer allowing content owners to directly sell access to their own content via apps on iTunes. This is ridiculous, and if it proves out, spells the end of the media's love affair with Apple and its platform. Mark my words. Apple's crossed a line here, and in a short time, it will retreat back.

IT 84
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Live blogging Eric Schmidt at the IAB Annual Leadership Meeting

John Battelle's Searchblog

I'm one of the four hosts of this year's IAB conference, and kicking off the event is a keynote from Google's Eric Schmidt. I'll be updating this post as he speaks, so stay tuned. Eric is wearing a vneck sweater and looks quite dapper. Executive Chairmanship agrees with him (not that I know anything about that.). Eric starts by hitting "Morning Joe" who said that computers are "cold companions.

article thumbnail

Hey Apple, We've Got a Better Way

John Battelle's Searchblog

Google's timing isn't coincidental: A simple way for publishers to manage access to digital content (Google Blog). Google announces "Google One Pass" - "a payment system that enables publishers to set the terms for access to their digital content.". Google doesn't have the iPad/Phone monoculture, but it's got reach, it's got Android, and it's got a better deal for media companies.

Access 79
article thumbnail

Signal LA Livestream

John Battelle's Searchblog

Twitter hashtag is # SignalLA , here's the livestream: Live Video streaming by Ustream.

71
article thumbnail

Is Google Going After Conde Nast?! Nah.

John Battelle's Searchblog

Yesterday Google unveiled " Google Weddings ," a site that ostensibly competes with what insiders in the media business understand to be a particularly lucrative niche: Bridal publications. Magazines and websites such as Brides.com are cash cows for the likes of Conde Nast, Hearst, and others, and usually top the lists of publications with the most ad pages on an annual basis.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Signal Roundup: 2.18.11

John Battelle's Searchblog

I missed rounding up last week's Signal, forgive me. This week is a pretty good one though, ending as it did with something of a philosophical rant around "what is government in the age of the Internet." Enjoy. Friday Signal: What Do We Do With The Internet? Thursday Signal: What, You Don’t Like Me? Weds. Signal: Apple Takes Its Bite. Tuesday Signal: The Kings of Liminal.

article thumbnail

Signal LA: The Curtain Raiser - Tim and Arianna Open A Sold Out Show

John Battelle's Searchblog

Tuesday marks the launch of FM's Signal conference series , where we focus on one topic, one day, in one city. For our first event, in Los Angeles , we've always had a great lineup, but recent events have certainly made it even more timely. The event has been sold out since last week, but given the weekend's news, I've convinced our events director to allow people to register at the door.

Sales 66
article thumbnail

The Call of the Filed

John Battelle's Searchblog

I've noticed that the number of folks who are networking with me via LinkeIn has really increased lately. Anyone else noticed this? Might it be related to the publicity around LinkedIn's recent IPO filing? The company today announced " Skills " - a way to find people with certain skillsets. It's been on a tear recently in terms of new features - Swarms , a visualization of search terms, InMaps , a visualization of your network, OpenGroups, a new groups feature, and Signal , more sophisticated se

article thumbnail

The Next iPhone Test

John Battelle's Searchblog

I've been watching the overwhelmingly positive "reviews" of the new Verizon iPhone bounce around the blogosphere today, and I have to say, it's hard to not get caught up on the excitement: Hey! I can actually MAKE A PHONE CALL ! Well, perhaps we've all forgotten, but until the iPhone hit AT&T's network and slammed it to the ground, phone calls were pretty much the same on either network.

IT 66
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

China: Draft of Personal Information Protection Guidelines Issued for Comment

Hunton Privacy

A draft document, entitled Information Security Technology – Guidelines for Personal Information Protection , has been issued in China for comment. While comments are being solicited at this time, if issued in its proposed form, this document has the potential to add significantly to the rules governing the handling of personal information in China.

article thumbnail

India Issues Draft Privacy Rules

Hunton Privacy

The Government of India’s Ministry of Communications & Information Technology has published three draft rules that would implement the Information Technology Act, 2000. These include: Reasonable Security Practices and Procedures and Sensitive Personal Information ; Due Diligence Observed by Intermediaries Guidelines and Guidelines for Cyber Cafe.

Privacy 40
article thumbnail

European Network and Information Security Agency Publishes Report on Cookies

Hunton Privacy

On February 18, 2011, the European Network and Information Security Agency (“ENISA”), an advisory body created to enhance information security in the EU, announced the issuance of its report on cookies, entitled “ Bittersweet cookies. Some security and privacy considerations.”. The primary goal of the report is to address security and privacy concerns associated with the use of cookies.