December, 2012

article thumbnail

Solar storms to peak in 2013

Collaboration 2.0

The biggest solar storm on record in 1859 brought down US and European telegraph systems and lit up the world sky with Aurorae; a similar storm today would wreak havoc with power grids and fry delicate electronics. Your cloud infrastructure platforms are particularly vulnerable.

Cloud 111
article thumbnail

As Long As It’s Legal, Corporations Will Act Selfishly

John Battelle's Searchblog

The post As Long As It’s Legal, Corporations Will Act Selfishly appeared first on John Battelle's Search Blog. ( image ) There’s a hubbub in the press this week about Google employing a “ Double Irish – Dutch Sandwich ” tactic to funnel profits from Europe over to Bermuda, where there is no corporate income tax. Reuters reports that the company saved around $2 billion in taxes by employing the structure, which, as far as I can tell, is perfectly legal.

IT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DB2 for z/OS: Clearing Up a Native SQL Procedure Misconception

Robert's Db2

A few days ago I received a question that I believe reflects a rather widely held misconception about DB2 for z/OS native SQL procedures. In the interest of clearing the air, I'll provide in this entry the information that I communicated to my question-asking friend. Native SQL procedures were introduced with DB2 9 for z/OS in new-function mode (or with DB2 10 in new-function mode, for those organizations that migrated or are migrating to DB2 10 from DB2 V8).

article thumbnail

Integrate cloud app activity streams to improve productivity: Hojoki, Busy Flow

ChiefTech

While the cloud has simplified some aspects of managing IT, it has also increased complexity through the number of choices available. The needs (and budgets) of big enterprise, departments and teams within large companies, small-to-medium size business and freelancers are also all very different, which means there is room for lots of different solutions.

Cloud 65
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Online Digital Reputation Management is a Requirement for Marketing Strategy & PR in DC

Interactive Information Management

Nearly every business conducting business in the DC or Northern Virginia area (and elsewhere) is finding that more and more effort is required to manage their online reviews and feedback. Particularly for local or regional businesses, the very first thing online consumers do in considering to visit or buy, is to seek out online reviews, search for online reputation or trust signals, and canvass their social media networks for trusted advice and opinion.

More Trending

article thumbnail

Mobile is eating the world

Collaboration 2.0

Mary Meeker's slide vividly depicts the relentless march of mobile OS into the heart of desktop QWERTY keyboard land.

Cloud 111
article thumbnail

For Microsoft, The Worm Turns Through Apple

John Battelle's Searchblog

The post For Microsoft, The Worm Turns Through Apple appeared first on John Battelle's Search Blog. ( image ) Wow. That’s about the sum of my initial reaction to this story from ATD: Exclusive: Microsoft Pressing Apple to Take a Smaller Cut on Sales Inside Office for iOS. The wow isn’t that Microsoft is trying to reduce the 30% cut Apple takes on every dollar that flows through the iOS ecosystem.

Sales 108
article thumbnail

DB2 for z/OS: Clone Tables and "Active Versioning"

Robert's Db2

A DB2 for z/OS DBA contacted me a few days ago and posed a seemingly simple question, the answer to which ended up being a little more involved than might be expected. The DBA's query: how can one alter a table that has a clone? The specific need in this case was to add a column to a table for which a clone had been created. As is true of other ALTER TABLE operations, addition of a table column cannot be accomplished while the clone relationship exists.

Access 48
article thumbnail

Senubo - heavy industry software influenced by social software

ChiefTech

While you may already be familiar with some of the leading enterprise microblogging platforms (e.g. Yammer), none of these have a particular industry or process focus. Senubo on the other hand is "an online, mobile communications platform for heavy industry.". Senubo have created some storyboards to help illustrate a couple of industrial use cases: To see what Senubo looks like, watch this video from about the 1m 12s mark.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Employers Must Update Notice Form Under the Fair Credit Reporting Act

Hunton Privacy

As reported in the Hunton Employment & Labor Perspectives Blog : Beginning January 1, 2013, employers must issue an updated notice form to applicants and employees when using criminal background information under the federal Fair Credit Reporting Act. For years, employers intending to obtain and use a criminal background check have issued to the applicant or employee a document titled “ A Summary of Your Rights Under the Fair Credit Reporting Act ” at three points in the process: when obtain

Risk 40
article thumbnail

Leveson: Proposals for New Data Privacy rules in the UK

Privacy and Cybersecurity Law

The Leveson Inquiry recently published its findings into UK press regulation. However Leveson also commented on the UK data privacy […].

article thumbnail

US school shootings digital witch hunt

Collaboration 2.0

The glare of the public spotlight can bring out the worst in our digital connections: the same can be true n the dark side of the workforce rat race.

Privacy 87
article thumbnail

Retargeting Is Just Phase One

John Battelle's Searchblog

The post Retargeting Is Just Phase One appeared first on John Battelle's Search Blog. Toward the end of the year, annual predictions come out (I’ve been guilty of this for nearly ten years now). I was perusing these from Triggit founder Zach Coelius, and his ninth one hit me right between the eyes: Retargeting will be taken out of the tactic box marketers have been myopically placing it into, and instead they will recognize that retargeting is simply the first step to a sophisticated

Marketing 107
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Business Practice Exchange 2012: Mike Thuman's feedback

Preservica

Another great Business Practice Exchange session was held early this month, this time in Annapolis hosted by the Maryland State Archives. Efforts related to the SERI initiative wove themselves throughout the meeting as talks of self assessments turned toward education and program planning. Kentucky Department for Libraries and Archives talked about their ISO/TRAC test -audit and then shared the platform with us on discussing ways to lower the barrier in preserving electronic records.

article thumbnail

Two new Australian case studies from Microsoft

ChiefTech

Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if the article is paywalled, try this link (PDF) provided by NSC Group). A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”.

IT 43
article thumbnail

Article 29 Working Party Announces Launch of Binding Corporate Rules for Processors

Hunton Privacy

On December 21, 2012, the Article 29 Working Party issued a press release announcing the launch of Binding Corporate Rules (“BCRs”) for processors effective January 1, 2013. This announcement follows the Article 29 Working Party’s adoption of a Working Document ( WP 195 ) on June 6, 2012, which set forth requirements for BCRs for processors, and an application form for submitting BCRs for processors issued on September 17, 2012.

article thumbnail

Stronger customer authentication only way to mitigate risk of bank fraud

Dark Reading

Sitting at the core of every financial transaction is trust. Without it, or worse, relying on unvalidated resources like personal identifiable information (PII) to identify customers, puts every banking transaction at risk. The recent article, “$850 Million Scheme Exploited Facebook: Authentication, Secure Browsing Would Have Reduced Losses,” illustrates just how important customer authentication is.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Too many talking shops, not enough action

Collaboration 2.0

Google+ communities is good technology, but adds to the problem of too many digital locations and fragmentation of information.

77
article thumbnail

With Google’s 2012 Zeitgeist, You Won’t Learn Much. Why?

John Battelle's Searchblog

The post With Google’s 2012 Zeitgeist, You Won’t Learn Much. Why? appeared first on John Battelle's Search Blog. Guess what? This guy was big this year. Really! I think readers know that on balance, I’m a fan of Google. I recently switched to the Nexus 4 (more coming on that front as I settle into really using it). I believe the company has a stronger core philosophy than many of its rivals.

article thumbnail

Apple OS X Server Upgrade Update

JKevinParker

In my last post, I ranted about Apple canceling my order for Mac OS X Snow Leopard Server without telling me, and how they said it could be another 6 weeks before I got my upgrade if it came at all. It did come almost immediately. It must have shipped shortly after my call to Apple. Now, I have installed Snow Leopard Server only to find out that my Xserve model cannot be upgraded to Mountain Lion.

IT 40
article thumbnail

Cloud workshop

Preservica

This was a great session. The major theme was that the cloud is easy, it works and even when Amazon went down, it was not horrific. Through the course of developing and working with cloud-based solutions for the purpose of digital object preservation, we have learned some very practical lessons. There are many advantages to be gained from leveraging cloud services, but along with the benefits come additional considerations.

Cloud 40
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Congress Approves VPPA Consent Requirement Changes

Hunton Privacy

On December 18, 2012, the U.S. House of Representatives passed H.R. 6671 , a bill that would amend the Video Privacy Protection Act (“VPPA”) consent requirements for disclosing consumers’ viewing information. The Senate approved the bill without changes on December 20, 2012. The bill would make it easier for companies to develop innovative technologies for the sharing of consumers’ video viewing habits.

Privacy 40
article thumbnail

Can we afford the risk to our businesses of not leveraging diverse talent?

CGI

Can we afford the risk to our businesses of not leveraging diverse talent? ravi.kumarv@cgi.com. Wed, 12/12/2012 - 07:00. Do you think that diversity should be at the heart of the talent agenda? Significant research has demonstrates how a diverse workforce can add value by achieving improved financial results, developing new customer relationships and developing new products and services.

Risk 40
article thumbnail

Selling Federal Enterprise Architecture (EA)

Interactive Information Management

Selling Federal Enterprise Architecture A taxonomy of subject areas, from which to develop a prioritized marketing and communications plan to evangelize EA activities within and among US Federal Government organizations and constituents. Any and all feedback is appreciated, particularly in developing and extending this discussion as a tool for use – more information and details are also available.

article thumbnail

Writing Every So Often: The Personal Essay Makes A Comeback

John Battelle's Searchblog

The post Writing Every So Often: The Personal Essay Makes A Comeback appeared first on John Battelle's Search Blog. Browsing Hacker News, which I’ll admit I don’t read very closely (because, well, I’m not a hacker), I saw an interesting headline: I quit Twitter for a month and it changed my thinking about mostly everything. Well, that’s going to get my attention.

IT 102
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Locked and Bloated

John Battelle's Searchblog

The post Locked and Bloated appeared first on John Battelle's Search Blog. ( image Vator News ) Companies get big. Companies gain market dominance. Companies slowly pivot from their original values. Companies justify those shifts with nods to shareholder value, or consistent user experience, or inconsistent implementations of their platforms by (former) partners.

article thumbnail

One Less iPhone Purchased: Day One With The Nexus

John Battelle's Searchblog

The post One Less iPhone Purchased: Day One With The Nexus appeared first on John Battelle's Search Blog. I finally did it – I slipped the sim from my failing iPhone 4 into a shiny new Google Nexus last night. And damn, the thing just worked. And it’s So. Much. Better. But… there are things I wish it had. I figure I’ll take notes here, so folks can both learn from my experience, as well as tell me what an idiot I am help me out.

Cloud 96
article thumbnail

Another Thoughtful Personal Essay: Fragile

John Battelle's Searchblog

The post Another Thoughtful Personal Essay: Fragile appeared first on John Battelle's Search Blog. You know that phenomenon that happens – right after you first notice a pattern, you then start seeing it everywhere? Well, here’s another wonderful personal essay, again by a young(er) author (Nathan Kontny) involved in the tech world, this time about losing a friend with whom he worked.

IT 89