4D printing: The new frontier
Collaboration 2.0
MARCH 19, 2014
'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.
Collaboration 2.0
MARCH 19, 2014
'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.
John Battelle's Searchblog
MARCH 28, 2014
'The post Might Curators Be An Answer To Twitter’s Signal To Noise Problem? appeared first on John Battelle's Search Blog. My stats in 2008. And at present. 10X the number of folks followed = Signal to Noise problem. Twitter’s lack of growth over the past few months has quickly become its defining narrative – witness Inside Twitter’s plan to fix itself from Quartz, which despite the headline, fails to actually explain anything about said plan.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Interactive Information Management
MARCH 27, 2014
If you're in any way associated with Government contracting, project or program management, project or system cost estimating or resourcing, whether on the job or during acquisition processes and proposal preparation - you may need PMP, ITIL or Cost Estimation Certification and/or training. This is important not only from the business manager perspective, but also from the Enterprise and Solution Architect perspective - it comes in very handy.
Hunton Privacy
MARCH 11, 2014
On March 10, 2014, the German Federal Commissioner for Data Protection and Freedom of Information and all 16 German state data protection authorities responsible for the private sector issued guidelines on the use of closed-circuit television (“CCTV”) by private companies. The guidelines provide information regarding the conditions under which CCTV may be used and outline the requirements for legal compliance.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Robert's Db2
MARCH 28, 2014
Not long ago, a colleague of mine sent to me an e-mail message that he'd received from a person who supports DB2 for z/OS at a US-based company. In this message the IT professional wrote of some DB2-accessing application programs that were running into lock contention issues with page-level locking (the default) in effect. He knew that going to row-level locking for the target tables (accomplished by altering the associated table spaces with LOCKSIZE(ROW)) would likely resolve the locking confli
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
MARCH 19, 2014
'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.
John Battelle's Searchblog
MARCH 12, 2014
'The post We Have Yet to Clothe Ourselves In Data. We Will. appeared first on John Battelle's Search Blog. We are all accustomed to the idea of software “Preferences” – that part of the program where you can personalize how a particular application looks, feels, and works. Nearly every application that matters to me on my computer – Word, Keynote, Garage Band, etc. – have preferences and settings.
Interactive Information Management
MARCH 25, 2014
The title of this article is quite a mouthful, and three very complex and broadly-scoped disciplines mashed together. But that's what's happening all over, isn't it, driven by consumer demand on their iPhones - mashing and manipulating information that's managed to leak through the risk-adverse, highly-regulated mantle of the government's secure data cocoon, and instantly sharing it for further rendering, visualization or actual, productive use.
Hunton Privacy
MARCH 7, 2014
On March 6, 2014 the Article 29 Working Party (the “Working Party”) published a comprehensive Opinion: Opinion 02/2014 on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in the EU and Cross-Border Privacy Rules submitted to APEC CBPR Accountability Agents. This blog post provides an overview of the Opinion.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Robert's Db2
MARCH 1, 2014
I have long been a big fan of DB2 for z/OS native SQL procedures, but I also recognized early on that putting this technology to use would require DB2 DBAs to learn some new things. Much of this newness has to do with the fact that for a native SQL procedure (and for its more recently arrived cousin, the "native" SQL scalar function , also known as a compiled SQL scalar function or a non-inline SQL scalar function), there is no external-to-DB2 executable -- no object module, no load module.
Privacy and Cybersecurity Law
MARCH 28, 2014
Yesterday (27 March 2014) the Romanian DPA approved a decision on the use of Binding Corporate Rules (BCRs). Historically the DPA […].
Collaboration 2.0
MARCH 19, 2014
'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.
John Battelle's Searchblog
MARCH 20, 2014
'The post Thinking Out Loud: Potential Information appeared first on John Battelle's Search Blog. Plenty of potential at the top of this particular system. ( image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
JKevinParker
MARCH 22, 2014
Typeface preferences are subjective. That said, some fonts are just more readable than others. This is true even in "code view". Code editors should generally use a monospaced font (a font where each character is the same width), as this allows us to see patterns within lines of code more easily. But your font does not have to be awful. Like Courier New.
Hunton Privacy
MARCH 31, 2014
The recent leak of an internal memo to the former Chair of the Federal Energy Regulatory Commission, which was widely reported by national news media, has created a national security setback for the United States. Many are concerned that the disclosure may provide terrorists and other bad actors a roadmap for causing a prolonged nationwide blackout.
Scary Beasts Security
MARCH 21, 2014
A couple of weeks back, I released a popular spreadsheet which lists many of the Adobe Flash Player 0-days used to harm people in the wild since 2010. I counted 18 and countless kind Twitterers pointed out some I may have missed. It was an interesting exercise, of course with an ulterior motive! Looking beyond the raw counts, the spreadsheet shouts two items: We should want to make a difference.
Privacy and Cybersecurity Law
MARCH 12, 2014
Today, the European Parliament voted through the new EU Data Protection reform package (621 in favour of the new Regulation […].
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Collaboration 2.0
MARCH 19, 2014
'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done'
John Battelle's Searchblog
MARCH 2, 2014
'The post Else 3.3.14: Is The Internet A Utility? appeared first on John Battelle's Search Blog. The week was dominated by Google related stories, but the top dialog had to do with the Internet itself. I’m sensing something of a shift in society’s beliefs about the Internet’s central role in our humanity. Five years ago, no one wanted to talk about Internet access as a basic human right.
JKevinParker
MARCH 15, 2014
I found a great resource today on Understanding Information Architecture by Peter Morville. When viewing the presentation, go full screen!
Hunton Privacy
MARCH 28, 2014
On March 20, 2014, Australia’s Privacy Amendment (Privacy Alerts) Bill 2014 was re-introduced in the Senate for a first read. The bill, which was subject to a second reading debate on March 27, 2014, originally was introduced on May 29, 2013, but it lapsed on November 12, 2013 at the end of the session. As we previously reported , if passed, the bill would amend the Privacy Act 1988 by introducing a mandatory breach notification requirement for “serious data breaches.
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
Collaboration 2.0
MARCH 19, 2014
'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.
Collaboration 2.0
MARCH 19, 2014
'Great quality desk that effortlessly adjusts up and down makes your working day go more smoothly and comfortably.
Collaboration 2.0
MARCH 19, 2014
'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.
Collaboration 2.0
MARCH 19, 2014
'Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn''t helping.
Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL
Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.
Collaboration 2.0
MARCH 19, 2014
'Rimini Street''s 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.
Collaboration 2.0
MARCH 19, 2014
'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'
Collaboration 2.0
MARCH 19, 2014
'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'
Let's personalize your content