August, 2011

article thumbnail

Twitter and the Ultimate Algorithm: Signal Over Noise (With Major Business Model Implications)

John Battelle's Searchblog

Note: I wrote this post without contacting anyone at Twitter. I do know a lot of folks there, and as regular readers know, have a lot of respect for them and the company. But I wanted to write this as a "Thinking Out Loud" post, rather than a reported article. There's a big difference - in this piece, I am positing an idea. It's entirely possible my lack of reporting will make me look like an uninformed boob.

Insurance 111
article thumbnail

Escape to the cloud: Domino data extraction made easy

Collaboration 2.0

Unlocking information from elderly IT silos is essential to realize the benefits of modern technologies; CIMTrek show how to quickly extract content from Domino & Notes applications

Cloud 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS and SNA: Breaking the Ties that (Used to) Bind

Robert's Db2

I don't know if there are any industries in which things change as quickly (and constantly) as they do in the realm of information technology. Just a few years ago, clouds were what produced rain, streams were watercourses , and Ruby on Rails might have been a reference to your aunt taking the express train to New York City. Today, those are all IT terms.

article thumbnail

Beijing Court Finds 21 Defendants Guilty of Criminal Privacy Violations

Hunton Privacy

On August 5, 2011, the Beijing Second Intermediate People’s Court announced its decision in what is reported to be the largest criminal case to date involving the misuse of personal information in Beijing, China. The Court based its ruling on Article 7 of the Seventh Amendment to the Criminal Law, which applies to three types of criminal activities: (1) illegal sale of citizens’ personal information, (2) illegal provision of citizens’ personal information, and (3) illegal access to citizens’ pe

Privacy 40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Government IT Reform

JKevinParker

I'm currently working through the White House's 25 Point Implementation Plan to Reform Federal Information Technology Management. I want to quickly highlight the first paragraph of that document so that you will understand why I am so passionate about helping Uncle Sam make major improvements: Information technology should enable government to better serve the American people.

More Trending

article thumbnail

The Future of The Internet (And How to Stop It) - A Dialog with Jonathan Zittrain Updating His 2008 Book

John Battelle's Searchblog

( image charlie rose ) As I prepare for writing my next book ( #WWHW ), I've been reading a lot. You've seen my review of The Information , and In the Plex , and The Next 100 Years. I've been reading more than that, but those made it to a post so far. I'm almost done with Sherry Turkle's Alone Together , with which I have an itch to quibble, not to mention some fiction that I think is information to the work I'm doing.

IT 102
article thumbnail

Who Am I, According to Google Ads? Who Am I, According to the Web? Who Do I Want to Be?

John Battelle's Searchblog

Over on Hacker News , I noticed this headline: See what Google knows about you. Now that's a pretty compelling promise, so I clicked. It took me to this page: Ah, the Google ad preferences page. It's been a while since I've visited this place. It gives you a limited but nonetheless interesting overview of the various categories and demographic information Google believes reflect your interests (and in a way, your identity, or "who you are" in the eyes of an advertising client).

IT 97
article thumbnail

With Tech, We Are Not Where We Want To Be (Or, This Cake Ain't Baked)

John Battelle's Searchblog

Last week I finished reading Sherry Turkle's " Alone Together ", and while I have various disagreements with the work (I typed in more than 70 notes on my Kindle, even with that terribly tiny keyboard), I still found myself nodding in agreement more than I thought I would. In her book, Turkle explores our relationship with technology, in particular what she calls "sociable robots" (toys like the Aibo or My Real Baby), as well as with email, IM, and shared virtual spaces like Second Life and Face

IT 88
article thumbnail

Physics of the Future, by Michio Kaku

John Battelle's Searchblog

As part of my ongoing self-education - so as to not be a total moron while writing " What We Hath Wrought " - this past weekend I read " Physics of the Future " by Michio Kaku. I was excited to read the book, because Kaku is a well regarded physicist, and that's a field that I know will inform what's possible, technologically, thirty or so years from now.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

More on Twitter's Great Opportunity/Problem

John Battelle's Searchblog

I n the comments on this previous post , I promised I'd respond with another post, as my commenting system is archaic (something I'm fixing soon). The comments were varied and interesting, and fell into a few buckets. I also have a few more of my own thoughts to toss out there, given what I've heard from you all, as well as some thinking I've done in the past day or so.

article thumbnail

Who Will Be Here One Generation From Now?

John Battelle's Searchblog

( image ) I just re-read my post explaining What We Hath Wrought , the book I am currently working on. (Yes, I know that's a dangling participle, Mom). And it strikes me I might ask you all this question: Which company do you think will be around, and let me add - around and thriving - one generation from now? I could install a widget and let you vote for a company, but that's the easy way out.

IT 82
article thumbnail

Are you there?

Collaboration 2.0

Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications

99
article thumbnail

Riotous times

Collaboration 2.0

Digital tools of choice in a world where our social fabric is rapidly changing can be used to market jeans or orchestrate looting.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Are you there? The paradox of 'real time' communication

Collaboration 2.0

Establishing true location is getting harder across multiple ‘presence’ red herrings in online applications

article thumbnail

Dreamforce a textbook way to get the most from conferences

Collaboration 2.0

Salesforce tour de force in providing digital tools at Dreamforce is a great way to learn how to get the most out of all conferences and events

85
article thumbnail

Practical collaboration planning for profit

Collaboration 2.0

Regardless of improvements in collaboration software, the real business challenge is in identifying who takes responsibilities for collaboration, overcoming internal political agendas & driving new working methods

74
article thumbnail

HP: The big data trucks aren't stopping

Collaboration 2.0

Don’t overlook the value of Autonomy and their competitors helping make sense of unstructured data at scale as HP struggle to remain relevant

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

An Important DB2 10 for z/OS Stored Procedures Enhancement

Robert's Db2

I've said it before, and I'll say it again: DB2 10 for z/OS is packed with new functionality. Along with the really high-profile features of the latest release of DB2 for the mainframe platform (temporal data support, enhanced CPU efficiency, row and column access control, etc.), you'll find several goodies that will likely be very useful to your organization.

Access 48
article thumbnail

Great DB2 Learning Opportunities in Prague this November

Robert's Db2

Greetings, folks. I know that an unusually long time has passed since I lasted posted an entry to this blog -- my apologies for that. I was out of commission during the second half of July and into early August, dealing with a medical issue. I'm much better now, and things are getting back to normal. I'm still on medical leave (until October 3), but I plan on posting several blog entries between now and then).

IT 48
article thumbnail

France Introduces Prior Opt-in Consent for Cookies

Hunton Privacy

On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.

article thumbnail

France Introduces Data Security Breach Notification Requirement for Electronic Communication Service Providers

Hunton Privacy

On August 24, 2011, France’s new law concerning electronic communications ( Ordonnance n° 2011-1012 du 24 août 2011 relative aux communications électroniques , or the “Ordinance”) came into force. The Ordinance implements the provisions of the revised EU Directive 2002/58/EC (the “e-Privacy Directive”) with respect to the French Data Protection Act of 1978, the French Postal and Electronic Communications Code and the French Consumer Protection Code.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

German State DPA Orders Businesses to Close Facebook Pages

Hunton Privacy

On August 19, 2011, the Data Protection Commissioner’s Office of the German federal state of Schleswig-Holstein (“ULD”) ordered all businesses in that state “to shut down their fan pages on Facebook and remove social plug-ins such as the ‘like’-button from their websites.” Although this warning is specific to Facebook users, the regulator’s explanation of its motives reveals a fundamental concern about common data analytics practices: “By using the Facebook service traffic and content data are

article thumbnail

Belgium Simplifies the Authorization Procedure for Binding Corporate Rules

Hunton Privacy

On July 13, 2011, the Belgian Privacy Commission (the “Belgian DPA”) signed a Protocol with the Ministry of Justice which significantly simplifies the authorization procedure for binding corporate rules (“BCRs”) under Belgian law. The Protocol was just made public on the Belgian DPA’s website. The European Context. BCRs are a legal mechanism used by multinational companies for purposes of complying with EU data protection law, to provide an adequate level of data protection when transfer

article thumbnail

Outsourcers Exempt from India’s Privacy Regulations

Hunton Privacy

On August 24, 2011, the Government of India’s Ministry of Communications & Information Technology issued a clarification regarding India’s new privacy regulations, known as the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (the “Rules”), under Section 43A of the Information Technology Act 2000.

Privacy 40
article thumbnail

Washington, D.C.

JKevinParker

I have begun my new job in Washington, D.C. as a SharePoint Architect. I'm working with the Department of Labor to plan out a SharePoint deployment for ECM, ERM, and Government 2.0 within one of their agencies. It's really exciting stuff! The first day that I walked through the streets of the District, I was struck by the fact that their buildings are all only about 13-14 stories tall.

ECM 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Lush Avoids ICO Fine After Website Data Breach

Hunton Privacy

Lush Cosmetics Ltd. (“Lush”) has avoided a monetary penalty for its breach of the UK Data Protection Act 1998. Instead, the UK Information Commissioner’s Office (the “ICO”) has required Lush to sign an undertaking that obliges the company to “ensure that future customer credit card data will be processed in accordance with the Payment Card Industry Data Security Standard.”.

article thumbnail

English Translation of Peru’s Law for Personal Data Protection Released

Hunton Privacy

The Department of Commerce released an English translation of Peru’s Law for Personal Data Protection ( Ley de Protección de Datos Personales, Ley No. 29733 ). The law passed Peru’s Congress on June 7, 2011, and was signed by the president July 2, 2011. Peru’s adoption of this new law is in keeping with a recent trend in Latin America, where Uruguay, Mexico and Colombia also have passed privacy legislation.

article thumbnail

FTC Announces First Privacy Settlement Involving Mobile Applications

Hunton Privacy

On August 15, 2011, the Federal Trade Commission announced a settlement with W3 Innovations, LLC, doing business as Broken Thumbs Apps (“W3”) for violations of the Children’s Online Privacy Protection Act (“COPPA”) and the FTC’s COPPA Rule. This marks the FTC’s first privacy settlement involving mobile applications. The FTC alleged in its complaint ( main document , exhibits ) that W3, which has developed over forty mobile applications for the Apple iPhone and iPod Touch, collected more than 30

Privacy 40