November, 2013

article thumbnail

Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact

John Battelle's Searchblog

'The post Why The Banner Ad Is Heroic, and Adtech Is Our Greatest Artifact appeared first on John Battelle's Search Blog. Every good story needs a hero. Back when I wrote The Search , that hero was Google – the book wasn’t about Google alone, but Google’s narrative worked to drive the entire story. As Sara and I work on If/Then , we’ve discovered one unlikely hero for ours: The lowly banner ad.

Retail 112
article thumbnail

The end of an era?

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS Work: the Task's the Thing

Robert's Db2

To understand how DB2 work is handled in a z/OS system, you need to have some understanding of the tasks used to manage that work. Here, "tasks" doesn't refer to things done or to be done. It refers instead to the control blocks used to represent, for dispatching purposes, application and system processes in a z/OS LPAR. I have found that several misconceptions related to DB2 for z/OS workload processing are rooted in misunderstandings of the tasks behind the workload.

Access 67
article thumbnail

Malaysian Data Protection Law Takes Effect

Hunton Privacy

On November 14, 2013, the Minister of the Malaysian Communications and Multimedia Commission (the “Minister”) announced that Malaysia’s Personal Data Protection Act 2010 (the “Act”) would be going into effect as of November 15, marking the end of years of postponements. The following features of the law are of particular significance: The law applies only to the processing of personal data in commercial transactions (in effect, private sector transactions, though not including credit reporting a

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Privacy Class Action Watch • The Latest Waves

Privacy and Cybersecurity Law

Apple Defeats Class-Based Privacy Claims on Standing Arguments Apple successfully defeated claims asserting it had violated its privacy policies in […].

Privacy 40

More Trending

article thumbnail

Ubiquitous Video: Why We Need a Robots.txt For the Real World

John Battelle's Searchblog

'The post Ubiquitous Video: Why We Need a Robots.txt For the Real World appeared first on John Battelle's Search Blog. Last night I had an interesting conversation at a small industry dinner. Talk turned to Google Glass, in the context of Snapchat and other social photo sharing apps. Everyone at the table agreed: it was inevitable – whether it be Glass, GoPro, a button in your clothing or some other form factor – personalized, “always on” streaming of images will be ubiquitous.

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

75
article thumbnail

A Great Analytics on System z Use Case: The Operational Data Store

Robert's Db2

A few months ago, I posted an entry to this blog on the subject of "moving queries to data," the idea being that when data to be analyzed for decision support purposes originates in a DB2 for z/OS database (as a great deal of the world's corporate and governmental data does), a very good case can be made for analyzing that data on its platform of origin -- System z -- as opposed to copying and moving the data to a different platform for querying and reporting.

article thumbnail

GAO Report Highlights Gaps in U.S. Privacy Laws

Hunton Privacy

On November 15, 2013, the U.S. Government Accountability Office (“GAO”) released a report (the “Report”) finding that the current federal statutory privacy scheme contains “gaps” and “does not fully reflect” the Fair Information Practice Principles (“FIPPs”). The Report focused primarily on companies that gather and resell consumer personal information, and on the use of consumer personal information for marketing purposes.

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Malaysia joins the global privacy club!

Privacy and Cybersecurity Law

The hotly anticipated Malaysian Personal Data Protection Act (PDPA) was finally enforced on 15 November 2013. Along with other related […].

Privacy 40
article thumbnail

Where to start with Business Benefits Realisation Management

CGI

Where to start with Business Benefits Realisation Management. ravi.kumarv@cgi.com. Tue, 11/12/2013 - 23:10. Try searching the Internet for information on business benefits management and there’s no end to what useful information you can find. Yet, with so much information freely available and with management frameworks requiring it as best practice, why then do businesses still fail to adopt it?

article thumbnail

Nearly 30 Years In Less Than an Hour

John Battelle's Searchblog

'The post Nearly 30 Years In Less Than an Hour appeared first on John Battelle's Search Blog. Pinch me: Last week I gave a “distinguished” lecture in Engineering at Berkeley. It was an honor to do so – I don’t really see myself as distinguished in any academic sense – and certainly not when it comes to engineering.

Big data 100
article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Twitter Ads Are Getting, Um, More Noticeable

John Battelle's Searchblog

'The post Twitter Ads Are Getting, Um, More Noticeable appeared first on John Battelle's Search Blog. Two of my favorite companies in the world are Twitter and American Express. I have literally dozens of good pals at both. So this is said with love (and a bit more pointedly at Twitter than Amex, which is just one of many advertisers I’ve encountered in the situation described below.

article thumbnail

else 11/25: The Collective Hallucination of Currency

John Battelle's Searchblog

'The post else 11/25: The Collective Hallucination of Currency appeared first on John Battelle's Search Blog. This week, bitcoin seems to have gotten the thumbs up for innovation despite some shady origins, lots of background details came out about the circumstances that approved NSA dragnet, and privacy is declared an anomaly. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email news

article thumbnail

It’s…A Marketing Barge?!

John Battelle's Searchblog

'The post It’s…A Marketing Barge?! appeared first on John Battelle's Search Blog. ( image CBS KPIX ) The #googlebarge meme has taken a very strange turn. A rather welcome diversion from our industry’s endless NSA revelations, the enigmatic barge floating off Treasure Island had been widely assumed to be a floating data center of some kind.

article thumbnail

A Metal Gun, Made from Digital Bits

John Battelle's Searchblog

'The post A Metal Gun, Made from Digital Bits appeared first on John Battelle's Search Blog. One of the artifacts we’re considering for our book is the 3D printer – not only the MakerBot version, but all types of “bits to atoms” kinds of conversions. The advances in the field are staggering – it is now possible to print human tissue , for example.

IT 88
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

More than 200,000 Minutes of Engagement, and Counting

John Battelle's Searchblog

'The post More than 200,000 Minutes of Engagement, and Counting appeared first on John Battelle's Search Blog. Some of you may recall “ Behind the Banner ,” a visualization of the programmatic adtech ecosystem that I created with The Office for Creative Research and Adobe back in May. It was my attempt at explaining the complexities of a world I’ve spent several years engaged in, but often find confounding.

article thumbnail

else 11.11: “You can’t let the algorithms take over”

John Battelle's Searchblog

'The post else 11.11: “You can’t let the algorithms take over” appeared first on John Battelle's Search Blog. Last week there was a lot to say about Twitter and bitcoin, and the Guardian offered some reflections on what the NSA revelations mean to the average Joe. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

article thumbnail

else 11.18: “We can see it, we can feel it, because we’re already almost there.”

John Battelle's Searchblog

'The post else 11.18: “We can see it, we can feel it, because we’re already almost there.” appeared first on John Battelle's Search Blog. This week, we talk about rights to data, nuance in the tech debate, and some interesting developments in the wearable sensor world. As always, if you want to keep up with what we’re reading/thinking about on a weekly basis, the best way is to subscribe to the “else” feed, either as an email newsletter or through RSS.

IT 82
article thumbnail

In-Store Tracking: Mobile Location Analytics

Privacy and Cybersecurity Law

In the wake of the negative publicity that Nordstrom received from its use of mobile location analytics (MLA) in a […].

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Privacy is permanent…not temporary

Privacy and Cybersecurity Law

A few days ago, the UK data protection watchdog (ICO) released a warning to organisations that employ temporary or agency […].

Privacy 40
article thumbnail

European Commission Recommends Changes to Safe Harbor

Hunton Privacy

On November 27, 2013, the European Commission published an analysis of the EU-U.S. Safe Harbor Framework, as well as other EU-U.S. data transfer agreements. The analysis includes the following documents: A communication on rebuilding trust in EU-U.S. data flows ; An analysis of the functioning of Safe Harbor , including FAQs ; A mid-term report on the Terrorist Finance Tracking Program (“TFTP”) prepared jointly with the U.S.

article thumbnail

Facial Recognition – well hello there Mr Customer…!

Privacy and Cybersecurity Law

It was recently reported that supermarket giant, Tesco, is launching face scanning technology at petrol stations in order to show […].

IT 40
article thumbnail

Supreme Court of Canada Declares Alberta PIPA Invalid

Hunton Privacy

On November 15, 2013, the Supreme Court of Canada declared the Alberta Personal Information Protection Act (“PIPA”) invalid because the legislation interfered with the right to freedom of expression in the labor context under Section 2(b) of the Canadian Charter of Rights and Freedoms (the “Canadian Charter”). The case arose in the context of a labor union representing employees of a casino in Alberta.

Privacy 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Mexico Issues Data Security Guidelines

Hunton Privacy

As reported by Bloomberg BNA , Mexico’s Federal Institute for Access to Information and Data Protection (“IFAI”) recently issued data security guidelines that implement the security provisions of the Federal Law for the Protection of Personal Data Held by Private Parties ( Reglamento de la Ley Federal de Protección de Datos Personales en Posesión de los Particulares ).

article thumbnail

Brazil Moves Forward with Internet and Data Protection Bills

Hunton Privacy

Brazilian lawmakers, including José Eduardo Cardozo, the Minister of Justice of Brazil, and Ideli Salvatti, the Secretariat of Institutional Relations, held several consensus-building meetings with party leaders over the past two weeks to reach a voting agreement on the Marco Civil da Internet (“Marco Civil”), a draft bill introduced in the Brazilian Congress in 2011.

article thumbnail

China Insurance Regulatory Agency Promulgates New Rule Protecting Personal Data of Life Insurance Customers

Hunton Privacy

On November 4, 2013, the China Insurance Regulatory Commission, which is the Chinese regulatory and administrative authority for the insurance sector, issued the Interim Measures for the Management of the Authenticity of Information of Life Insurance Customers (the “Measures”). The Measures require life insurance companies and their agents to ensure the authenticity of personal data of life insurance policy holders.