Are you there?
Collaboration 2.0
AUGUST 16, 2011
Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications
Collaboration 2.0
AUGUST 16, 2011
Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications
John Battelle's Searchblog
AUGUST 5, 2011
Note: I wrote this post without contacting anyone at Twitter. I do know a lot of folks there, and as regular readers know, have a lot of respect for them and the company. But I wanted to write this as a "Thinking Out Loud" post, rather than a reported article. There's a big difference - in this piece, I am positing an idea. It's entirely possible my lack of reporting will make me look like an uninformed boob.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Robert's Db2
AUGUST 30, 2011
I don't know if there are any industries in which things change as quickly (and constantly) as they do in the realm of information technology. Just a few years ago, clouds were what produced rain, streams were watercourses , and Ruby on Rails might have been a reference to your aunt taking the express train to New York City. Today, those are all IT terms.
Hunton Privacy
AUGUST 31, 2011
On August 5, 2011, the Beijing Second Intermediate People’s Court announced its decision in what is reported to be the largest criminal case to date involving the misuse of personal information in Beijing, China. The Court based its ruling on Article 7 of the Seventh Amendment to the Criminal Law, which applies to three types of criminal activities: (1) illegal sale of citizens’ personal information, (2) illegal provision of citizens’ personal information, and (3) illegal access to citizens’ pe
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
JKevinParker
AUGUST 25, 2011
I'm currently working through the White House's 25 Point Implementation Plan to Reform Federal Information Technology Management. I want to quickly highlight the first paragraph of that document so that you will understand why I am so passionate about helping Uncle Sam make major improvements: Information technology should enable government to better serve the American people.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Collaboration 2.0
AUGUST 8, 2011
Digital tools of choice in a world where our social fabric is rapidly changing can be used to market jeans or orchestrate looting.
Collaboration 2.0
AUGUST 29, 2011
Salesforce tour de force in providing digital tools at Dreamforce is a great way to learn how to get the most out of all conferences and events
Collaboration 2.0
AUGUST 30, 2011
Unlocking information from elderly IT silos is essential to realize the benefits of modern technologies; CIMTrek show how to quickly extract content from Domino & Notes applications
Collaboration 2.0
AUGUST 25, 2011
Don’t overlook the value of Autonomy and their competitors helping make sense of unstructured data at scale as HP struggle to remain relevant
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Collaboration 2.0
AUGUST 4, 2011
Regardless of improvements in collaboration software, the real business challenge is in identifying who takes responsibilities for collaboration, overcoming internal political agendas & driving new working methods
John Battelle's Searchblog
AUGUST 29, 2011
The subject of "owning your own domain" has been covered to death in our industry, with excellent posts from Anil Dash , and others explaining the importance of having your own place on the web. I've also weighed in on the importance of " The Independent Web ," where creators have control, as opposed to the Dependent Web, where platforms ultimately control how your words, data, and expression are leveraged.
John Battelle's Searchblog
AUGUST 6, 2011
( image charlie rose ) As I prepare for writing my next book ( #WWHW ), I've been reading a lot. You've seen my review of The Information , and In the Plex , and The Next 100 Years. I've been reading more than that, but those made it to a post so far. I'm almost done with Sherry Turkle's Alone Together , with which I have an itch to quibble, not to mention some fiction that I think is information to the work I'm doing.
John Battelle's Searchblog
AUGUST 3, 2011
Over on Hacker News , I noticed this headline: See what Google knows about you. Now that's a pretty compelling promise, so I clicked. It took me to this page: Ah, the Google ad preferences page. It's been a while since I've visited this place. It gives you a limited but nonetheless interesting overview of the various categories and demographic information Google believes reflect your interests (and in a way, your identity, or "who you are" in the eyes of an advertising client).
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
John Battelle's Searchblog
AUGUST 21, 2011
Last week I finished reading Sherry Turkle's " Alone Together ", and while I have various disagreements with the work (I typed in more than 70 notes on my Kindle, even with that terribly tiny keyboard), I still found myself nodding in agreement more than I thought I would. In her book, Turkle explores our relationship with technology, in particular what she calls "sociable robots" (toys like the Aibo or My Real Baby), as well as with email, IM, and shared virtual spaces like Second Life and Face
John Battelle's Searchblog
AUGUST 31, 2011
As part of my ongoing self-education - so as to not be a total moron while writing " What We Hath Wrought " - this past weekend I read " Physics of the Future " by Michio Kaku. I was excited to read the book, because Kaku is a well regarded physicist, and that's a field that I know will inform what's possible, technologically, thirty or so years from now.
John Battelle's Searchblog
AUGUST 10, 2011
I n the comments on this previous post , I promised I'd respond with another post, as my commenting system is archaic (something I'm fixing soon). The comments were varied and interesting, and fell into a few buckets. I also have a few more of my own thoughts to toss out there, given what I've heard from you all, as well as some thinking I've done in the past day or so.
John Battelle's Searchblog
AUGUST 1, 2011
( image ) I just re-read my post explaining What We Hath Wrought , the book I am currently working on. (Yes, I know that's a dangling participle, Mom). And it strikes me I might ask you all this question: Which company do you think will be around, and let me add - around and thriving - one generation from now? I could install a widget and let you vote for a company, but that's the easy way out.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Robert's Db2
AUGUST 25, 2011
I've said it before, and I'll say it again: DB2 10 for z/OS is packed with new functionality. Along with the really high-profile features of the latest release of DB2 for the mainframe platform (temporal data support, enhanced CPU efficiency, row and column access control, etc.), you'll find several goodies that will likely be very useful to your organization.
Robert's Db2
AUGUST 16, 2011
Greetings, folks. I know that an unusually long time has passed since I lasted posted an entry to this blog -- my apologies for that. I was out of commission during the second half of July and into early August, dealing with a medical issue. I'm much better now, and things are getting back to normal. I'm still on medical leave (until October 3), but I plan on posting several blog entries between now and then).
Hunton Privacy
AUGUST 26, 2011
On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.
Hunton Privacy
AUGUST 26, 2011
On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Hunton Privacy
AUGUST 25, 2011
On August 19, 2011, the Data Protection Commissioner’s Office of the German federal state of Schleswig-Holstein (“ULD”) ordered all businesses in that state “to shut down their fan pages on Facebook and remove social plug-ins such as the ‘like’-button from their websites.” Although this warning is specific to Facebook users, the regulator’s explanation of its motives reveals a fundamental concern about common data analytics practices: “By using the Facebook service traffic and content data are
Hunton Privacy
AUGUST 24, 2011
On July 13, 2011, the Belgian Privacy Commission (the “Belgian DPA”) signed a Protocol with the Ministry of Justice which significantly simplifies the authorization procedure for binding corporate rules (“BCRs”) under Belgian law. The Protocol was just made public on the Belgian DPA’s website. The European Context. BCRs are a legal mechanism used by multinational companies for purposes of complying with EU data protection law, to provide an adequate level of data protection when transfer
Hunton Privacy
AUGUST 24, 2011
On August 24, 2011, the Government of India’s Ministry of Communications & Information Technology issued a clarification regarding India’s new privacy regulations, known as the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (the “Rules”), under Section 43A of the Information Technology Act 2000.
JKevinParker
AUGUST 20, 2011
I have begun my new job in Washington, D.C. as a SharePoint Architect. I'm working with the Department of Labor to plan out a SharePoint deployment for ECM, ERM, and Government 2.0 within one of their agencies. It's really exciting stuff! The first day that I walked through the streets of the District, I was struck by the fact that their buildings are all only about 13-14 stories tall.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Hunton Privacy
AUGUST 18, 2011
Lush Cosmetics Ltd. (“Lush”) has avoided a monetary penalty for its breach of the UK Data Protection Act 1998. Instead, the UK Information Commissioner’s Office (the “ICO”) has required Lush to sign an undertaking that obliges the company to “ensure that future customer credit card data will be processed in accordance with the Payment Card Industry Data Security Standard.”.
Hunton Privacy
AUGUST 16, 2011
The Department of Commerce released an English translation of Peru’s Law for Personal Data Protection ( Ley de Protección de Datos Personales, Ley No. 29733 ). The law passed Peru’s Congress on June 7, 2011, and was signed by the president July 2, 2011. Peru’s adoption of this new law is in keeping with a recent trend in Latin America, where Uruguay, Mexico and Colombia also have passed privacy legislation.
Hunton Privacy
AUGUST 15, 2011
On August 15, 2011, the Federal Trade Commission announced a settlement with W3 Innovations, LLC, doing business as Broken Thumbs Apps (“W3”) for violations of the Children’s Online Privacy Protection Act (“COPPA”) and the FTC’s COPPA Rule. This marks the FTC’s first privacy settlement involving mobile applications. The FTC alleged in its complaint ( main document , exhibits ) that W3, which has developed over forty mobile applications for the Apple iPhone and iPod Touch, collected more than 30
Let's personalize your content