April, 2012

article thumbnail

The Intention Economy

Collaboration 2.0

Finally a thoughtful, hype free book worth reading about digital marketing, the relationships we have with vendors and a vision for a better future where we have greater control of our personal data

article thumbnail

Facebook Buys Instagram, Checks Off A Swath of 2012 Predictions In One Move

John Battelle's Searchblog

Waaaay back in January, I rolled out my annual predictions. Thanks to our pals at Facebook, a few of them are now pretty much in the bag. I may have to start doing these things monthly, given the pace of our industry. Prediction #5 was that it’d be a big year for Internet M&A. I further singled out Instagram as a company that would likely be bought, and figured there’d be a battle between Twitter, Apple, Facebook, and Google for the prize.

IT 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Trading Memory for MIPS (Part 3)

Robert's Db2

In part 1 of this three-part series on leveraging Big Memory (i.e., a large z/OS LPAR real storage resource) to enhance DB2 workload CPU efficiency, I focused on getting the most out of a DB2 buffer pool configuration without increasing its size (this by adjusting certain threshold settings and redistributing buffers between low-I/O and high-I/O pools).

Access 48
article thumbnail

RN Future Tense: The Changing Nature of Work

ChiefTech

What impact are new design practices and changing technology having on not just the physical office but also on the way we think about work itself? Is the idea of the individual office a thing of the past? In this program we explore the physical, social and cultural trends affecting the changing nature of the office and the way we work in the 21st century. via abc.net.au.

43
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Lowering barriers to entry for digital preservation – a Q&A from the cloud

Preservica

The cloud has driven down the cost of ownership of IT systems enabling smaller organisations the ability to access services that were previously only available to the global 1000. Can the cloud do the same for digital preservation? Tessella’s head of digital archiving Mark Evans explored these issues at PASIG 2012 which took place in January in Austin TX.

More Trending

article thumbnail

Wisdom of the loud

Collaboration 2.0

Knowledge speaks, but wisdom listens: the trend of the loudest voices parading knowledge online and dominating conversations is slowly maturing as people realize that too much online publishing means those voices aren’t doing much else…

101
101
article thumbnail

On The Future of The Web 2 Summit

John Battelle's Searchblog

By around this time of year, most of you are used to hearing about this year’s Web 2 Summit theme, its initial lineup of speakers, and any other related goings on, like our annual VIP dinners or perhaps some crazy map I’ve dreamt up. It’s become a familiar ritual in early spring, and many of you have been asking what’s up with this year’s event, in particular given the success of both last year’s theme (The Data Frame) and its amazing lineup of speakers and at

IT 104
article thumbnail

DB2 for z/OS: Trading Memory for MIPS (Part 2)

Robert's Db2

In part one of this three-part entry on leveraging System z memory to reduce CPU consumption for a DB2-accessing application workload, I wrote about getting your DB2 buffer pool configuration house in order by doing things to improve CPU efficiency without increasing the total amount of virtual storage allocated for page caching (e.g., adjusting certain thresholds for work file-dedicated pools, making appropriate use of buffer page-fixing, choosing the right buffer-steal algorithm for a pool, an

IT 48
article thumbnail

Countdown to Cookies: Where are we?

Privacy and Cybersecurity Law

With a little over a month until the ICO’s self-imposed 12 month moratorium on enforcement of the new cookies rule […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Incorporating emulation into a business-as-usual digital preservation workflow.

Preservica

Great piece by Euan Cochrane on his blog ( [link] ). We have just finished working on the KEEP (Keeping Emulation Environments Portable) project. However, you are correct to say that most efforts have been focussed on migration: and we have a number of migration (and characterisation) tools supported in our Safety Deposit Box (SDB) solution. However, as part of KEEP we did add in an end-to-end emulation workflow to SDB as well.

article thumbnail

French Data Protection Authority Unveils Its Agenda for 2012

Hunton Privacy

On April 19, 2012, the French Data Protection Authority (the “CNIL”) issued a press release detailing its enforcement agenda for 2012. In a report adopted March 29, 2012, the CNIL announced that it will conduct 450 on-site inspections this year, with particular focus on the specific themes described below. The CNIL also indicated that it will continue the work started in 2011 with at least 150 additional inspections related to video surveillance, especially with respect to surveillance in locati

article thumbnail

Oracle's cloud launch: solid takeoff

Collaboration 2.0

Oracle appear to be executing very efficiently to serve the cloud era and are accelerating hard, while some of their competitors continue to discuss disjointed constructs, ideas and future plans

Cloud 94
article thumbnail

On The Future of The Web 2 Summit

John Battelle's Searchblog

By around this time of year, most of you are used to hearing about this year’s Web 2 Summit theme, its initial lineup of speakers, and any other related goings on, like our annual VIP dinners or perhaps some crazy map I’ve dreamt up. It’s become a familiar ritual in early spring, and many of you have been asking what’s up with this year’s event, in particular given the success of both last year’s theme (The Data Frame) and its amazing lineup of speakers and at

IT 104
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

vsftpd-3.0.0 and seccomp filter sandboxing is here!

Scary Beasts Security

vsftpd-3.0.0 is released. Aside from the usual few fixes, I'm excited about built-in support for Will Drewry's seccomp filter, which landed in Ubuntu. To give it a whirl, you'll need a 64-bit Ubuntu 12.04 (beta at time of writing), and a 64-bit build of vsftpd. Why all the excitement? vsftpd has always piled on all of the Linux sandboxing / privilege facilities available, including chroot, capabilities, file descriptor passing, pid / network / etc. namespaces, rlimits, and even a ptrace-based de

Access 20
article thumbnail

24 hour Data Breach Notification: More Harm Than Help?

Privacy and Cybersecurity Law

There are certainly many headline-grabbing elements in the European Commission’s proposed Data Protection Regulation – a directly applicable regulation replacing […].

article thumbnail

Lessons from a real large scale digital preservation system

Preservica

While much is written about digital preservation, anyone looking to deliver a real system for large scale digital preservation will find little information about the realities of successfully delivering such a system. In his talk at PASIG 2012, Jason Pierson does just this. He describes FamilySearch’s ambitious project to digitise and preserve their vast collection of genealogical information.

article thumbnail

Hunton & Williams Privacy Professionals to Speak at the 2012 IAPP Europe Data Protection Intensive

Hunton Privacy

Join Hunton & Williams at the 2012 Europe Data Protection Intensive , now hosted by the International Association of Privacy Professionals (“IAPP”) in London, April 25-26, 2012. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Changing Legal Landscape: How DPOs Are Preparing for New EU Regulations.

Privacy 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Job hunting in the socially networked era

Collaboration 2.0

Being active on social networks and demonstrating your subject matter expertise will help make you visible in modern recruiting apps like Jobvite, which are rapidly gaining traction in forward thinking companies

94
article thumbnail

Architectures of Control: Harvard, Facebook, and the Chicago School

John Battelle's Searchblog

Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. Lessig knew them well – in the mid 1990s, he taught at both Harvard and the University of Chicago. Like most universities, Harvard and Chicago provided Internet access to their students.

Education 103
article thumbnail

vsftpd-3.0.0-pre2

Scary Beasts Security

Just a quick note that vsftpd-3.0.0 is imminent. The big-ticket item is the new seccomp filter sandboxing support. Please test this, particularly on 64-bit Ubuntu Precise Beta 2 (or newer) or if you use SSL support. I would love to get a quick note (e-mail or comment here) even if just to say it seems to work in your configuration.

IT 20
article thumbnail

Does the Pebble Cause a Ripple In Apple’s Waters?

John Battelle's Searchblog

Ever since the Pebble watch became an cause célèbre in tech circles for its kickass Kickstarter moves (it’s raised almost $7mm dollars and counting), something’s been nagging me about the company and its product. It’s now Valley legend that the company had to turn to Kickstarter to get its working capital – more than 46,000 folks have backed Pebble, and will soon be proudly sporting their spiffy new iPhone-powered watches as a result.

Retail 103
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

What Doesn’t the Valley Understand About Washington?

John Battelle's Searchblog

A few weeks ago I ventured to our nation’s capital to steep in its culture a bit, and get some first hand reporting done for the book. I met with about a dozen or so folks, including several scholars, the heads of the FCC and FTC, and senior folks in the Departments of Commerce and State. I also spoke to a lobbyist from the Internet industry, as well as people from various “think tanks” that populate the city.

article thumbnail

Facebook Buys Instagram, Checks Off A Swath of 2012 Predictions In One Move

John Battelle's Searchblog

Waaaay back in January, I rolled out my annual predictions. Thanks to our pals at Facebook, a few of them are now pretty much in the bag. I may have to start doing these things monthly, given the pace of our industry. Prediction #5 was that it’d be a big year for Internet M&A. I further singled out Instagram as a company that would likely be bought, and figured there’d be a battle between Twitter, Apple, Facebook, and Google for the prize.

IT 93
article thumbnail

Direct Mail Ain’t Dead, Says Facebook

John Battelle's Searchblog

I’m a bit behind on my snail mail, so to procrastinate from writing anything useful on the book, I went through a pile that’s accumulated over the past week. Perhaps the most interesting piece of mail came from a very familiar brand: Facebook. The letter had all the trappings of direct mail – a presorted postage mark, impersonal address label, etc.

article thumbnail

Architectures of Control: Harvard, Facebook, and the Chicago School

John Battelle's Searchblog

Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. Lessig knew them well – in the mid 1990s, he taught at both Harvard and the University of Chicago. Like most universities, Harvard and Chicago provided Internet access to their students.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Won't get fooled again?

Collaboration 2.0

Is Wall Street’s current enthusiasm for profit from enterprise social technologies good for the end user, and will the old guard vendors outflank the challengers with feature offerings?

86
article thumbnail

Larry Page Makes His Case

John Battelle's Searchblog

Given the headlines, questions, and legal actions Google has faced recently, many folks, including myself, have been wondering when Google’s CEO Larry Page would take a more public stance in outlining his vision for the company. Well, today marks a shift of sorts, with the publication of a lenthy blog post from Larry titled, quite uninterestingly, 2012 Update from the CEO.

Privacy 81
article thumbnail

Larry Page Makes His Case

John Battelle's Searchblog

Given the headlines, questions, and legal actions Google has faced recently, many folks, including myself, have been wondering when Google’s CEO Larry Page would take a more public stance in outlining his vision for the company. Well, today marks a shift of sorts, with the publication of a lenthy blog post from Larry titled, quite uninterestingly, 2012 Update from the CEO.

Privacy 81