March, 2012

article thumbnail

Why Hath Google Forsaken Us? A Meditation.

John Battelle's Searchblog

( image ) Here’s a short overview of Google’s past few months: It’s angered policymakers and pundits with a sweeping change to its privacy settings. It’s taken a beating for favoring its own properties in its core search results. It’s been caught with its hands in Apple’s cookie jar , and despite the fact Facebook and others previously condoned the practice , it was savaged for doing so.

Privacy 111
article thumbnail

Sharepoint, Salesforce and the enterprise platform battle

Collaboration 2.0

The largest software company in the world and the ‘no software’ cloud world are colliding, and in the perceptions battle Sharepoint are shining a lot brighter

Cloud 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Trading Memory for MIPS (Part 1)

Robert's Db2

If you are a DB2 for z/OS DBA or systems programmer, chances are that a good bit of what you do is focused on improving the CPU efficiency of your organization's DB2-accessing application workload. There are various ways in which people go about reducing DB2-related CPU consumption, including SQL statement tuning, physical database design changes (e.g., adding or modifying indexes), shifting work to zIIP engines (for example, by going with native SQL procedures versus external stored procedures

Access 48
article thumbnail

Article 29 Working Party Opines on Proposed EU Data Protection Law Reform Package

Hunton Privacy

On March 23, 2012, the Article 29 Working Party (the “Working Party”) adopted an Opinion on the European Commission’s data protection law reform proposals , including the draft Regulation that is of particular importance for businesses. The Working Party’s Opinion serves as the national data protection authorities’ contribution to the legislative process before the European Parliament and the European Council.

Privacy 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

BBC One's Bang goes the Theory

Preservica

Good to see the BBC getting digital preservation on the cloud - see [link] at 15.07 onwards (UK only).

More Trending

article thumbnail

Rob Reid + Copyright Math = Hilarious

John Battelle's Searchblog

A highlight of TED this year was watching my pal Rob Reid do a short talk on the math of those who claim piracy is killing the content business. It’s short, it’s really funny, and it’s a prequel of sorts for Rob’s wonderful new comic novel, which comes out in May.

IT 111
article thumbnail

It ain't what you do.

Collaboration 2.0

Achieving great collective performance has the same basic principles for musicians, sports teams and other groups of individuals.

IT 95
article thumbnail

APAR PM29226 and DB2 for z/OS Native SQL Procedure Source Code Management

Robert's Db2

Sometimes an APAR (in IBM-ese, a description of a software functional enhancement or defect correction effected via application of a fix) is not what it -- at first -- seems. Take DB2 for z/OS APAR PM29226 , for example. The opening sentence of the brief (just one paragraph) APAR text reads as follows: "This APAR provides sample job DSNTEJ67 which initiates the process of converting source for an external SQL procedure into source for a native SQL procedure.

article thumbnail

RockYou Settles FTC Charges Related to Data Breach, COPPA Violations

Hunton Privacy

On March 27, 2012, the Federal Trade Commission announced a proposed settlement order with RockYou, Inc. (“RockYou”), a publisher and developer of applications used on popular social media sites. The FTC alleged that RockYou failed to protect the personal information of 32 million of its users, and violated multiple provisions of the FTC’s Children’s Online Privacy Protection Act (“COPPA”) Rule when it collected information from approximately 179,000 children.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

So you want to implement a digital preservation management system?

Preservica

You have finally got the sign off for a digital preservation management system. Now comes the hard part. How do you translate your requirements to suppliers? What is the best way to do this? Listen to Tessella’s Mark Evans presentation at PASIG on “Understanding Requirements and Implementation from a Vendor Perspective” to find out the answers. Follow Mark’s good requirement characteristics 7 point checklist and 8 step requirements capture process.

article thumbnail

Some random observations on Linux ASLR

Scary Beasts Security

I've had cause to be staring at memory maps recently across a variety of systems. No surprise then that some suboptimal or at least interesting ASLR quirks have come to light. 1) Partial failure of ASLR on 32-bit Fedora My Fedora is a couple of releases behind, so no idea if it's been fixed. It seems that the desire to pack all the shared libraries into virtual address 0x00nnnnnn has a catastrophic failure mode when there are too many libraries: something always ends up at 0x00110000.

article thumbnail

Who Controls Our Data? A Puzzle.

John Battelle's Searchblog

( image ) Facebook claims the data we create inside Facebook is ours – that we own it. In fact, I confirmed this last week in an interview with Facebook VP David Fischer on stage at FM’s Signal P&G conference in Cincinnati. In the conversation, I asked Fischer if we owned our own data. He said yes. Perhaps unfairly (I’m pretty sure Fischer is not in charge of data policy), I followed up my question with another: If we own our own data, can we therefore take it out of Fac

Cloud 109
article thumbnail

Small, medium or large collaboration headache?

Collaboration 2.0

Who’s going to be the primary technology ‘parents’ and who will be the ‘children’ in order to solve the fragmentation and information filtering issues that are plaguing efficiency in many larger firms? More importantly, who is going to be responsible for this important task?

89
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CRTC Finalizes Anti-Spam Regulations – A Bit More Flexibility for Businesses

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has made and registered its Electronic Commerce Protection Regulations for the Anti-Spam Act (CASL). […].

IT 40
article thumbnail

FTC Privacy Report Emphasizes Privacy by Design, Individual Control and Transparency

Hunton Privacy

On March 26, 2012, the Federal Trade Commission issued a new privacy report entitled “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers.” The report charts a path forward for companies to act in the interest of protecting consumer privacy. In his introductory remarks, FTC Chairman Jon Leibowitz indicated his support for Do Not Track stating, “Simply put, your computer is your property; no one has the right to put anything on it that you d

Privacy 40
article thumbnail

The paradox of open source and digital preservation

Preservica

Interesting view from Unesco about the economics of open source for a fully functioning OAIS digital preservation solution. Unesco is a big supporter of open source but it notes that when there is a need for a fully integrated standards based system for storage and management suitable for long term access an open source solution requires significant financial resource.

article thumbnail

vsftpd-3.0.0-pre1 and seccomp filter

Scary Beasts Security

For the brave, there now exists a pre-release version of vsftpd-3.0.0: [link] [link] The most significant change is an initial implementation of a secondary sandbox based on seccomp filter , as recently merged to Ubuntu 12.04. This secondary sandbox is pretty powerful, but I'll go into more details in a subsequent post. For now, suffice to say I'm interested in testing of this new build, e.g.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

LinkedIn, The Media Company?

John Battelle's Searchblog

Quick, what’s LinkedIn? If you’re like me, the first thing that comes to mind is “a professional social network.” Perhaps “a place to get a job, or find someone to fill a job.” Or maybe “the place my professional resume lives.” And certainly “a very successful Internet IPO.” But over the two years or so, LinkedIn has quietly built itself into a significant media business.

Marketing 105
article thumbnail

It's the people, stupid

Collaboration 2.0

There’s plenty of great online and mobile technology available across a wide range of price points for small & medium businesses right up to global enterprises, but none of them will be of much use without successfully motivating your prospective participants to start interacting through these channels

IT 85
article thumbnail

Anti-Spam Law: See updated CASL v. CAN-SPAM summary

Privacy and Cybersecurity Law

Are you one of those who have been monitoring the progress of Canada’s Anti-Spam Law (CASL)? If so, you may also […].

article thumbnail

Massachusetts Attorney General Announces $15,000 Settlement with Property Management Firm

Hunton Privacy

On March 21, 2012, Massachusetts Attorney General Martha Coakley announced that Maloney Properties Inc. (“MPI”), a property management firm, executed an Assurance of Discontinuance and agreed to pay $15,000 in civil penalties following an October 2011 theft of an unencrypted company-issued laptop. The laptop contained personal information of more than 600 Massachusetts residents and was left in an employee’s car overnight.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Whole life information management: enterprise digital preservation and enterprise content management

Preservica

Download available on Enterprise Digital Preservation and Enterprise Content Management. Content Management and Archiving.

article thumbnail

On the failings of Pwn2Own 2012

Scary Beasts Security

This year's Pwn2Own and Pwnium contests were interesting for many reasons. If you look at the results closely, there are many interesting observations and conclusions to be made. $60k is more than enough to encourage disclosure of full exploits As evidenced by the Pwnium results , $60k is certainly enough to motivate researchers into disclosing full exploits, including sandbox escapes or bypasses.

article thumbnail

The Yin and Yang of Audience

John Battelle's Searchblog

( image ) The Signal San Francisco conference is less than a week away, so I thought I’d take the time to explain my reasoning for the theme, and offer a curtain raiser of sorts on the day-long program. ( PS, I have ten, and only ten, half price tickets available. Hit this link , and use the code “luckyday.” ). The theme, a portion of which is the title of this post, is “The Yin and Yang of Audience, Platforms and the Independent Web.” I do get a few eyes a-rollin

article thumbnail

The idea peloton

Collaboration 2.0

Recognizing who has created ideas and concepts, and who has done the relatively unglamorous work of achieving success with detail work is instrumental to the success of enduring confidence in collaborative work

81
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Morning on cloud planet

Collaboration 2.0

Cloud thinking is everywhere this spring with diminishing fear factor and business advantages being seriously considered.

Cloud 81
article thumbnail

On the State of Twitter Advertising: Adam Bain

John Battelle's Searchblog

Last week I wrote a post about Neal Mohan , who will be joining us for this month’s Signal conference in San Francisco. Today I’m focusing on Adam Bain and his role as President, Global Revenue at Twitter. I’ve known Adam for some time, since his days at Fox Interactive Media, where he built Fox’s advertising platform (initially as a product out of MySpace).

article thumbnail

China To Bloggers: Stop Talking Now. K Thanks Bye.

John Battelle's Searchblog

( image ) Yesterday I finished reading Larry Lessig’s updated 1999 classic, Code v2. I’m five years late to the game, as the book was updated in 2006 by Lessig and a group of fans and readers (I tried to read the original in 1999, but I found myself unable to finish it. Something to do with my hair being on fire for four years running …).