This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Finally a thoughtful, hype free book worth reading about digital marketing, the relationships we have with vendors and a vision for a better future where we have greater control of our personal data
Waaaay back in January, I rolled out my annual predictions. Thanks to our pals at Facebook, a few of them are now pretty much in the bag. I may have to start doing these things monthly, given the pace of our industry. Prediction #5 was that it’d be a big year for Internet M&A. I further singled out Instagram as a company that would likely be bought, and figured there’d be a battle between Twitter, Apple, Facebook, and Google for the prize.
In part 1 of this three-part series on leveraging Big Memory (i.e., a large z/OS LPAR real storage resource) to enhance DB2 workload CPU efficiency, I focused on getting the most out of a DB2 buffer pool configuration without increasing its size (this by adjusting certain threshold settings and redistributing buffers between low-I/O and high-I/O pools).
What impact are new design practices and changing technology having on not just the physical office but also on the way we think about work itself? Is the idea of the individual office a thing of the past? In this program we explore the physical, social and cultural trends affecting the changing nature of the office and the way we work in the 21st century. via abc.net.au.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
The cloud has driven down the cost of ownership of IT systems enabling smaller organisations the ability to access services that were previously only available to the global 1000. Can the cloud do the same for digital preservation? Tessella’s head of digital archiving Mark Evans explored these issues at PASIG 2012 which took place in January in Austin TX.
The UK Information Commissioner’s Office’s (“ICO”) has revised its statutory Code of Practice on assessment notices (the “Code”). The ICO first issued the Code in 2010, when its audit powers came into force. The Code has now been updated to reflect changes in auditing standards and practices. Background. Since 2010, the ICO has been empowered under the Data Protection Act 1998 (“DPA”) to undertake compulsory audits of central governments and other designated bodies, by serving a Section 41A asse
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
The UK Information Commissioner’s Office’s (“ICO”) has revised its statutory Code of Practice on assessment notices (the “Code”). The ICO first issued the Code in 2010, when its audit powers came into force. The Code has now been updated to reflect changes in auditing standards and practices. Background. Since 2010, the ICO has been empowered under the Data Protection Act 1998 (“DPA”) to undertake compulsory audits of central governments and other designated bodies, by serving a Section 41A asse
Knowledge speaks, but wisdom listens: the trend of the loudest voices parading knowledge online and dominating conversations is slowly maturing as people realize that too much online publishing means those voices aren’t doing much else…
By around this time of year, most of you are used to hearing about this year’s Web 2 Summit theme, its initial lineup of speakers, and any other related goings on, like our annual VIP dinners or perhaps some crazy map I’ve dreamt up. It’s become a familiar ritual in early spring, and many of you have been asking what’s up with this year’s event, in particular given the success of both last year’s theme (The Data Frame) and its amazing lineup of speakers and at
In part one of this three-part entry on leveraging System z memory to reduce CPU consumption for a DB2-accessing application workload, I wrote about getting your DB2 buffer pool configuration house in order by doing things to improve CPU efficiency without increasing the total amount of virtual storage allocated for page caching (e.g., adjusting certain thresholds for work file-dedicated pools, making appropriate use of buffer page-fixing, choosing the right buffer-steal algorithm for a pool, an
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Great piece by Euan Cochrane on his blog ( [link] ). We have just finished working on the KEEP (Keeping Emulation Environments Portable) project. However, you are correct to say that most efforts have been focussed on migration: and we have a number of migration (and characterisation) tools supported in our Safety Deposit Box (SDB) solution. However, as part of KEEP we did add in an end-to-end emulation workflow to SDB as well.
On April 19, 2012, the French Data Protection Authority (the “CNIL”) issued a press release detailing its enforcement agenda for 2012. In a report adopted March 29, 2012, the CNIL announced that it will conduct 450 on-site inspections this year, with particular focus on the specific themes described below. The CNIL also indicated that it will continue the work started in 2011 with at least 150 additional inspections related to video surveillance, especially with respect to surveillance in locati
Oracle appear to be executing very efficiently to serve the cloud era and are accelerating hard, while some of their competitors continue to discuss disjointed constructs, ideas and future plans
By around this time of year, most of you are used to hearing about this year’s Web 2 Summit theme, its initial lineup of speakers, and any other related goings on, like our annual VIP dinners or perhaps some crazy map I’ve dreamt up. It’s become a familiar ritual in early spring, and many of you have been asking what’s up with this year’s event, in particular given the success of both last year’s theme (The Data Frame) and its amazing lineup of speakers and at
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
vsftpd-3.0.0 is released. Aside from the usual few fixes, I'm excited about built-in support for Will Drewry's seccomp filter, which landed in Ubuntu. To give it a whirl, you'll need a 64-bit Ubuntu 12.04 (beta at time of writing), and a 64-bit build of vsftpd. Why all the excitement? vsftpd has always piled on all of the Linux sandboxing / privilege facilities available, including chroot, capabilities, file descriptor passing, pid / network / etc. namespaces, rlimits, and even a ptrace-based de
There are certainly many headline-grabbing elements in the European Commission’s proposed Data Protection Regulation – a directly applicable regulation replacing […].
While much is written about digital preservation, anyone looking to deliver a real system for large scale digital preservation will find little information about the realities of successfully delivering such a system. In his talk at PASIG 2012, Jason Pierson does just this. He describes FamilySearch’s ambitious project to digitise and preserve their vast collection of genealogical information.
Join Hunton & Williams at the 2012 Europe Data Protection Intensive , now hosted by the International Association of Privacy Professionals (“IAPP”) in London, April 25-26, 2012. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Changing Legal Landscape: How DPOs Are Preparing for New EU Regulations.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Being active on social networks and demonstrating your subject matter expertise will help make you visible in modern recruiting apps like Jobvite, which are rapidly gaining traction in forward thinking companies
Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. Lessig knew them well – in the mid 1990s, he taught at both Harvard and the University of Chicago. Like most universities, Harvard and Chicago provided Internet access to their students.
Just a quick note that vsftpd-3.0.0 is imminent. The big-ticket item is the new seccomp filter sandboxing support. Please test this, particularly on 64-bit Ubuntu Precise Beta 2 (or newer) or if you use SSL support. I would love to get a quick note (e-mail or comment here) even if just to say it seems to work in your configuration.
Is Wall Street’s current enthusiasm for profit from enterprise social technologies good for the end user, and will the old guard vendors outflank the challengers with feature offerings?
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Ever since the Pebble watch became an cause célèbre in tech circles for its kickass Kickstarter moves (it’s raised almost $7mm dollars and counting), something’s been nagging me about the company and its product. It’s now Valley legend that the company had to turn to Kickstarter to get its working capital – more than 46,000 folks have backed Pebble, and will soon be proudly sporting their spiffy new iPhone-powered watches as a result.
A few weeks ago I ventured to our nation’s capital to steep in its culture a bit, and get some first hand reporting done for the book. I met with about a dozen or so folks, including several scholars, the heads of the FCC and FTC, and senior folks in the Departments of Commerce and State. I also spoke to a lobbyist from the Internet industry, as well as people from various “think tanks” that populate the city.
Waaaay back in January, I rolled out my annual predictions. Thanks to our pals at Facebook, a few of them are now pretty much in the bag. I may have to start doing these things monthly, given the pace of our industry. Prediction #5 was that it’d be a big year for Internet M&A. I further singled out Instagram as a company that would likely be bought, and figured there’d be a battle between Twitter, Apple, Facebook, and Google for the prize.
I’m a bit behind on my snail mail, so to procrastinate from writing anything useful on the book, I went through a pile that’s accumulated over the past week. Perhaps the most interesting piece of mail came from a very familiar brand: Facebook. The letter had all the trappings of direct mail – a presorted postage mark, impersonal address label, etc.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. Lessig knew them well – in the mid 1990s, he taught at both Harvard and the University of Chicago. Like most universities, Harvard and Chicago provided Internet access to their students.
Given the headlines, questions, and legal actions Google has faced recently, many folks, including myself, have been wondering when Google’s CEO Larry Page would take a more public stance in outlining his vision for the company. Well, today marks a shift of sorts, with the publication of a lenthy blog post from Larry titled, quite uninterestingly, 2012 Update from the CEO.
Given the headlines, questions, and legal actions Google has faced recently, many folks, including myself, have been wondering when Google’s CEO Larry Page would take a more public stance in outlining his vision for the company. Well, today marks a shift of sorts, with the publication of a lenthy blog post from Larry titled, quite uninterestingly, 2012 Update from the CEO.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content