This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The biggest solar storm on record in 1859 brought down US and European telegraph systems and lit up the world sky with Aurorae; a similar storm today would wreak havoc with power grids and fry delicate electronics. Your cloud infrastructure platforms are particularly vulnerable.
The post As Long As It’s Legal, Corporations Will Act Selfishly appeared first on John Battelle's Search Blog. ( image ) There’s a hubbub in the press this week about Google employing a “ Double Irish – Dutch Sandwich ” tactic to funnel profits from Europe over to Bermuda, where there is no corporate income tax. Reuters reports that the company saved around $2 billion in taxes by employing the structure, which, as far as I can tell, is perfectly legal.
A few days ago I received a question that I believe reflects a rather widely held misconception about DB2 for z/OS native SQL procedures. In the interest of clearing the air, I'll provide in this entry the information that I communicated to my question-asking friend. Native SQL procedures were introduced with DB2 9 for z/OS in new-function mode (or with DB2 10 in new-function mode, for those organizations that migrated or are migrating to DB2 10 from DB2 V8).
While the cloud has simplified some aspects of managing IT, it has also increased complexity through the number of choices available. The needs (and budgets) of big enterprise, departments and teams within large companies, small-to-medium size business and freelancers are also all very different, which means there is room for lots of different solutions.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
Nearly every business conducting business in the DC or Northern Virginia area (and elsewhere) is finding that more and more effort is required to manage their online reviews and feedback. Particularly for local or regional businesses, the very first thing online consumers do in considering to visit or buy, is to seek out online reviews, search for online reputation or trust signals, and canvass their social media networks for trusted advice and opinion.
[ Update: I got my discs faster than I thought. ]. I love Apple products. I am not a zealot like some, as I am a Microsoft SharePoint Architect and I often have projects going on Linux or BSD Unix as well. But since MacBook Pros started shipping with dual core Intel processors, I have really enjoyed the powerful, elegant, and almost hassle-free computing environment.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
[ Update: I got my discs faster than I thought. ]. I love Apple products. I am not a zealot like some, as I am a Microsoft SharePoint Architect and I often have projects going on Linux or BSD Unix as well. But since MacBook Pros started shipping with dual core Intel processors, I have really enjoyed the powerful, elegant, and almost hassle-free computing environment.
The post For Microsoft, The Worm Turns Through Apple appeared first on John Battelle's Search Blog. ( image ) Wow. That’s about the sum of my initial reaction to this story from ATD: Exclusive: Microsoft Pressing Apple to Take a Smaller Cut on Sales Inside Office for iOS. The wow isn’t that Microsoft is trying to reduce the 30% cut Apple takes on every dollar that flows through the iOS ecosystem.
A DB2 for z/OS DBA contacted me a few days ago and posed a seemingly simple question, the answer to which ended up being a little more involved than might be expected. The DBA's query: how can one alter a table that has a clone? The specific need in this case was to add a column to a table for which a clone had been created. As is true of other ALTER TABLE operations, addition of a table column cannot be accomplished while the clone relationship exists.
While you may already be familiar with some of the leading enterprise microblogging platforms (e.g. Yammer), none of these have a particular industry or process focus. Senubo on the other hand is "an online, mobile communications platform for heavy industry.". Senubo have created some storyboards to help illustrate a couple of industrial use cases: To see what Senubo looks like, watch this video from about the 1m 12s mark.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
As reported in the Hunton Employment & Labor Perspectives Blog : Beginning January 1, 2013, employers must issue an updated notice form to applicants and employees when using criminal background information under the federal Fair Credit Reporting Act. For years, employers intending to obtain and use a criminal background check have issued to the applicant or employee a document titled “ A Summary of Your Rights Under the Fair Credit Reporting Act ” at three points in the process: when obtain
The post Retargeting Is Just Phase One appeared first on John Battelle's Search Blog. Toward the end of the year, annual predictions come out (I’ve been guilty of this for nearly ten years now). I was perusing these from Triggit founder Zach Coelius, and his ninth one hit me right between the eyes: Retargeting will be taken out of the tactic box marketers have been myopically placing it into, and instead they will recognize that retargeting is simply the first step to a sophisticated
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Another great Business Practice Exchange session was held early this month, this time in Annapolis hosted by the Maryland State Archives. Efforts related to the SERI initiative wove themselves throughout the meeting as talks of self assessments turned toward education and program planning. Kentucky Department for Libraries and Archives talked about their ISO/TRAC test -audit and then shared the platform with us on discussing ways to lower the barrier in preserving electronic records.
Some new Australian case studies from across the Microsoft family: Woods Bagot - Microsoft SharePoint 2013 pilot. NSC Group - Using a free Yammer network. (if the article is paywalled, try this link (PDF) provided by NSC Group). A quote from Woods Bagot: “With the addition of the new social features, we can use SharePoint to help us quickly achieve a more engaging intranet.”.
On December 21, 2012, the Article 29 Working Party issued a press release announcing the launch of Binding Corporate Rules (“BCRs”) for processors effective January 1, 2013. This announcement follows the Article 29 Working Party’s adoption of a Working Document ( WP 195 ) on June 6, 2012, which set forth requirements for BCRs for processors, and an application form for submitting BCRs for processors issued on September 17, 2012.
Sitting at the core of every financial transaction is trust. Without it, or worse, relying on unvalidated resources like personal identifiable information (PII) to identify customers, puts every banking transaction at risk. The recent article, “$850 Million Scheme Exploited Facebook: Authentication, Secure Browsing Would Have Reduced Losses,” illustrates just how important customer authentication is.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
The post With Google’s 2012 Zeitgeist, You Won’t Learn Much. Why? appeared first on John Battelle's Search Blog. Guess what? This guy was big this year. Really! I think readers know that on balance, I’m a fan of Google. I recently switched to the Nexus 4 (more coming on that front as I settle into really using it). I believe the company has a stronger core philosophy than many of its rivals.
In my last post, I ranted about Apple canceling my order for Mac OS X Snow Leopard Server without telling me, and how they said it could be another 6 weeks before I got my upgrade if it came at all. It did come almost immediately. It must have shipped shortly after my call to Apple. Now, I have installed Snow Leopard Server only to find out that my Xserve model cannot be upgraded to Mountain Lion.
This was a great session. The major theme was that the cloud is easy, it works and even when Amazon went down, it was not horrific. Through the course of developing and working with cloud-based solutions for the purpose of digital object preservation, we have learned some very practical lessons. There are many advantages to be gained from leveraging cloud services, but along with the benefits come additional considerations.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On December 18, 2012, the U.S. House of Representatives passed H.R. 6671 , a bill that would amend the Video Privacy Protection Act (“VPPA”) consent requirements for disclosing consumers’ viewing information. The Senate approved the bill without changes on December 20, 2012. The bill would make it easier for companies to develop innovative technologies for the sharing of consumers’ video viewing habits.
Can we afford the risk to our businesses of not leveraging diverse talent? ravi.kumarv@cgi.com. Wed, 12/12/2012 - 07:00. Do you think that diversity should be at the heart of the talent agenda? Significant research has demonstrates how a diverse workforce can add value by achieving improved financial results, developing new customer relationships and developing new products and services.
Selling Federal Enterprise Architecture A taxonomy of subject areas, from which to develop a prioritized marketing and communications plan to evangelize EA activities within and among US Federal Government organizations and constituents. Any and all feedback is appreciated, particularly in developing and extending this discussion as a tool for use – more information and details are also available.
The post Writing Every So Often: The Personal Essay Makes A Comeback appeared first on John Battelle's Search Blog. Browsing Hacker News, which I’ll admit I don’t read very closely (because, well, I’m not a hacker), I saw an interesting headline: I quit Twitter for a month and it changed my thinking about mostly everything. Well, that’s going to get my attention.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
The post Locked and Bloated appeared first on John Battelle's Search Blog. ( image Vator News ) Companies get big. Companies gain market dominance. Companies slowly pivot from their original values. Companies justify those shifts with nods to shareholder value, or consistent user experience, or inconsistent implementations of their platforms by (former) partners.
The post One Less iPhone Purchased: Day One With The Nexus appeared first on John Battelle's Search Blog. I finally did it – I slipped the sim from my failing iPhone 4 into a shiny new Google Nexus last night. And damn, the thing just worked. And it’s So. Much. Better. But… there are things I wish it had. I figure I’ll take notes here, so folks can both learn from my experience, as well as tell me what an idiot I am help me out.
The post Another Thoughtful Personal Essay: Fragile appeared first on John Battelle's Search Blog. You know that phenomenon that happens – right after you first notice a pattern, you then start seeing it everywhere? Well, here’s another wonderful personal essay, again by a young(er) author (Nathan Kontny) involved in the tech world, this time about losing a friend with whom he worked.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content