March, 2014

article thumbnail

4D printing: The new frontier

Collaboration 2.0

'Autodesk, academia, and coming-of-age firms like Stratsys and Organovo are all collaborating on an incredible new dimension on creation with programable materials.

111
111
article thumbnail

Might Curators Be An Answer To Twitter’s Signal To Noise Problem?

John Battelle's Searchblog

'The post Might Curators Be An Answer To Twitter’s Signal To Noise Problem? appeared first on John Battelle's Search Blog. My stats in 2008. And at present. 10X the number of folks followed = Signal to Noise problem. Twitter’s lack of growth over the past few months has quickly become its defining narrative – witness Inside Twitter’s plan to fix itself from Quartz, which despite the headline, fails to actually explain anything about said plan.

IT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Project Management, PMP, ITIL, Cost Estimating Business Training & Certification in Virginia

Interactive Information Management

If you're in any way associated with Government contracting, project or program management, project or system cost estimating or resourcing, whether on the job or during acquisition processes and proposal preparation - you may need PMP, ITIL or Cost Estimation Certification and/or training. This is important not only from the business manager perspective, but also from the Enterprise and Solution Architect perspective - it comes in very handy.

article thumbnail

German DPAs Issue Guidelines on CCTV Use

Hunton Privacy

On March 10, 2014, the German Federal Commissioner for Data Protection and Freedom of Information and all 16 German state data protection authorities responsible for the private sector issued guidelines on the use of closed-circuit television (“CCTV”) by private companies. The guidelines provide information regarding the conditions under which CCTV may be used and outline the requirements for legal compliance.

Retail 56
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS People: Wearing Your "Applications" Hat Versus Your "Systems" Hat

Robert's Db2

Not long ago, a colleague of mine sent to me an e-mail message that he'd received from a person who supports DB2 for z/OS at a US-based company. In this message the IT professional wrote of some DB2-accessing application programs that were running into lock contention issues with page-level locking (the default) in effect. He knew that going to row-level locking for the target tables (accomplished by altering the associated table spaces with LOCKSIZE(ROW)) would likely resolve the locking confli

Mining 48

More Trending

article thumbnail

Harley Earl's influence on Steve Jobs

Collaboration 2.0

'Earl invented mass-produced car styling and annual new product unveiling cycles at General Motors during its glory years — and there are many parallels to Apple''s recent run.

IT 111
article thumbnail

We Have Yet to Clothe Ourselves In Data. We Will.

John Battelle's Searchblog

'The post We Have Yet to Clothe Ourselves In Data. We Will. appeared first on John Battelle's Search Blog. We are all accustomed to the idea of software “Preferences” – that part of the program where you can personalize how a particular application looks, feels, and works. Nearly every application that matters to me on my computer – Word, Keynote, Garage Band, etc. – have preferences and settings.

Retail 109
article thumbnail

Government Open Data Success Via Information Sharing, Enterprise Architecture and Data Assets

Interactive Information Management

The title of this article is quite a mouthful, and three very complex and broadly-scoped disciplines mashed together. But that's what's happening all over, isn't it, driven by consumer demand on their iPhones - mashing and manipulating information that's managed to leak through the risk-adverse, highly-regulated mantle of the government's secure data cocoon, and instantly sharing it for further rendering, visualization or actual, productive use.

article thumbnail

Article 29 Working Party Issues Opinion on BCR and APEC CBPR Requirements

Hunton Privacy

On March 6, 2014 the Article 29 Working Party (the “Working Party”) published a comprehensive Opinion: Opinion 02/2014 on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in the EU and Cross-Border Privacy Rules submitted to APEC CBPR Accountability Agents. This blog post provides an overview of the Opinion.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS SQL PL Routines: REBIND PACKAGE vs. ALTER REGENERATE

Robert's Db2

I have long been a big fan of DB2 for z/OS native SQL procedures, but I also recognized early on that putting this technology to use would require DB2 DBAs to learn some new things. Much of this newness has to do with the fact that for a native SQL procedure (and for its more recently arrived cousin, the "native" SQL scalar function , also known as a compiled SQL scalar function or a non-inline SQL scalar function), there is no external-to-DB2 executable -- no object module, no load module.

Access 48
article thumbnail

Romanian DPA approves use of BCRs

Privacy and Cybersecurity Law

Yesterday (27 March 2014) the Romanian DPA approved a decision on the use of Binding Corporate Rules (BCRs). Historically the DPA […].

40
article thumbnail

Budgeting for the 'Digital Enterprise'

Collaboration 2.0

'In my experience, strategic planning for transformation is critical to lower costs while increasing innovation and agility.

105
105
article thumbnail

Thinking Out Loud: Potential Information

John Battelle's Searchblog

'The post Thinking Out Loud: Potential Information appeared first on John Battelle's Search Blog. Plenty of potential at the top of this particular system. ( image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Improving SharePoint Designer's Code View

JKevinParker

Typeface preferences are subjective. That said, some fonts are just more readable than others. This is true even in "code view". Code editors should generally use a monospaced font (a font where each character is the same width), as this allows us to see patterns within lines of code more easily. But your font does not have to be awful. Like Courier New.

IT 40
article thumbnail

Leak of Grid Vulnerabilities Creates National Security Risks

Hunton Privacy

The recent leak of an internal memo to the former Chair of the Federal Energy Regulatory Commission, which was widely reported by national news media, has created a national security setback for the United States. Many are concerned that the disclosure may provide terrorists and other bad actors a roadmap for causing a prolonged nationwide blackout.

article thumbnail

Together, we can make a difference

Scary Beasts Security

A couple of weeks back, I released a popular spreadsheet which lists many of the Adobe Flash Player 0-days used to harm people in the wild since 2010. I counted 18 and countless kind Twitterers pointed out some I may have missed. It was an interesting exercise, of course with an ulterior motive! Looking beyond the raw counts, the spreadsheet shouts two items: We should want to make a difference.

IT 20
article thumbnail

Progress on EU data privacy reform: “irreversible”

Privacy and Cybersecurity Law

Today, the European Parliament voted through the new EU Data Protection reform package (621 in favour of the new Regulation […].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ego 2.0 and the tragedy of the shrinking digital commons

Collaboration 2.0

'A down to earth voice from a previous era sounds a warning about overconfident posturing around how to do things by those who rarely have, and lack of respect for those who actually get business done'

99
article thumbnail

Else 3.3.14: Is The Internet A Utility?

John Battelle's Searchblog

'The post Else 3.3.14: Is The Internet A Utility? appeared first on John Battelle's Search Blog. The week was dominated by Google related stories, but the top dialog had to do with the Internet itself. I’m sensing something of a shift in society’s beliefs about the Internet’s central role in our humanity. Five years ago, no one wanted to talk about Internet access as a basic human right.

Privacy 96
article thumbnail

Understanding Information Architecture

JKevinParker

I found a great resource today on Understanding Information Architecture by Peter Morville. When viewing the presentation, go full screen!

article thumbnail

Australian Data Breach Notification Bill Re-Introduced

Hunton Privacy

On March 20, 2014, Australia’s Privacy Amendment (Privacy Alerts) Bill 2014 was re-introduced in the Senate for a first read. The bill, which was subject to a second reading debate on March 27, 2014, originally was introduced on May 29, 2013, but it lapsed on November 12, 2013 at the end of the session. As we previously reported , if passed, the bill would amend the Privacy Act 1988 by introducing a mandatory breach notification requirement for “serious data breaches.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

End of an era? What's holding back the new digital enterprise

Collaboration 2.0

'We need a clear out of dotcom era style hype and froth in order to better focus on building next generation digital enterprises.

99
article thumbnail

Elevate II electrically adjustable height standing desk is a revelation

Collaboration 2.0

'Great quality desk that effortlessly adjusts up and down makes your working day go more smoothly and comfortably.

98
article thumbnail

HP's transformation enablement strengths

Collaboration 2.0

'Fast removal of old technology to enable new ways of working is essential but often under appreciated: HP are masters at orchestrating disposal governance compliance, financing and contractual reorganization.

article thumbnail

Not much Klout

Collaboration 2.0

'Aggregating personal data is getting harder as digital social fragments, and Twitter spam isn''t helping.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Maintenance is the battleground, innovation the prize

Collaboration 2.0

'Rimini Street''s 3rd-Party Software Maintenance & Support model could be the catalyst that completely changes the face of future enterprise software.

93
article thumbnail

Reaction overload.

Collaboration 2.0

'The cross currents of different digital use models have often tended to cancel out the effectiveness of company wide initiatives so far, and superficiality is increasing the challenges'

92
article thumbnail

Quality over quantity, experience over vision

Collaboration 2.0

'Theoretical knowledge still largely dominates strategic thinking about the social web over practical experience, which has resulted in succession and long term planning issues as business use matures'

89