November, 2013

article thumbnail

The end of an era?

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

247
247
article thumbnail

Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact

John Battelle's Searchblog

'The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero. Back when I wrote The Search , that hero was Google – the book wasn’t about Google alone, but Google’s narrative worked to drive the entire story. As Sara and I work on If/Then , we’ve discovered one unlikely hero for ours: The lowly banner ad.

Retail 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS Work: the Task's the Thing

Robert's Db2

To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.

Access 67
article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The following features of the law are of particular significance: The law applies only to the processing of personal data in commercial transactions (in effect, private sector transactions, though not including credit reporting a

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Privacy Class Action Watch • The Latest Waves

Privacy and Cybersecurity Law

Apple Defeats Class-Based Privacy Claims on Standing Arguments Apple successfully defeated claims asserting it had violated its privacy policies in […].

Privacy 40

More Trending

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

189
189
article thumbnail

Ubiquitous Video: Why We Need a Robots.txt For the Real World

John Battelle's Searchblog

'The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. Last night I had an interesting conversation at a small industry dinner. Talk turned to Google Glass, in the context of Snapchat and other social photo sharing apps. Everyone at the table agreed: it was inevitable – whether it be Glass, GoPro, a button in your clothing or some other form factor – personalized, “always on” streaming of images will be ubiquitous.

article thumbnail

A Great Analytics on System z Use Case: The Operational Data Store

Robert's Db2

A few months ago, I posted an entry to this blog on the subject of "moving queries to data," the idea being that when data to be analyzed for decision support purposes originates in a DB2 for z/OS database (as a great deal of the world's corporate and governmental data does), a very good case can be made for analyzing that data on its platform of origin -- System z -- as opposed to copying and moving the data to a different platform for querying and reporting.

article thumbnail

GAO Report Highlights Gaps in U.S. Privacy Laws

Hunton Privacy

On November 15, 2013, the U.S. Government Accountability Office (“GAO”) released a report (the “Report”) finding that the current federal statutory privacy scheme contains “gaps” and “does not fully reflect” the Fair Information Practice Principles (“FIPPs”). The Report focused primarily on companies that gather and resell consumer personal information, and on the use of consumer personal information for marketing purposes.

Privacy 40
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Malaysia joins the global privacy club!

Privacy and Cybersecurity Law

The hotly anticipated Malaysian Personal Data Protection Act (PDPA) was finally enforced on 15 November 2013. Along with other related […].

Privacy 40
article thumbnail

Where to start with Business Benefits Realisation Management

CGI

Where to start with Business Benefits Realisation Management. ravi.kumarv@cgi.com. Tue, 11/12/2013 - 23:10. Try searching the Internet for information on business benefits management and there’s no end to what useful information you can find. Yet, with so much information freely available and with management frameworks requiring it as best practice, why then do businesses still fail to adopt it?

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

100
100
article thumbnail

Nearly 30 Years In Less Than an Hour

John Battelle's Searchblog

'The post Nearly 30 Years In Less Than an Hour appeared first on John Battelle's Search Blog. Pinch me: Last week I gave a “distinguished” lecture in Engineering at Berkeley. It was an honor to do so – I don’t really see myself as distinguished in any academic sense – and certainly not when it comes to engineering.

Big data 100
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

100
100
article thumbnail

Twitter Ads Are Getting, Um, More Noticeable

John Battelle's Searchblog

'The post Twitter Ads Are Getting, Um, More Noticeable appeared first on John Battelle's Search Blog. Two of my favorite companies in the world are Twitter and American Express. I have literally dozens of good pals at both. So this is said with love (and a bit more pointedly at Twitter than Amex, which is just one of many advertisers I’ve encountered in the situation described below.

article thumbnail

else 11/25: The Collective Hallucination of Currency

John Battelle's Searchblog

'The post else 11/25: The Collective Hallucination of Currency appeared first on John Battelle's Search Blog. This week, bitcoin seems to have gotten the thumbs up for innovation despite some shady origins, lots of background details came out about the circumstances that approved NSA dragnet, and privacy is declared an anomaly. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email news

article thumbnail

It’s…A Marketing Barge?!

John Battelle's Searchblog

'The post It’s…A Marketing Barge?! appeared first on John Battelle's Search Blog. ( image CBS KPIX ) The #googlebarge meme has taken a very strange turn. A rather welcome diversion from our industry’s endless NSA revelations, the enigmatic barge floating off Treasure Island had been widely assumed to be a floating data center of some kind.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Metal Gun, Made from Digital Bits

John Battelle's Searchblog

'The post A Metal Gun, Made from Digital Bits appeared first on John Battelle's Search Blog. One of the artifacts we’re considering for our book is the 3D printer – not only the MakerBot version, but all types of “bits to atoms” kinds of conversions. The advances in the field are staggering – it is now possible to print human tissue , for example.

IT 88
article thumbnail

More than 200,000 Minutes of Engagement, and Counting

John Battelle's Searchblog

'The post More than 200,000 Minutes of Engagement, and Counting appeared first on John Battelle's Search Blog. Some of you may recall “ Behind the Banner ,” a visualization of the programmatic adtech ecosystem that I created with The Office for Creative Research and Adobe back in May. It was my attempt at explaining the complexities of a world I’ve spent several years engaged in, but often find confounding.

article thumbnail

else 11.11: “You can’t let the algorithms take over”

John Battelle's Searchblog

'The post else 11.11: “You can’t let the algorithms take over” appeared first on John Battelle's Search Blog. Last week there was a lot to say about Twitter and bitcoin, and the Guardian offered some reflections on what the NSA revelations mean to the average Joe. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

else 11.18: “We can see it, we can feel it, because we’re already almost there.”

John Battelle's Searchblog

'The post else 11.18: “We can see it, we can feel it, because we’re already almost there.” appeared first on John Battelle's Search Blog. This week, we talk about rights to data, nuance in the tech debate, and some interesting developments in the wearable sensor world. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 82
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

In-Store Tracking: Mobile Location Analytics

Privacy and Cybersecurity Law

In the wake of the negative publicity that Nordstrom received from its use of mobile location analytics (MLA) in a […].

article thumbnail

Privacy is permanent…not temporary

Privacy and Cybersecurity Law

A few days ago, the UK data protection watchdog (ICO) released a warning to organisations that employ temporary or agency […].

Privacy 40
article thumbnail

European Commission Recommends Changes to Safe Harbor

Hunton Privacy

On November 27, 2013, the European Commission published an analysis of the EU-U.S. Safe Harbor Framework, as well as other EU-U.S. data transfer agreements. The analysis includes the following documents: A communication on rebuilding trust in EU-U.S. data flows ; An analysis of the functioning of Safe Harbor , including FAQs ; A mid-term report on the Terrorist Finance Tracking Program (“TFTP”) prepared jointly with the U.S.

article thumbnail

Facial Recognition – well hello there Mr Customer…!

Privacy and Cybersecurity Law

It was recently reported that supermarket giant, Tesco, is launching face scanning technology at petrol stations in order to show […].

IT 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Supreme Court of Canada Declares Alberta PIPA Invalid

Hunton Privacy

On November 15, 2013, the Supreme Court of Canada declared the Alberta Personal Information Protection Act (“PIPA”) invalid because the legislation interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms (the “Canadian Charter”). The case arose in the context of a labor union representing employees of a casino in Alberta.

Privacy 40
article thumbnail

Mexico Issues Data Security Guidelines

Hunton Privacy

As reported by Bloomberg BNA , Mexico’s Federal Institute for Access to Information and Data Protection (“IFAI”) recently issued data security guidelines that implement the security provisions of the Federal Law for the Protection of Personal Data Held by Private Parties ( Reglamento de la Ley Federal de Protección de Datos Personales en Posesión de los Particulares ).

article thumbnail

Brazil Moves Forward with Internet and Data Protection Bills

Hunton Privacy

Brazilian lawmakers, including José Eduardo Cardozo, the Minister of Justice of Brazil, and Ideli Salvatti, the Secretariat of Institutional Relations, held several consensus-building meetings with party leaders over the past two weeks to reach a voting agreement on the Marco Civil da Internet (“Marco Civil”), a draft bill introduced in the Brazilian Congress in 2011.