This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?
'The post Early Lessons From My Mobile Deep Dive: The Quickening Is Nigh appeared first on John Battelle's Search Blog. Do you really want to eat them one at a time? Me, I prefer mashing ‘em up. Recently I began a walkabout of sorts, with a goal of ameliorating my rather thin understanding of the mobile marketplace. If you read me closely, you know I’ve been more than frustrated with what I call the “ chicletized world ” of disconnected mobile apps.
Recently, I was talking with people from a company's IT department about modernizing their mainframe application architecture.Among other things, we discussed increasing the company's use of stored procedures for DB2 for z/OS data access. That prompted some questions around the use of the DB2 SQL statement SET CURRENT PACKAGESET in stored procedures called by DRDA requesters (these being calls that would get to DB2 via the distributed data facility, or DDF).
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
On September 16, 2014, the Article 29 Working Party (the “Working Party”) adopted a Statement on the impact of the development of big data on the protection of individuals with regard to the processing of their personal data in the EU (“Statement”). This two-page Statement sets forth a number of “key messages” by the Working Party on how big data impacts compliance requirements with EU privacy law, with the principal message being that big data does not impact or change basic EU data protection
Are your drivers eco-friendly? shobana.lv@cgi.com. Mon, 09/22/2014 - 05:00. A number of companies have been investing in coaching services for professional drivers with the goal of teaching them how to reduce fuel usage, as well as other eco-driving skills. To succeed, a clear perception of the variations in fuel consumption that can be attributed to driving behaviour is required.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Are your drivers eco-friendly? shobana.lv@cgi.com. Mon, 09/22/2014 - 05:00. A number of companies have been investing in coaching services for professional drivers with the goal of teaching them how to reduce fuel usage, as well as other eco-driving skills. To succeed, a clear perception of the variations in fuel consumption that can be attributed to driving behaviour is required.
'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?
'The post Every Company Is An Experience Company appeared first on John Battelle's Search Blog. Illustration by Craig Swanson and idea by James Cennamo. Some years ago while attempting to explain the thinking behind my then-startup Federated Media, I wrote that all brands are publishers (it was over on the FM blog, which the new owners apparently have taken down – a summary of my thinking can be found here ).
In an entry posted a few months ago to this blog, I touched on several matters pertaining to mainframe zIIP engines and the use of these processors by DB2 for z/OS. Based on recent experience, I feel that it's important to further highlight a particular zIIP-related issue: zIIP engine contention. Through this post, I want to explain what zIIP contention is, why you want to avoid it, how you can spot it, and what you can do about it.
I am excited to be speaking at SUGDC (SharePoint Users Group of DC) tonight. I am presenting on "How to Leverage SharePoint 2013 to Organize, Label, Navigate, and Search Your Information". This is material adapted from an AIIM course I developed that is available in the AIIM Resource Center for professional members.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
A recent decision by the United States Court of Appeals for the Ninth Circuit reinforces the importance of obtaining affirmative user consent to website Terms of Use for website owners seeking to enforce those terms against consumers. In Nguyen v. Barnes & Noble Inc. , the Ninth Circuit held that Barnes & Noble’s website Terms of Use (“Terms”) were not enforceable against a consumer because the website failed to provide sufficient notice of the Terms, despite having placed conspicuous hy
Transformation strategies for building a “cloud-enabled” enterprise. shobana.lv@cgi.com. Fri, 09/12/2014 - 08:00. Cloud-enabled enterprises take a “cloud-first” approach to IT service delivery, taking advantage of cloud capabilities offered by external suppliers instead of building them in house. However, purchasing many different types of cloud services from multiple suppliers in an ad-hoc fashion leads to a highly fragmented IT environment, which, in turn, will negate the many benefits of clou
'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?
'The post We’re Innumerate, Which Is Why We Love Visualizations appeared first on John Battelle's Search Blog. This weekend I reviewed my notes from a few weeks of late summer meetings, and found this gem from a conversation with Mike Driscoll, the CEO and co-founder of data analytics firm MetaMarkets. MetaMarkets helps adtech firms make sense of the reams of data they collect each day (hour, minute, second…).
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Thursday, Sept. 18th 7:30-9AM - Build Your Digital Strategy, for 2015 Mark your calendars and RSVP for this first rebranded NVTC "Digital Strategy" meeting of the new fiscal year - kicking off support and insight regarding building and evolving your Digital Strategy for 2015. Or join the NVTC now to participate! Hear from other #NVTC business and government members, sharing information regarding the approach to a Digital Strategy, executing and sustaining it for innovative business value.
What is the best way to manage individual users' access to SharePoint sites? Through AD security groups inside corresponding SharePoint groups. I prefer to keep the names consistent between SharePoint and AD security groups. Example Permission Groups for SharePoint. AD Security Group SharePoint Group SharePoint Permission Level. WebApp1_Site1_InfoManagers WebApp1_Site1_InfoManagers Manage Information.
On September 22, 2014, the Article 29 Working Party (the “Working Party”) released an Opinion on the Internet of Things (the “Opinion”) that was adopted during the last plenary session of the Working Party in September 2014. With this Opinion, the Working Party intends to draw attention to the privacy and data protection challenges raised by the Internet of Things and to propose recommendations for the stakeholders to comply with the current EU data protection legal framework.
AddressSanitizer, or ASAN , is an excellent tool for detecting subtle memory errors at runtime in C / C++ programs. It is now a productionized option in both the clang and gcc compilers, and has assisted in uncovering literally thousands of security bugs. ASAN works by instrumenting compiled code with careful detections for runtime errors. It is primarily a detection tool.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?
'The post Else 9.29.14: Google snorts milk through its nose; Food, Things, and Marketing appeared first on John Battelle's Search Blog. ( image ) This past week’s links are rife with people asking hard questions of Google and Facebook, and so much the better, I’d warrant. You don’t get to the lead position without raising questions.
'As the era of the ATM gives way to increasingly sophisticated, secure always-on digital banking, will the old guard of bricks, mortar and paper based high street banks evolve or die?
'The energy sector has never looked more interesting - can the staid utility industry embrace the digital transformation strategic models required to stay relevant or will they be crushed in the emerging battle between tech and energy companies?
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
'The post Life Break: Go See “Take Me To The River” appeared first on John Battelle's Search Blog. It’s rare I write about things not directly related to the Internet industry, but the film Take Me To The River , a multi-year project helmed by my friend and colleague Martin Shore, is certainly worthy of a detour. If you love music, any kind of music, this film is a must.
'The post A Print Magazine Launch? What?!!! California Sunday Is Coming appeared first on John Battelle's Search Blog. A year or so ago Chas Edwards, a colleague, pal, and member of the founding team at Federated Media, came to my office for a catch up. I had heard he was cooking up a new venture, but I didn’t know the details. Little did I know what Chas and his new partner Douglas McGray had up their sleeve – a new *print* magazine built specifically for California.
'The post A Big Day For The Internet appeared first on John Battelle's Search Blog. Today scores of big companies are taking symbolic action to defend the essential principles of an open Internet, and I support them. That’s why, on your first visit here today, you’ll see the “spinning ball of death” up on the right. For more information about the Internet Slowdown, head here.
'The post Else 9.15.14: Ma, Theil, Apple Pay, and Minecraft appeared first on John Battelle's Search Blog. I’m easing back into this weekly Else column, or put another way, I missed last week’s Else due to preparations for NewCo SF , which I’m proud to say was a huge success. This week is Detroit, then New York, London, Boulder, LA, Palo Alto, but I get ahead of myself.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On September 17, 2014, the Federal Trade Commission announced that the online review site Yelp, Inc., and mobile app developer TinyCo, Inc., have agreed to settle separate charges that they collected personal information from children without parental consent, in violation of the Children’s Online Privacy Protection Rule (the “COPPA Rule”). Yelp. According to the FTC’s complaint against Yelp, from 2009 to 2013, Yelp app users had to provide information such as their name, email address, ZIP code
On September 18, 2014, the French Data Protection Authority (the “CNIL”) announced plans to review 100 French websites on September 18-19, 2014. This review is being carried out in the context of the European “cookies sweep day” initiative, an EU online compliance audit. The Article 29 Working Party organized this joint action, which runs from September 15-19, 2014, to verify whether major EU websites are complying with EU cookie law requirements.
On September 18, 2014, the Article 29 Working Party (the “Working Party”) announced its decision to establish a common approach to the right to be forgotten (the “tool-box”). This tool-box will be used by all EU data protection authorities (“DPAs”) to help address complaints from search engine users whose requests to delete their search result links containing their personal data were refused by the search engines.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content