January, 2013

article thumbnail

Facebook Is No Longer Flat: On Graph Search

John Battelle's Searchblog

The post Facebook Is No Longer Flat: On Graph Search appeared first on John Battelle's Search Blog. A sample Graph Search result for the query “friends photos before 1999.” By now the news is sweeping across the blogosophere and into the mainstream press: Facebook is doing Search! Well, not so fast. Facebook is not doing search, at least not search Google-style.

Privacy 112
article thumbnail

The overconfidence problem

Collaboration 2.0

The cult of me continues.data from a survey of US freshmen shows increasing perceptions of being 'above average': Are they deluded or the greatest generation?

104
104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Self-service checkouts - love them or hate them, its all about the customer

ChiefTech

Self-service checkouts in supermarkets and other retails shop fronts are fascinating on so many levels - from their design to the ethical dilemma of replacing people with machines. Writing recently recently in Computerworld, Patrick Thibodeau reports that while some retailers in the US are installing more self-service technology, others are now removing them.

Retail 74
article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

IT 62
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DB2 for z/OS Data Sharing: the Lock List Portion of the Lock Structure

Robert's Db2

With DB2's data sharing capability having been introduced back in the mid-1990s with DB2 for z/OS Version 4, a great many people -- including lots of folks whose organizations do not run DB2 in data sharing mode -- are quite familiar with the technology (for people new to this subject area, I posted, a few years ago, a "What is DB2 Data Sharing?" entry to the blog that I maintained while working as an independent DB2 consultant).

More Trending

article thumbnail

A Month In With The Nexus 4: Google Strengths Emerge

John Battelle's Searchblog

The post A Month In With The Nexus 4: Google Strengths Emerge appeared first on John Battelle's Search Blog. It’s been a month or so since I bailed on the iPhone and went all in on Google’s flagship Nexus 4. I’ve been keeping mental notes on the transition, and thought it might be useful to others if I sketched out a few observations here.

Cloud 111
article thumbnail

The value of automation question

Collaboration 2.0

Is there too much reliance on software to lead businesses into the future? Strategic thinking should arguably come from within firms, not as purchased generic techniques & enabling tools.

90
article thumbnail

Reflecting on Government 2.0 in Australia

ChiefTech

I apologise for the limited coverage of Government 2.0 in recent times. Its not from lack of interest by any means. At the federal level in Australia I've had the opportunity to work with a large agency over the last few years where it has been interesting to see from the inside the influence of the Government 2.0 movement (if we can call it that). It is definitely having an impact on how they approach technology and social media, although the end results might not be immediately obvious.

article thumbnail

CurateGear 2013

Preservica

We recently attended the CurateGear digital curation symposium at the University of North Carolina at Chapel Hill. In fact, we had two of our top digital preservation experts, Mark Evans and Mike Thuman attend to participate in the lightening talks and break-out sessions. It’s great to support Helen Tibbo and Cal Lee in bringing this community together to look at technology options in various stages.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS: An Interesting "Flip Side" to Native SQL Procedures

Robert's Db2

I heard the other day from a DB2 for z/OS DBA who communicated to me an interesting story. His organization had recently gotten into development and deployment of native SQL procedures on the mainframe DB2 platform. The native SQL procedures were working as advertised, but the move to utilize this DB2 technology had engendered grumbling on the part of some of the organizations' application programmers.

Access 48
article thumbnail

UK ICO Publishes Further Views on the European Commission’s Revised Data Protection Framework

Hunton Privacy

Following up on the UK Information Commissioner’s Office’s (“ICO’s”) positive reaction to the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”), the ICO has now published additional thoughts on the European Commission’s proposed revised data protection framework , reacting to the recent draft report prepared by the rapporteur to the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs, Jan Philipp Albrecht.

article thumbnail

Portrait of Twitter As A Young Media Company

John Battelle's Searchblog

The post Portrait of Twitter As A Young Media Company appeared first on John Battelle's Search Blog. Last year I predicted that Twitter would become a media company. However, I focused mainly on the new “ Discover ” functionality, and I probably should have gone a lot further. In this piece, I intend to. So I’ll start with this: 2013 will be the year Twitter starts to create, curate, and co-create media experiences on top of its platform.

IT 111
article thumbnail

Clash of the titans

Collaboration 2.0

'The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

79
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Agile intranet strategies

ChiefTech

I co-wrote this piece for Image & Data Magazine in 2004 (PDF), but its still relevant to the question posted by Andrew Wright on LinkedIn : How should great intranets be developed? As a project or as a series of rapid incremental improvements? Or both? (For more see his blog post ). Our recommendation back in 2004 was that we should stop searching for intranet perfection, instead work in a way that is more 'agile': Flexibility and the ability to prioritise are key to success.

IT 62
article thumbnail

Do your customer calls all look the same? They shouldn’t.

Dark Reading

Without the ability to verify the Caller ID or ANI, all customer calls can look the same to call center agents. This a risky proposition for any financial institution that handles thousands of customer calls each day. In other words, if all calls appear the same there’s no way to answer some of the key questions all banks should know about customer calls, such as: Which calls are trustworthy?

article thumbnail

The Real Value of Bring Your Own

CGI

The Real Value of Bring Your Own. ravi.kumarv@cgi.com. Thu, 01/24/2013 - 07:00. Unsure about adopting “Bring Your Own”? You’re in good company! CIOs should use methods which reliably estimate benefits and costs, so they can make defensible judgements about value …. With CIOs thinking hard about the merits and pitfalls of allowing staff to connect their own devices to the corporate environment, the time seems right to help by providing a summary of our evaluation tools for “Bring Your Own Device

article thumbnail

Article 29 Working Party Opines on Need for Implementing Acts in Proposed Regulation

Hunton Privacy

On January 22, 2013, the Article 29 Working Party released Opinion 01/2013 (the “Opinion”) on the implementing acts contained in the European Commission’s proposed General Data Protection Regulation (the “Proposed Regulation”). As previously reported , the Working Party has already adopted two Opinions on the Proposed Regulation (Opinion 01/2012 and Opinion 08/2012).

IT 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The 140 Character Video Is Six Seconds Long

John Battelle's Searchblog

The post The 140 Character Video Is Six Seconds Long appeared first on John Battelle's Search Blog. Twitter announced its integration of Vine today , and to put not too fine a point on it, the service is, in essence, a way to create a video tweet. If a text tweet = 140 characters, then a video tweet = 6 seconds. More details over at TNW , but this announcement is quite consistent with my post earlier this week: Portrait of Twitter As A Young Media Company.

article thumbnail

Clash of the titans

Collaboration 2.0

The future direction of technology needs rests more and more with clients and their ad agencies of record. A showdown is looming between the giant hi tech and and advertising industries.

79
article thumbnail

Connecting: A short film on Interaction Design & User Experience

ChiefTech

A short 18 minute film that explores trends in UI, Interaction, & Experience Design. Source: connectingthefilm.com.

54
article thumbnail

Canada’s Anti-Spam Law (CASL) – Proposed New Regulations Would Soften Impact

Privacy and Cybersecurity Law

Draft Regulations recognize CASL should not apply to “regular business communications” Industry Canada has published long-awaited draft Regulations that would lessen the impact […].

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How can we create a level playing field for diverse talent?

CGI

How can we create a level playing field for diverse talent? ravi.kumarv@cgi.com. Tue, 01/15/2013 - 07:00. Organisations have dominant cultures – ways of working and relating that are most comfortable for the majority of the workforce. The individuals who most represent these dominant cultures can often excel if they have true talent and the ambition.

article thumbnail

UK Government Concerned About European Data Protection Reform Proposals

Hunton Privacy

On January 11, 2013, the UK Government published its response (the “Response”) to the UK Justice Select Committee’s opinion on the European Commission’s proposed revised data protection framework. The Response highlights a number of concerns expressed by the UK Government regarding the Commission’s legislative proposals. Choice of Instrument for the General Data Protection Regulation.

article thumbnail

We Are (About to Be) As Gods. Can We Get Used To It?

John Battelle's Searchblog

The post We Are (About to Be) As Gods. Can We Get Used To It? appeared first on John Battelle's Search Blog. Last month I finished another of my “must read” books - Regenesis: How Synthetic Biology Will Reinvent Nature and Ourselves , by George Church and Ed Regis. While the authors don’t veer into the religious, a reader can’t help but ponder the unknown and the supernatural – because the book rather calmly takes a fair amount of what we take for granted as p

IT 104
article thumbnail

Lance Armstrong & digital power broking challenges

Collaboration 2.0

Negative viral infection of social networks is an increasing issue: digital cliques can calcify into silos inside companies, and sophisticated communicators can be a force for good or bad.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

IBM Connections 4.5 coming in March 2013

ChiefTech

At IBM Connect 2013 (previously known as Lotusphere) this week, they have presented details of the March release of IBM Connections 4.5. Michael Sampson provided some rough but detailed notes about the new features in this release. Scanning the list for the highlights, there is a good spread of user interface, mobile app and back-end improvements. End-users in particular will welcome the new @ mentions and the ability to like within the main activity stream.

IT 52
article thumbnail

Children’s Online Privacy Protection: U.S. Developments Compared to Canada

Privacy and Cybersecurity Law

There were two important developments in the U.S. regarding children and mobile technologies. FTC Staff Report On December 10, 2012, […].

Privacy 40
article thumbnail

Amazon is Amazin’ Me

John Battelle's Searchblog

The post Amazon is Amazin’ Me appeared first on John Battelle's Search Blog. I’m a fan of Amazon, always have been, though my relationship with the brand has, ironically, never been particularly personal. I don’t feel emotional about Amazon, I feel – transactional. This despite the fact that I have probably spent more on the site than the combined college savings accounts for my three kids (Hi Kids!).

Metadata 103