This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Facebook, the current common denominator social graph provider, have rolled out another component which they have turned on by default between you and your friends within the USA (and who knows who else behind the scenes). Your friends can now ‘check you in‘ to a geographical location at a specific time (much as they can tag [.
I was struck by this headline from TechCrunch: Has Google Purged Places Of Yelp? All Signs Point To Yes. The story is rather pedestrian - yet another dispute between a content and community service with the all powerful Google. Sure, it's Yelp, but at the end of the day, it's another company who has run afoul of the distribution giant, and is a bit confused by how things seem to be playing out.
My TEDxSB talk on Inspired Environments. After watching this video I got inspired to get a tan, hit the gym, and cut down my sugar intake by 80%. What a positive difference this has made in my energy levels and well being. Click here to view the embedded video.
Internet Explorer privacy is flawed. This blog post shows how to abuse SMB query to force Internet explorer to disclose windows username, domain and version even while in private mode or using an HTTP proxy. Proof of concept included.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On August 18, 2010, a complaint was filed in the U.S. District Court for the Central District of California, alleging that Specific Media, Inc. violated the Computer Fraud and Abuse Act, as well as state privacy and computer security laws, by failing to provide adequate notice regarding its online tracking practices. The suit, brought by six web users, seeks class action status and over $5 million in damages, and cites Specific Media’s use of Flash cookies to re-create deleted browser cookies a
Now that this paper is officially public, the full story of CSS-based cross-origin theft can come out. (As an aside I'd like to note that I contributed little other than review to the paper so credit must go to the other named individuals). For background reading, see my Dec 2009 original post and an update that notes Firefox fixing the issue. In the original post, I state two mitigating factors that prevent the attack being very serious: the fact that quotes and particularly newlines stop the a
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Now that this paper is officially public, the full story of CSS-based cross-origin theft can come out. (As an aside I'd like to note that I contributed little other than review to the paper so credit must go to the other named individuals). For background reading, see my Dec 2009 original post and an update that notes Firefox fixing the issue. In the original post, I state two mitigating factors that prevent the attack being very serious: the fact that quotes and particularly newlines stop the a
If you’re an Enterprise 2.0 entrepreneur, you’ve got until August 30 to Twitter pitch #e2conf-lp Paige Finkelman of the US Enterprise 2.0 Conference your ‘Launch Pad’ contest entry for consideration by the jury (which includes me), and broader audience votes. The contest, to be held at the West Coast US edition of the show in November, [.
The New York Times published a story on the practice of retargeting today, entitled " Retargeting Ads Follow Surfers to Other Sites." While not nearly as presumptively negative as the WSJ series on marketing and data, it's telling that the story is slugged with "adstalk" in the URL. Journalists and editors generally dislike and mistrust advertisers - I know, because I am both an editor and a journalist, I've worked at places like the Times, and only after studying the business of media for sever
It’s rare when lightening strikes twice. My partners Jason Kiesel, Kyle Brinkman, and I presented CitySourced in front of a live audience of 13,000+ July 12 in San Diego at the 30th Annual User Conference. This was a great bookend for our product launch post TechCrunch50 in Sept 2009. We were pleased when Myles Sutherland & Chris Thomas from Esri called us in April because Esri was on our short list of top partners that we wanted to work with.
Now that ‘Twitter this’ and ‘Like’ buttons have sprouted everywhere online, and every coffee shop has their free blog and twitter account names taped to their windows, it’s fair to say that social media marketing is mature. With this ubiquity comes a greater challenge - the type of inconvenience we personally associate with telephone cold calls, [.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
The always insightful JP Rangaswami ruminates around the internet ‘knowledge is power’ philosophical conundrum in his latest post. Fundamentally the web makes experts âdumbâ by reducing the privileged nature of their expertise, posits JP. For information to have power, it needs to be held asymmetrically. Preferably very, very asymmetrically, starts JP… If you can make sure that [.
We don’t have any problem understanding that someone has a broken limb when we see them with their arm in plaster and a sling, but it takes us a while to understand that someone has mental health problems, since there are usually few obvious signs. Mental health issues typically only make the news when there is [.
Remember when you had a new digital device with an enormous amount of storage space on it compared to your previous version? Way back around 1993 I remember buying a one hundred meg hard drive and thinking what an amazing new world we lived in. I’d just seen the first jpeg image compression Photoshop plugin and [.
Google’s decision to learn from their experiences so far with Wave, by ending the experiment, is evocative of their earlier beta business era. I’m sure we haven’t seen the last of wave style thinking from the advertising juggernaut who also dabbles in the enterprise collaboration space. Venture capitalists bellied up to the funding roulette table [.
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
(Cross posted from the Web 2 Summit Blog.). As themes for conferences go, Points of Control is one of our favorites. Our industry over the past year has been driven by increasingly direct conflicts between its major players: Apple has emerged as a major force in mobile and advertising platforms; Google is fighting off Microsoft in search, Apple in mobile and Facebook in social; and Facebook itself finds itself on the defensive against Twitter and scores of location startups like Foursquare.
I don't know about you guys, but I see way too much of this when I search Google lately. Tonight I was looking for a particular frozen yogurt shop in Edgartown, which is a town on the island where my family has spent portions of the summer for the past 100 or so years. This was a relatively new shop, but not that new. Anyway, we forgot the name, so I Googled " yogurt edgartown.".
So I've read this post - Wireless is Different (AT&T blog) - several times now, and while AT&T is a respected brand, I have to differ on this policy issue. In this post, AT&T's policy folks weigh in on the Verizon/Google dust up, saying "it's really hard to do what we do and therefore we need to be seen as different.". I've heard this before, a million times, and I don't buy it.
Today's Washington Post has a second day editorial from the CEOs of Verizon and Google on their proposed legislative framework first announced Monday. Here it is: Eric Schmidt and Ivan Seidenberg - From Google and Verizon, a path to an open Internet. I read this article three times and I am still not sure what exactly the two are trying to express, or what problem they are trying to solve.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Yesterday I posted some thoughts on the Google-Verizon framework , offering what turns out to be a pretty widespread sensibility, at least in the punditocracy, that this whole thing feels off, not like Google, counter to the brand. There had to be another reason Google would do this, something super important that forced its hand, something so crucial to its own perceived future that it would be willing to upset its core brand advocates.
blekko: how to slash the web from blekko on Vimeo. Blekko is a new search engine that fundamentally changes a few key assumptions about how search works. It's not for lazywebbers - you have to pretty much be a motivated search geek to really leverage blekko's power. But then again, there are literally hundreds of thousands of such folks - the entire SEO/SEM industry, for example.
China has announced it will build a state run search engine to compete with, no wait, dominate and overrun, its own semi-autonomous upstarts Baidu (CEO Robin Li is coming to Web 2 this year) and Yahoo-backed Alibaba (CEO Jack Ma came in years past). All I can say is "Good luck with that, China.". If search engine share is seen as equivalent to vote counts at a rigged election, I have no doubt that the Chinese state engine will have a commanding share within a year.
that was the subject of an email sent to my by my Apple-loving son when the image above showed up on the family iPad (yes, we have an iPad, my wife insisted. It's really hers, but that's another story). The story goes like this. My son had a question about the new Droid X I got, one I couldn't answer because I didn't have the device with me (we were at the beach, if I recall correctly).
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
It's the dog days of August, and a Friday to boot, and I certainly didn't expect this to land in my mail box this morning: The Demand Media Inc. S1. But I had set an alert for the company - and several others like LinkedIn and Facebook - because I consider Demand to be one of the most important digital media companies to "take the next step" in several years.
The Wall St. Journal has a compelling story about Google executives , including Page and Brin, struggling with the vast amount of actionable data available to the company, and what to do about it, even before Facebook pretty much forced the Internet giant to play their hand. A must read. If any of you recall Google's agony over China , its entry and then its withdrawal, this will certainly sound familiar.
A while back I wrote a post titled " The Gap Scenario." In it I outlined one (of many) scenarios that I imagined would become pretty commonplace as location based services, search, and social merged into a retail setting. Today's news ( Business Insider ) that publisher Daily Candy has created an Android app that sends users articles when they are near "current local happenings" such as designer sales, spas, and concerts got me thinking about this scenario once again.
Folks, you have every right to be upset with me this week, my writing simply ceased, I was on vacation, at least in terms of creating longer form posts. However, Signal did not take the week off, and here are the week's offerings: Friday Signal: Let’s Do Launch. Thursday Signal: Highest Order Bit. Weds. Signal: What’s our Policy? Tuesday Signal: Dog Days.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Once again, for you RSS consumers out there, the week that was in Signal, which, should you care to, you can sign up for in convenient email form right here. Friday Signal: The Week That Is. Thursday Signal: We Got Yer Tablet(s) Right Here. Weds. Signal: Pull the Ripcord! Tuesday Signal: Google’s Agony. Monday Signal: It’s Slow Out There, Be Careful.
As I was reading through the Demand Media S1 (more on that as soon as I get a bit smarter on a few financial issues), I noticed that Skype just filed to go public. Wow. Here's the S1. It's another Goldman/Morgan joint, with JP Morgan in there as well. From what I can tell, Skype has a complicated financial profile, due no doubt to its life inside eBay.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content