March, 2012

article thumbnail

Sharepoint, Salesforce and the enterprise platform battle

Collaboration 2.0

The largest software company in the world and the ‘no software’ cloud world are colliding, and in the perceptions battle Sharepoint are shining a lot brighter

Cloud 252
article thumbnail

Why Hath Google Forsaken Us? A Meditation.

John Battelle's Searchblog

( image ) Here’s a short overview of Google’s past few months: It’s angered policymakers and pundits with a sweeping change to its privacy settings. It’s taken a beating for favoring its own properties in its core search results. It’s been caught with its hands in Apple’s cookie jar , and despite the fact Facebook and others previously condoned the practice , it was savaged for doing so.

Privacy 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Trading Memory for MIPS (Part 1)

Robert's Db2

If you are a DB2 for z/OS DBA or systems programmer, chances are that a good bit of what you do is focused on improving the CPU efficiency of your organization's DB2-accessing application workload. There are various ways in which people go about reducing DB2-related CPU consumption, including SQL statement tuning, physical database design changes (e.g., adding or modifying indexes), shifting work to zIIP engines (for example, by going with native SQL procedures versus external stored procedures

Access 48
article thumbnail

Article 29 Working Party Opines on Proposed EU Data Protection Law Reform Package

Hunton Privacy

On March 23, 2012, the Article 29 Working Party (the “Working Party”) adopted an Opinion on the European Commission’s data protection law reform proposals , including the draft Regulation that is of particular importance for businesses. The Working Party’s Opinion serves as the national data protection authorities’ contribution to the legislative process before the European Parliament and the European Council.

Privacy 40
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Anti-Spam Law: See updated CASL v. CAN-SPAM summary

Privacy and Cybersecurity Law

Are you one of those who have been monitoring the progress of Canada’s Anti-Spam Law (CASL)? If so, you may also […].

More Trending

article thumbnail

It ain't what you do.

Collaboration 2.0

Achieving great collective performance has the same basic principles for musicians, sports teams and other groups of individuals.

IT 237
article thumbnail

Rob Reid + Copyright Math = Hilarious

John Battelle's Searchblog

A highlight of TED this year was watching my pal Rob Reid do a short talk on the math of those who claim piracy is killing the content business. It’s short, it’s really funny, and it’s a prequel of sorts for Rob’s wonderful new comic novel, which comes out in May.

IT 111
article thumbnail

APAR PM29226 and DB2 for z/OS Native SQL Procedure Source Code Management

Robert's Db2

Sometimes an APAR (in IBM-ese, a description of a software functional enhancement or defect correction effected via application of a fix) is not what it -- at first -- seems. Take DB2 for z/OS APAR PM29226 , for example. The opening sentence of the brief (just one paragraph) APAR text reads as follows: "This APAR provides sample job DSNTEJ67 which initiates the process of converting source for an external SQL procedure into source for a native SQL procedure.

article thumbnail

RockYou Settles FTC Charges Related to Data Breach, COPPA Violations

Hunton Privacy

On March 27, 2012, the Federal Trade Commission announced a proposed settlement order with RockYou, Inc. (“RockYou”), a publisher and developer of applications used on popular social media sites. The FTC alleged that RockYou failed to protect the personal information of 32 million of its users, and violated multiple provisions of the FTC’s Children’s Online Privacy Protection Act (“COPPA”) Rule when it collected information from approximately 179,000 children.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Automation beyond Robots

CGI

Automation beyond Robots. ravi.kumarv@cgi.com. Wed, 03/21/2012 - 08:00. Thinking about automation in business we picture robots in factories, right? But this is only a small part of the story and the opportunities for business to automate a wide range of activities are astonishing. Which makes me wonder why the level of business automation in Europe is still relatively low?

Paper 40
article thumbnail

So you want to implement a digital preservation management system?

Preservica

You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.

article thumbnail

Small, medium or large collaboration headache?

Collaboration 2.0

Who’s going to be the primary technology ‘parents’ and who will be the ‘children’ in order to solve the fragmentation and information filtering issues that are plaguing efficiency in many larger firms? More importantly, who is going to be responsible for this important task?

222
222
article thumbnail

Who Controls Our Data? A Puzzle.

John Battelle's Searchblog

( image ) Facebook claims the data we create inside Facebook is ours – that we own it. In fact, I confirmed this last week in an interview with Facebook VP David Fischer on stage at FM’s Signal P&G conference in Cincinnati. In the conversation, I asked Fischer if we owned our own data. He said yes. Perhaps unfairly (I’m pretty sure Fischer is not in charge of data policy), I followed up my question with another: If we own our own data, can we therefore take it out of Fac

Cloud 109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CRTC Finalizes Anti-Spam Regulations – A Bit More Flexibility for Businesses

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has made and registered its Electronic Commerce Protection Regulations for the Anti-Spam Act (CASL). […].

IT 40
article thumbnail

FTC Privacy Report Emphasizes Privacy by Design, Individual Control and Transparency

Hunton Privacy

On March 26, 2012, the Federal Trade Commission issued a new privacy report entitled “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers.” The report charts a path forward for companies to act in the interest of protecting consumer privacy. In his introductory remarks, FTC Chairman Jon Leibowitz indicated his support for Do Not Track stating, “Simply put, your computer is your property; no one has the right to put anything on it that you d

Privacy 40
article thumbnail

Some random observations on Linux ASLR

Scary Beasts Security

I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.

article thumbnail

The paradox of open source and digital preservation

Preservica

Interesting view from Unesco about the economics of open source for a fully functioning OAIS digital preservation solution. Unesco is a big supporter of open source but it notes that when there is a need for a fully integrated standards based system for storage and management suitable for long term access an open source solution requires significant financial resource.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

It's the people, stupid

Collaboration 2.0

There’s plenty of great online and mobile technology available across a wide range of price points for small & medium businesses right up to global enterprises, but none of them will be of much use without successfully motivating your prospective participants to start interacting through these channels

IT 214
article thumbnail

LinkedIn, The Media Company?

John Battelle's Searchblog

Quick, what’s LinkedIn? If you’re like me, the first thing that comes to mind is “a professional social network.” Perhaps “a place to get a job, or find someone to fill a job.” Or maybe “the place my professional resume lives.” And certainly “a very successful Internet IPO.” But over the two years or so, LinkedIn has quietly built itself into a significant media business.

Marketing 105
article thumbnail

The idea peloton

Collaboration 2.0

Recognizing who has created ideas and concepts, and who has done the relatively unglamorous work of achieving success with detail work is instrumental to the success of enduring confidence in collaborative work

203
203
article thumbnail

Morning on cloud planet

Collaboration 2.0

Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.

Cloud 202
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Yin and Yang of Audience

John Battelle's Searchblog

( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ). The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin

article thumbnail

On the State of Twitter Advertising: Adam Bain

John Battelle's Searchblog

Last week I wrote a post about Neal Mohan , who will be joining us for this month’s Signal conference in San Francisco. Today I’m focusing on Adam Bain and his role as President, Global Revenue at Twitter. I’ve known Adam for some time, since his days at Fox Interactive Media, where he built Fox’s advertising platform (initially as a product out of MySpace).

article thumbnail

China To Bloggers: Stop Talking Now. K Thanks Bye.

John Battelle's Searchblog

( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).

article thumbnail

The Yin and Yang of Audience

John Battelle's Searchblog

( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ) The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin&

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CM Summit White Paper from 2007

John Battelle's Searchblog

I am in the midst of writing a post on the history of FM, and I thought it’d be fun to post the PDF linked to below. It’s a summary of musings from Searchblog circa 2006-7 on the topic of conversational media, which is much in the news again, thanks to Facebook. We created the document as an addendum to our first ever CM Summit conference, as a way of describing why we were launching the conference.

Paper 67
article thumbnail

China To Bloggers: Stop Talking Now. K Thanks Bye.

John Battelle's Searchblog

( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).

article thumbnail

Massachusetts Attorney General Announces $15,000 Settlement with Property Management Firm

Hunton Privacy

On March 21, 2012, Massachusetts Attorney General Martha Coakley announced that Maloney Properties Inc. (“MPI”), a property management firm, executed an Assurance of Discontinuance and agreed to pay $15,000 in civil penalties following an October 2011 theft of an unencrypted company-issued laptop. The laptop contained personal information of more than 600 Massachusetts residents and was left in an employee’s car overnight.