The end of an era?
Collaboration 2.0
NOVEMBER 18, 2013
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
Collaboration 2.0
NOVEMBER 18, 2013
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
John Battelle's Searchblog
NOVEMBER 17, 2013
'The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero. Back when I wrote The Search , that hero was Google – the book wasn’t about Google alone, but Google’s narrative worked to drive the entire story. As Sara and I work on If/Then , we’ve discovered one unlikely hero for ours: The lowly banner ad.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Robert's Db2
NOVEMBER 26, 2013
To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.
Hunton Privacy
NOVEMBER 19, 2013
On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The following features of the law are of particular significance: The law applies only to the processing of personal data in commercial transactions (in effect, private sector transactions, though not including credit reporting a
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Privacy and Cybersecurity Law
NOVEMBER 29, 2013
Apple Defeats Class-Based Privacy Claims on Standing Arguments Apple successfully defeated claims asserting it had violated its privacy policies in […].
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
NOVEMBER 18, 2013
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
John Battelle's Searchblog
NOVEMBER 13, 2013
'The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. Last night I had an interesting conversation at a small industry dinner. Talk turned to Google Glass, in the context of Snapchat and other social photo sharing apps. Everyone at the table agreed: it was inevitable – whether it be Glass, GoPro, a button in your clothing or some other form factor – personalized, “always on” streaming of images will be ubiquitous.
Robert's Db2
NOVEMBER 29, 2013
A few months ago, I posted an entry to this blog on the subject of "moving queries to data," the idea being that when data to be analyzed for decision support purposes originates in a DB2 for z/OS database (as a great deal of the world's corporate and governmental data does), a very good case can be made for analyzing that data on its platform of origin -- System z -- as opposed to copying and moving the data to a different platform for querying and reporting.
Hunton Privacy
NOVEMBER 27, 2013
On November 15, 2013, the U.S. Government Accountability Office (“GAO”) released a report (the “Report”) finding that the current federal statutory privacy scheme contains “gaps” and “does not fully reflect” the Fair Information Practice Principles (“FIPPs”). The Report focused primarily on companies that gather and resell consumer personal information, and on the use of consumer personal information for marketing purposes.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Privacy and Cybersecurity Law
NOVEMBER 28, 2013
The hotly anticipated Malaysian Personal Data Protection Act (PDPA) was finally enforced on 15 November 2013. Along with other related […].
CGI
NOVEMBER 12, 2013
Where to start with Business Benefits Realisation Management. ravi.kumarv@cgi.com. Tue, 11/12/2013 - 23:10. Try searching the Internet for information on business benefits management and there’s no end to what useful information you can find. Yet, with so much information freely available and with management frameworks requiring it as best practice, why then do businesses still fail to adopt it?
Collaboration 2.0
NOVEMBER 17, 2013
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
John Battelle's Searchblog
NOVEMBER 15, 2013
'The post Nearly 30 Years In Less Than an Hour appeared first on John Battelle's Search Blog. Pinch me: Last week I gave a “distinguished” lecture in Engineering at Berkeley. It was an honor to do so – I don’t really see myself as distinguished in any academic sense – and certainly not when it comes to engineering.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Collaboration 2.0
NOVEMBER 17, 2013
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
John Battelle's Searchblog
NOVEMBER 13, 2013
'The post Twitter Ads Are Getting, Um, More Noticeable appeared first on John Battelle's Search Blog. Two of my favorite companies in the world are Twitter and American Express. I have literally dozens of good pals at both. So this is said with love (and a bit more pointedly at Twitter than Amex, which is just one of many advertisers I’ve encountered in the situation described below.
John Battelle's Searchblog
NOVEMBER 25, 2013
'The post else 11/25: The Collective Hallucination of Currency appeared first on John Battelle's Search Blog. This week, bitcoin seems to have gotten the thumbs up for innovation despite some shady origins, lots of background details came out about the circumstances that approved NSA dragnet, and privacy is declared an anomaly. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email news
John Battelle's Searchblog
NOVEMBER 1, 2013
'The post It’s…A Marketing Barge?! appeared first on John Battelle's Search Blog. ( image CBS KPIX ) The #googlebarge meme has taken a very strange turn. A rather welcome diversion from our industry’s endless NSA revelations, the enigmatic barge floating off Treasure Island had been widely assumed to be a floating data center of some kind.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
John Battelle's Searchblog
NOVEMBER 8, 2013
'The post A Metal Gun, Made from Digital Bits appeared first on John Battelle's Search Blog. One of the artifacts we’re considering for our book is the 3D printer – not only the MakerBot version, but all types of “bits to atoms” kinds of conversions. The advances in the field are staggering – it is now possible to print human tissue , for example.
John Battelle's Searchblog
NOVEMBER 8, 2013
'The post More than 200,000 Minutes of Engagement, and Counting appeared first on John Battelle's Search Blog. Some of you may recall “ Behind the Banner ,” a visualization of the programmatic adtech ecosystem that I created with The Office for Creative Research and Adobe back in May. It was my attempt at explaining the complexities of a world I’ve spent several years engaged in, but often find confounding.
John Battelle's Searchblog
NOVEMBER 11, 2013
'The post else 11.11: “You can’t let the algorithms take over” appeared first on John Battelle's Search Blog. Last week there was a lot to say about Twitter and bitcoin, and the Guardian offered some reflections on what the NSA revelations mean to the average Joe. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
John Battelle's Searchblog
NOVEMBER 18, 2013
'The post else 11.18: “We can see it, we can feel it, because we’re already almost there.” appeared first on John Battelle's Search Blog. This week, we talk about rights to data, nuance in the tech debate, and some interesting developments in the wearable sensor world. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Privacy and Cybersecurity Law
NOVEMBER 27, 2013
In the wake of the negative publicity that Nordstrom received from its use of mobile location analytics (MLA) in a […].
Privacy and Cybersecurity Law
NOVEMBER 27, 2013
A few days ago, the UK data protection watchdog (ICO) released a warning to organisations that employ temporary or agency […].
Hunton Privacy
NOVEMBER 27, 2013
On November 27, 2013, the European Commission published an analysis of the EU-U.S. Safe Harbor Framework, as well as other EU-U.S. data transfer agreements. The analysis includes the following documents: A communication on rebuilding trust in EU-U.S. data flows ; An analysis of the functioning of Safe Harbor , including FAQs ; A mid-term report on the Terrorist Finance Tracking Program (“TFTP”) prepared jointly with the U.S.
Privacy and Cybersecurity Law
NOVEMBER 22, 2013
It was recently reported that supermarket giant, Tesco, is launching face scanning technology at petrol stations in order to show […].
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Hunton Privacy
NOVEMBER 21, 2013
On November 15, 2013, the Supreme Court of Canada declared the Alberta Personal Information Protection Act (“PIPA”) invalid because the legislation interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms (the “Canadian Charter”). The case arose in the context of a labor union representing employees of a casino in Alberta.
Hunton Privacy
NOVEMBER 21, 2013
As reported by Bloomberg BNA , Mexico’s Federal Institute for Access to Information and Data Protection (“IFAI”) recently issued data security guidelines that implement the security provisions of the Federal Law for the Protection of Personal Data Held by Private Parties ( Reglamento de la Ley Federal de Protección de Datos Personales en Posesión de los Particulares ).
Hunton Privacy
NOVEMBER 21, 2013
Brazilian lawmakers, including José Eduardo Cardozo, the Minister of Justice of Brazil, and Ideli Salvatti, the Secretariat of Institutional Relations, held several consensus-building meetings with party leaders over the past two weeks to reach a voting agreement on the Marco Civil da Internet (“Marco Civil”), a draft bill introduced in the Brazilian Congress in 2011.
Let's personalize your content