This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The largest software company in the world and the ‘no software’ cloud world are colliding, and in the perceptions battle Sharepoint are shining a lot brighter
( image ) Here’s a short overview of Google’s past few months: It’s angered policymakers and pundits with a sweeping change to its privacy settings. It’s taken a beating for favoring its own properties in its core search results. It’s been caught with its hands in Apple’s cookie jar , and despite the fact Facebook and others previously condoned the practice , it was savaged for doing so.
If you are a DB2 for z/OS DBA or systems programmer, chances are that a good bit of what you do is focused on improving the CPU efficiency of your organization's DB2-accessing application workload. There are various ways in which people go about reducing DB2-related CPU consumption, including SQL statement tuning, physical database design changes (e.g., adding or modifying indexes), shifting work to zIIP engines (for example, by going with native SQL procedures versus external stored procedures
On March 23, 2012, the Article 29 Working Party (the “Working Party”) adopted an Opinion on the European Commission’s data protection law reform proposals , including the draft Regulation that is of particular importance for businesses. The Working Party’s Opinion serves as the national data protection authorities’ contribution to the legislative process before the European Parliament and the European Council.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
A highlight of TED this year was watching my pal Rob Reid do a short talk on the math of those who claim piracy is killing the content business. It’s short, it’s really funny, and it’s a prequel of sorts for Rob’s wonderful new comic novel, which comes out in May.
Sometimes an APAR (in IBM-ese, a description of a software functional enhancement or defect correction effected via application of a fix) is not what it -- at first -- seems. Take DB2 for z/OS APAR PM29226 , for example. The opening sentence of the brief (just one paragraph) APAR text reads as follows: "This APAR provides sample job DSNTEJ67 which initiates the process of converting source for an external SQL procedure into source for a native SQL procedure.
On March 27, 2012, the Federal Trade Commission announced a proposed settlement order with RockYou, Inc. (“RockYou”), a publisher and developer of applications used on popular social media sites. The FTC alleged that RockYou failed to protect the personal information of 32 million of its users, and violated multiple provisions of the FTC’s Children’s Online Privacy Protection Act (“COPPA”) Rule when it collected information from approximately 179,000 children.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Automation beyond Robots. ravi.kumarv@cgi.com. Wed, 03/21/2012 - 08:00. Thinking about automation in business we picture robots in factories, right? But this is only a small part of the story and the opportunities for business to automate a wide range of activities are astonishing. Which makes me wonder why the level of business automation in Europe is still relatively low?
You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.
Who’s going to be the primary technology ‘parents’ and who will be the ‘children’ in order to solve the fragmentation and information filtering issues that are plaguing efficiency in many larger firms? More importantly, who is going to be responsible for this important task?
( image ) Facebook claims the data we create inside Facebook is ours – that we own it. In fact, I confirmed this last week in an interview with Facebook VP David Fischer on stage at FM’s Signal P&G conference in Cincinnati. In the conversation, I asked Fischer if we owned our own data. He said yes. Perhaps unfairly (I’m pretty sure Fischer is not in charge of data policy), I followed up my question with another: If we own our own data, can we therefore take it out of Fac
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
The Canadian Radio-television and Telecommunications Commission (CRTC) has made and registered its Electronic Commerce Protection Regulations for the Anti-Spam Act (CASL). […].
On March 26, 2012, the Federal Trade Commission issued a new privacy report entitled “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers.” The report charts a path forward for companies to act in the interest of protecting consumer privacy. In his introductory remarks, FTC Chairman Jon Leibowitz indicated his support for Do Not Track stating, “Simply put, your computer is your property; no one has the right to put anything on it that you d
I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.
Interesting view from Unesco about the economics of open source for a fully functioning OAIS digital preservation solution. Unesco is a big supporter of open source but it notes that when there is a need for a fully integrated standards based system for storage and management suitable for long term access an open source solution requires significant financial resource.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
There’s plenty of great online and mobile technology available across a wide range of price points for small & medium businesses right up to global enterprises, but none of them will be of much use without successfully motivating your prospective participants to start interacting through these channels
Quick, what’s LinkedIn? If you’re like me, the first thing that comes to mind is “a professional social network.” Perhaps “a place to get a job, or find someone to fill a job.” Or maybe “the place my professional resume lives.” And certainly “a very successful Internet IPO.” But over the two years or so, LinkedIn has quietly built itself into a significant media business.
Recognizing who has created ideas and concepts, and who has done the relatively unglamorous work of achieving success with detail work is instrumental to the success of enduring confidence in collaborative work
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ). The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin
Last week I wrote a post about Neal Mohan , who will be joining us for this month’s Signal conference in San Francisco. Today I’m focusing on Adam Bain and his role as President, Global Revenue at Twitter. I’ve known Adam for some time, since his days at Fox Interactive Media, where he built Fox’s advertising platform (initially as a product out of MySpace).
( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).
( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ) The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin&
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
I am in the midst of writing a post on the history of FM, and I thought it’d be fun to post the PDF linked to below. It’s a summary of musings from Searchblog circa 2006-7 on the topic of conversational media, which is much in the news again, thanks to Facebook. We created the document as an addendum to our first ever CM Summit conference, as a way of describing why we were launching the conference.
( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).
On March 21, 2012, Massachusetts Attorney General Martha Coakley announced that Maloney Properties Inc. (“MPI”), a property management firm, executed an Assurance of Discontinuance and agreed to pay $15,000 in civil penalties following an October 2011 theft of an unencrypted company-issued laptop. The laptop contained personal information of more than 600 Massachusetts residents and was left in an employee’s car overnight.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content